Basic security testing with Kali Linux / (Record no. 342)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01948nam a2200277Ia 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OCoLC |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
| fixed length control field | t |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210220s2018 scua 001 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781725031982 |
| International Standard Book Number | 1725031981 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)1237875209 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | TULIB |
| Language of cataloging | eng |
| Transcribing agency | TULIB |
| 050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.9.A25 |
| Item number | D587 2018 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Dieterle, Daniel W. |
| 245 10 - TITLE STATEMENT | |
| Title | Basic security testing with Kali Linux / |
| Statement of responsibility, etc. | Daniel W. Dieterle. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | 3rd ed. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | [S.l. : |
| Name of publisher, distributor, etc. | s.n.], |
| Date of publication, distribution, etc. | c2018. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xv, 410 p. : |
| Other physical details | ill. |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Chapter 1 What is Kali Linux? -- Chapter 2 Installing Virtual Machines -- Chapter 3 Introduction to Kali Linux -- Chapter 4 Reconnaissance with Recon-NG -- Chapter 5 Shodan -- Chapter 6 Additional Recon Tools -- Chapter 7 Introduction to Metasploit -- Chapter 8 Meterpreter Shell -- Chapter 9 Metasploitable2 Tutorial - Part One -- Chapter 10 Metasploitable - Part Two: Scanners -- Chapter 11 Bypassing Anti-Virus -- Chapter 12 Windows Privilege Escalation by Bypassing UAC -- Chapter 13 Man-in-the-Middle Attacks -- Chapter 14 Man-in-the-Middle Framework & BeEF -- Chapter 15 Service Poisoning with Responder, Multi-Relay and MITMf -- Chapter 16 Social Engineering Introduction -- Chapter 17 Determining Hash Type & Cracking LM Passwords -- Chapter 18 Pass the Hash -- Chapter 19 Wordlists -- Chapter 20 John the Ripper & HashCat -- Chapter 21 Cracking Linux Password -- Chapter 22 Mimikatz-Plain Text Passwords -- Chapter 23 Keyscan, Lockout Keylogger, and Step Recorder -- Chapter 24 Wireless Network Attack -- Chapter 25 Fern WIFI Cracking & WiFite -- Chapter 26 Rough Wi-Fi Router Attacks with Mana -- Chapter 27 Raspberry Pi -- Chapter 28 Kali NetHunter -- Chapter 29 Network Defense and Conclusion. |
| 630 04 - SUBJECT ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | Linux. |
| 650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Penetration testing (Computer security) |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Library of Congress Classification |
| Koha item type | Books |
| Withdrawn status | Lost status | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Date acquired | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Punsarn Library | Punsarn Library | General Stacks | 17/06/2021 | QA76.9.A25 D587 2018 | PNLIB21060156 | 17/06/2021 | 17/06/2021 | Books |
