Cargando…

Conducting network penetration and espionage in a global environment

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer...

Descripción completa

Detalles Bibliográficos
Autor principal: Middleton, Bruce
Lenguaje:eng
Publicado: Taylor and Francis 2014
Materias:
Acceso en línea:http://cds.cern.ch/record/1706432
_version_ 1780936502122905600
author Middleton, Bruce
author_facet Middleton, Bruce
author_sort Middleton, Bruce
collection CERN
description When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middleton's decades of experience wi
id cern-1706432
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2014
publisher Taylor and Francis
record_format invenio
spelling cern-17064322021-04-21T20:59:20Zhttp://cds.cern.ch/record/1706432engMiddleton, BruceConducting network penetration and espionage in a global environmentComputing and ComputersWhen it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middleton's decades of experience wiTaylor and Francisoai:cds.cern.ch:17064322014
spellingShingle Computing and Computers
Middleton, Bruce
Conducting network penetration and espionage in a global environment
title Conducting network penetration and espionage in a global environment
title_full Conducting network penetration and espionage in a global environment
title_fullStr Conducting network penetration and espionage in a global environment
title_full_unstemmed Conducting network penetration and espionage in a global environment
title_short Conducting network penetration and espionage in a global environment
title_sort conducting network penetration and espionage in a global environment
topic Computing and Computers
url http://cds.cern.ch/record/1706432
work_keys_str_mv AT middletonbruce conductingnetworkpenetrationandespionageinaglobalenvironment