000 02227cam a2200385 i 4500
999 _c233293
_d233293
001 18066598
003 Nust
005 20170306151543.0
008 140313t20152015flua b 001 0 eng
010 _a 2014006695
020 _a9781482231618 (paperback)
020 _a1482231611 (paperback)
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
050 0 0 _aQA76.9.A25
_bB356 2015
082 0 0 _a005.8 BAL
_223
084 _aCOM053000
_aCOM043000
_aLAW041000
_2bisacsh
100 1 _aBaloch, Rafay.
245 1 0 _aEthical hacking and penetration testing guide /
_cRafay Baloch.
264 1 _aBoca Raton :
_bCRC Press, Taylor & Francis Group,
_c[2015]
264 4 _c©2015
300 _axxvii, 503 pages :
_billustrations ;
_c26 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "--
_cProvided by publisher.
650 0 _aPenetration testing (Computer security)
650 7 _aCOMPUTERS / Security / General.
_2bisacsh
650 7 _aCOMPUTERS / Networking / General.
_2bisacsh
650 7 _aLAW / Forensic Science.
_2bisacsh
856 4 2 _3Cover image
_uhttp://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK