Basic security testing with Kali Linux / (Record no. 342)

MARC details
000 -LEADER
fixed length control field 01948nam a2200277Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field t
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210220s2018 scua 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781725031982
International Standard Book Number 1725031981
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1237875209
040 ## - CATALOGING SOURCE
Original cataloging agency TULIB
Language of cataloging eng
Transcribing agency TULIB
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number D587 2018
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Dieterle, Daniel W.
245 10 - TITLE STATEMENT
Title Basic security testing with Kali Linux /
Statement of responsibility, etc. Daniel W. Dieterle.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. [S.l. :
Name of publisher, distributor, etc. s.n.],
Date of publication, distribution, etc. c2018.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 410 p. :
Other physical details ill.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 What is Kali Linux? -- Chapter 2 Installing Virtual Machines -- Chapter 3 Introduction to Kali Linux -- Chapter 4 Reconnaissance with Recon-NG -- Chapter 5 Shodan -- Chapter 6 Additional Recon Tools -- Chapter 7 Introduction to Metasploit -- Chapter 8 Meterpreter Shell -- Chapter 9 Metasploitable2 Tutorial - Part One -- Chapter 10 Metasploitable - Part Two: Scanners -- Chapter 11 Bypassing Anti-Virus -- Chapter 12 Windows Privilege Escalation by Bypassing UAC -- Chapter 13 Man-in-the-Middle Attacks -- Chapter 14 Man-in-the-Middle Framework & BeEF -- Chapter 15 Service Poisoning with Responder, Multi-Relay and MITMf -- Chapter 16 Social Engineering Introduction -- Chapter 17 Determining Hash Type & Cracking LM Passwords -- Chapter 18 Pass the Hash -- Chapter 19 Wordlists -- Chapter 20 John the Ripper & HashCat -- Chapter 21 Cracking Linux Password -- Chapter 22 Mimikatz-Plain Text Passwords -- Chapter 23 Keyscan, Lockout Keylogger, and Step Recorder -- Chapter 24 Wireless Network Attack -- Chapter 25 Fern WIFI Cracking & WiFite -- Chapter 26 Rough Wi-Fi Router Attacks with Mana -- Chapter 27 Raspberry Pi -- Chapter 28 Kali NetHunter -- Chapter 29 Network Defense and Conclusion.
630 04 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Linux.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Full call number Barcode Date last seen Price effective from Koha item type
        Punsarn Library Punsarn Library General Stacks 17/06/2021 QA76.9.A25 D587 2018 PNLIB21060156 17/06/2021 17/06/2021 Books