Cargando…
Mastering Metasploit: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Packt Publ.
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1749272 |
_version_ | 1780943046110609408 |
---|---|
author | Jaswal, Nipun |
author_facet | Jaswal, Nipun |
author_sort | Jaswal, Nipun |
collection | CERN |
id | cern-1749272 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Packt Publ. |
record_format | invenio |
spelling | cern-17492722021-04-21T20:54:43Zhttp://cds.cern.ch/record/1749272engJaswal, NipunMastering Metasploit: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approachComputing and ComputersPackt Publ.oai:cds.cern.ch:17492722014 |
spellingShingle | Computing and Computers Jaswal, Nipun Mastering Metasploit: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach |
title | Mastering Metasploit: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach |
title_full | Mastering Metasploit: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach |
title_fullStr | Mastering Metasploit: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach |
title_full_unstemmed | Mastering Metasploit: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach |
title_short | Mastering Metasploit: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach |
title_sort | mastering metasploit: write and implement sophisticated attack vectors in metasploit using a completely hands-on approach |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1749272 |
work_keys_str_mv | AT jaswalnipun masteringmetasploitwriteandimplementsophisticatedattackvectorsinmetasploitusingacompletelyhandsonapproach |