Learning Kali Linux security testing, penetration testing & ethical hacking
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the too...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Sebastopol
O'Reilly Media, Incorporated
2024
|
Ausgabe: | 2nd ed. |
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-106608932 | ||
003 | DE-627-1 | ||
005 | 20241001123257.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240902s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781098154097 |9 978-1-0981-5409-7 | ||
020 | |a 1098154096 |9 1-0981-5409-6 | ||
035 | |a (DE-627-1)106608932 | ||
035 | |a (DE-599)KEP106608932 | ||
035 | |a (ORHE)9781098154127 | ||
035 | |a (DE-627-1)106608932 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240819 | |
100 | 1 | |a Messier, Ric |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Learning Kali Linux |b security testing, penetration testing & ethical hacking |c Ric Messier |
250 | |a 2nd ed. | ||
264 | 1 | |a Sebastopol |b O'Reilly Media, Incorporated |c 2024 | |
300 | |a 1 online resource (542 p.) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record. - WPS Attacks | ||
520 | |a With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete. | ||
630 | 2 | 0 | |a Kali Linux |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Hacking | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Piratage informatique | |
776 | 1 | |z 9781098154134 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781098154134 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098154127/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-106608932 |
---|---|
_version_ | 1818767365291114496 |
adam_text | |
any_adam_object | |
author | Messier, Ric |
author_facet | Messier, Ric |
author_role | aut |
author_sort | Messier, Ric |
author_variant | r m rm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)106608932 (DE-599)KEP106608932 (ORHE)9781098154127 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02629cam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-106608932</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123257.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240902s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781098154097</subfield><subfield code="9">978-1-0981-5409-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1098154096</subfield><subfield code="9">1-0981-5409-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106608932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP106608932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098154127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106608932</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240819</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messier, Ric</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning Kali Linux</subfield><subfield code="b">security testing, penetration testing & ethical hacking</subfield><subfield code="c">Ric Messier</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol</subfield><subfield code="b">O'Reilly Media, Incorporated</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (542 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record. - WPS Attacks</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781098154134</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781098154134</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098154127/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-106608932 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:48:43Z |
institution | BVB |
isbn | 9781098154097 1098154096 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (542 p.) |
psigel | ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | O'Reilly Media, Incorporated |
record_format | marc |
spelling | Messier, Ric VerfasserIn aut Learning Kali Linux security testing, penetration testing & ethical hacking Ric Messier 2nd ed. Sebastopol O'Reilly Media, Incorporated 2024 1 online resource (542 p.) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Description based upon print version of record. - WPS Attacks With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete. Kali Linux Penetration testing (Computer security) Computer networks Security measures Hacking Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Piratage informatique 9781098154134 Erscheint auch als Druck-Ausgabe 9781098154134 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781098154127/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Messier, Ric Learning Kali Linux security testing, penetration testing & ethical hacking Kali Linux Penetration testing (Computer security) Computer networks Security measures Hacking Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Piratage informatique |
title | Learning Kali Linux security testing, penetration testing & ethical hacking |
title_auth | Learning Kali Linux security testing, penetration testing & ethical hacking |
title_exact_search | Learning Kali Linux security testing, penetration testing & ethical hacking |
title_full | Learning Kali Linux security testing, penetration testing & ethical hacking Ric Messier |
title_fullStr | Learning Kali Linux security testing, penetration testing & ethical hacking Ric Messier |
title_full_unstemmed | Learning Kali Linux security testing, penetration testing & ethical hacking Ric Messier |
title_short | Learning Kali Linux |
title_sort | learning kali linux security testing penetration testing ethical hacking |
title_sub | security testing, penetration testing & ethical hacking |
topic | Kali Linux Penetration testing (Computer security) Computer networks Security measures Hacking Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Piratage informatique |
topic_facet | Kali Linux Penetration testing (Computer security) Computer networks Security measures Hacking Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Piratage informatique |
url | https://learning.oreilly.com/library/view/-/9781098154127/?ar |
work_keys_str_mv | AT messierric learningkalilinuxsecuritytestingpenetrationtestingethicalhacking |