語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Penetration testing basics[electroni...
~
Messier, Ric.
Penetration testing basics[electronic resource] :a quick-start guide to breaking into systems /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
005.8
書名/作者:
Penetration testing basics : a quick-start guide to breaking into systems // by Ric Messier.
作者:
Messier, Ric.
出版者:
Berkeley, CA : : Apress :, 2016.
面頁冊數:
xv, 114 p. : : ill. (some col.), digital ;; 24 cm.
Contained By:
Springer eBooks
標題:
Penetration testing (Computer security)
標題:
Computer networks - Access control.
標題:
Computer Science.
標題:
Programming Techniques.
標題:
Software Engineering.
標題:
Programming Languages, Compilers, Interpreters.
ISBN:
9781484218570
ISBN:
9781484218563
內容註:
1. What Is Penetration Testing? -- 2. Digging for Information -- 3. What's Open? -- 4. Vulnerabilities -- 5. Exploitation -- 6. Breaking Web Sites -- 7. Reporting.
摘要、提要註:
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.
電子資源:
http://dx.doi.org/10.1007/978-1-4842-1857-0
Penetration testing basics[electronic resource] :a quick-start guide to breaking into systems /
Messier, Ric.
Penetration testing basics
a quick-start guide to breaking into systems /[electronic resource] :by Ric Messier. - Berkeley, CA :Apress :2016. - xv, 114 p. :ill. (some col.), digital ;24 cm.
1. What Is Penetration Testing? -- 2. Digging for Information -- 3. What's Open? -- 4. Vulnerabilities -- 5. Exploitation -- 6. Breaking Web Sites -- 7. Reporting.
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.
ISBN: 9781484218570
Standard No.: 10.1007/978-1-4842-1857-0doiSubjects--Topical Terms:
554347
Penetration testing (Computer security)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Penetration testing basics[electronic resource] :a quick-start guide to breaking into systems /
LDR
:01771nmm a2200313 a 4500
001
462469
003
DE-He213
005
20160714183352.0
006
m d
007
cr nn 008maaau
008
170223s2016 cau s 0 eng d
020
$a
9781484218570
$q
(electronic bk.)
020
$a
9781484218563
$q
(paper)
024
7
$a
10.1007/978-1-4842-1857-0
$2
doi
035
$a
978-1-4842-1857-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UM
$2
bicssc
072
7
$a
COM051000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
M585 2016
100
1
$a
Messier, Ric.
$3
617494
245
1 0
$a
Penetration testing basics
$h
[electronic resource] :
$b
a quick-start guide to breaking into systems /
$c
by Ric Messier.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
xv, 114 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
1. What Is Penetration Testing? -- 2. Digging for Information -- 3. What's Open? -- 4. Vulnerabilities -- 5. Exploitation -- 6. Breaking Web Sites -- 7. Reporting.
520
$a
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.
650
0
$a
Penetration testing (Computer security)
$3
554347
650
0
$a
Computer networks
$x
Access control.
$3
445512
650
1 4
$a
Computer Science.
$3
423143
650
2 4
$a
Programming Techniques.
$3
466907
650
2 4
$a
Software Engineering.
$3
464601
650
2 4
$a
Programming Languages, Compilers, Interpreters.
$3
466913
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-1857-0
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-1-4842-1857-0
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入