The basics of hacking and penetration testing (Record no. 41430)

MARC details
000 -LEADER
fixed length control field 03656nam a2200613 i 4500
001 - CONTROL NUMBER
control field 686299
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230418192933.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr||||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130516s2013 ne a fs 001|0|eng|d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780124116412 (ebook)
035 ## - SYSTEM CONTROL NUMBER
System control number (StDuBDS)AH25541972
040 ## - CATALOGING SOURCE
Original cataloging agency StDuBDS
Language of cataloging eng
Transcribing agency StDuBDS
Modifying agency StDuBDSZ
Description conventions rda
Modifying agency UkPrAHLS
050 #0 -
-- QA76.9.A25
-- E5443 2013
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Source ukslc
072 #7 - SUBJECT CATEGORY CODE
Subject category code U
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code URH
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code U
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code URH
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UB
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UFL
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code KJ
Source thema
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Engebretson, Pat
Fuller form of name (Patrick Henry),
Dates associated with a name 1974-
Relator term author.
245 14 - TITLE STATEMENT
Title The basics of hacking and penetration testing
Remainder of title ethical hacking and penetration testing made easy /
Statement of responsibility, etc. Dr. Patrick Engebretson.
246 30 - VARYING FORM OF TITLE
Title proper/short title Hacking and penetration testing
250 ## - EDITION STATEMENT
Edition statement 2nd edition.
Remainder of edition statement David Kennedy, technical editor.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Amsterdam :
Name of producer, publisher, distributor, manufacturer Syngress,
Date of production, publication, distribution, manufacture, or copyright notice [2013]
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 204 pages :
Other physical details illustrations (black and white)
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
336 ## - CONTENT TYPE
Content type term still image
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
366 ## - TRADE AVAILABILITY INFORMATION
Detailed date of publication 20130912
500 ## - GENERAL NOTE
General note Previous edition: 2011.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 8# - SUMMARY, ETC.
Summary, etc. An introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilise and interpret the results of modern day hacking tools which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more.
Expansion of summary note The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in printed form ISBN 9780124116443
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction.
Agency responsible for reproduction Askews and Holts.
Note about reproduction Mode of access: World Wide Web.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer hackers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Testing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Prevention.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers and IT.
Source of heading or term ukslc
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computing & information technology
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer fraud & hacking
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology: general issues
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Enterprise software
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term thema
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Business & Management
Source of heading or term thema
655 #7 - INDEX TERM--GENRE/FORM
Source of term lcsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kennedy, David,
Relator term editor.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&isbn=9780124116412">http://www.vlebooks.com/vleweb/product/openreader?id=WestLondon&isbn=9780124116412</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Suppress in OPAC Do not suppress from OPAC
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
    Other/Generic Classification Scheme     Electronic publication Electronic publication 11/12/2018   23/04/2021 19/07/2021 E-book