語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Constructing an ethical hacking know...
~
Dhavale, Sunita Vikrant,
Constructing an ethical hacking knowledge base for threat awareness and prevention[electronic resource] /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
005.8
書名/作者:
Constructing an ethical hacking knowledge base for threat awareness and prevention/ by Sunita Vikrant Dhavale.
作者:
Dhavale, Sunita Vikrant,
出版者:
Hershey, Pennsylvania : : IGI Global,, [2019]
面頁冊數:
1 online resource (xiii, 281 p.)
標題:
Penetration testing (Computer security)
標題:
Hacking - Prevention.
ISBN:
9781522576297 (e-book)
ISBN:
9781522576204 (hardback)
書目註:
Includes bibliographical references and index.
內容註:
Chapter 1. Why one should learn ethical hacking -- Chapter 2. Linux essentials before we start -- Chapter 3. Windows essentials before we start -- Chapter 4. Networking fundamentals -- Chapter 5. Reconnaissance phase -- Chapter 6. Scanning and enumeration phase -- Chapter 7. Gain and maintain access -- Chapter 8. Web server hacking -- Chapter 9. Wireless hacking -- Chapter 10. Miscellaneous tools.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7628-0
Constructing an ethical hacking knowledge base for threat awareness and prevention[electronic resource] /
Dhavale, Sunita Vikrant,
Constructing an ethical hacking knowledge base for threat awareness and prevention
[electronic resource] /by Sunita Vikrant Dhavale. - Hershey, Pennsylvania :IGI Global,[2019] - 1 online resource (xiii, 281 p.)
Includes bibliographical references and index.
Chapter 1. Why one should learn ethical hacking -- Chapter 2. Linux essentials before we start -- Chapter 3. Windows essentials before we start -- Chapter 4. Networking fundamentals -- Chapter 5. Reconnaissance phase -- Chapter 6. Scanning and enumeration phase -- Chapter 7. Gain and maintain access -- Chapter 8. Web server hacking -- Chapter 9. Wireless hacking -- Chapter 10. Miscellaneous tools.
Restricted to subscribers or individual electronic text purchasers.
ISBN: 9781522576297 (e-book)Subjects--Topical Terms:
554347
Penetration testing (Computer security)
LC Class. No.: QA76.9.A25 / D524 2019e
Dewey Class. No.: 005.8
Constructing an ethical hacking knowledge base for threat awareness and prevention[electronic resource] /
LDR
:01379nmm a2200265 a 4500
001
513174
003
IGIG
005
20191025153755.0
006
m o d
007
cr cn
008
210929s2019 pau fob 001 0 eng d
010
$z
2018031666
020
$a
9781522576297 (e-book)
020
$a
9781522576204 (hardback)
035
$a
(OCoLC)1076739315
035
$a
1081021262
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
D524 2019e
082
0 0
$a
005.8
$2
23
100
1
$a
Dhavale, Sunita Vikrant,
$e
author.
$3
690502
245
1 0
$a
Constructing an ethical hacking knowledge base for threat awareness and prevention
$h
[electronic resource] /
$c
by Sunita Vikrant Dhavale.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2019]
300
$a
1 online resource (xiii, 281 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Why one should learn ethical hacking -- Chapter 2. Linux essentials before we start -- Chapter 3. Windows essentials before we start -- Chapter 4. Networking fundamentals -- Chapter 5. Reconnaissance phase -- Chapter 6. Scanning and enumeration phase -- Chapter 7. Gain and maintain access -- Chapter 8. Web server hacking -- Chapter 9. Wireless hacking -- Chapter 10. Miscellaneous tools.
506
$a
Restricted to subscribers or individual electronic text purchasers.
650
0
$a
Penetration testing (Computer security)
$3
554347
650
0
$a
Hacking
$x
Prevention.
$3
734514
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7628-0
筆 0 讀者評論
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7628-0
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入