gogogo

Penetration tester's open source toolkit (Record no. 30759)

MARC details
000 -LEADER
fixed length control field 03484nam a22003378a 4500
001 - CONTROL NUMBER
control field 7ocm33546833
003 - CONTROL NUMBER IDENTIFIER
control field IE-LiIT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20180131121642.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110620s2011 mau b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2011025807
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1597496278 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597496278 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Faircloth, Jeremy.
245 10 - TITLE STATEMENT
Title Penetration tester's open source toolkit
Medium [electronic book] /
Statement of responsibility, etc. Jeremy Faircloth.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Waltham, MA :
Name of publisher, distributor, etc. Syngress,
Date of publication, distribution, etc. c2011.
500 ## - GENERAL NOTE
General note Rev. ed. of: evaluating the security of a computer system or network by simulating an attack from a malicious source. 2007.
500 ## - GENERAL NOTE
General note Machine generated contents note: Introduction Chapter 1: Tools of the Trade Chapter 2: Reconnaissance Chapter 3: Scanning and Enumeration Chapter 4: Client-side Attacks and Human Weaknesses Chapter 5: Hacking Database Services Chapter 6: Web Server and Web Application Testing Chapter 7: Network Devices Chapter 8: Enterprise Application Testing Chapter 9: Wireless Penetration Testing Chapter 10: Building Pentration Test Labs.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it's often hard to ensure that you know what tools are available and which ones to use for a certain task. Through the next ten chapters, we'll be exploring the plethora of open source tools that are available to you as a penetration tester, how to use them, and in which situations they apply. Open source tools are pieces of software which are available with the source code so that the software can be modified and improved by other interested contributors. In most cases, this software comes with a license allowing for distribution of the modified software version with the requirement that the source code continue to be included with the distribution. In many cases, open source software becomes a community effort where dozens if not hundreds of people are actively contributing code and improvements to the software project. This type of project tends to result in a stronger and more valuable piece of software than what would often be developed by a single individual or small company. While commercial tools certainly exist in the penetration testing space, they're often expensive and, in some cases, too automated to be useful for all penetration testing scenarios. There are many common situations where the open source tools that we will be talking about fill a need better and (obviously) more cost effectively than any commercial tool. The tools that we will be discussing throughout this book are all open source and available for you to use in your work as a penetration tester"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers
General subdivision Access control.
9 (RLIN) 1985
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Testing.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Source of term local
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ScienceDirect (Online service)
730 0# - ADDED ENTRY--UNIFORM TITLE
Uniform title Penetration tester's open source toolkit.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www-sciencedirect-com.ezproxy.lit.ie/science/book/9781597496278">https://www-sciencedirect-com.ezproxy.lit.ie/science/book/9781597496278</a>
Link text ScienceDirect eBook
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
a 120815
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a .b11404863
b ebook
c ebook
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Suppress in OPAC 0
Source of classification or shelving scheme Dewey Decimal Classification
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Operator's initials, OID (RLIN) 0
Cataloger's initials, CIN (RLIN) 110711
First Date, FD (RLIN) m
Local @
-- -
-- 0

No items available.

Powered by Koha