Cargando…
Conducting network penetration and espionage in a global environment
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Taylor and Francis
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1706432 |
_version_ | 1780936502122905600 |
---|---|
author | Middleton, Bruce |
author_facet | Middleton, Bruce |
author_sort | Middleton, Bruce |
collection | CERN |
description | When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middleton's decades of experience wi |
id | cern-1706432 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Taylor and Francis |
record_format | invenio |
spelling | cern-17064322021-04-21T20:59:20Zhttp://cds.cern.ch/record/1706432engMiddleton, BruceConducting network penetration and espionage in a global environmentComputing and ComputersWhen it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middleton's decades of experience wiTaylor and Francisoai:cds.cern.ch:17064322014 |
spellingShingle | Computing and Computers Middleton, Bruce Conducting network penetration and espionage in a global environment |
title | Conducting network penetration and espionage in a global environment |
title_full | Conducting network penetration and espionage in a global environment |
title_fullStr | Conducting network penetration and espionage in a global environment |
title_full_unstemmed | Conducting network penetration and espionage in a global environment |
title_short | Conducting network penetration and espionage in a global environment |
title_sort | conducting network penetration and espionage in a global environment |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1706432 |
work_keys_str_mv | AT middletonbruce conductingnetworkpenetrationandespionageinaglobalenvironment |