Cargando…

Python penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation

Detalles Bibliográficos
Autor principal: Rehim, Rejah
Lenguaje:eng
Publicado: Packt Publishing 2017
Materias:
Acceso en línea:http://cds.cern.ch/record/2300532
_version_ 1780957127004651520
author Rehim, Rejah
author_facet Rehim, Rejah
author_sort Rehim, Rejah
collection CERN
id cern-2300532
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2017
publisher Packt Publishing
record_format invenio
spelling cern-23005322021-04-21T18:56:39Zhttp://cds.cern.ch/record/2300532engRehim, RejahPython penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitationComputing and ComputersPackt Publishingoai:cds.cern.ch:23005322017
spellingShingle Computing and Computers
Rehim, Rejah
Python penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
title Python penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
title_full Python penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
title_fullStr Python penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
title_full_unstemmed Python penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
title_short Python penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
title_sort python penetration testing cookbook: practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
topic Computing and Computers
url http://cds.cern.ch/record/2300532
work_keys_str_mv AT rehimrejah pythonpenetrationtestingcookbookpracticalrecipesonimplementinginformationgatheringnetworksecurityintrusiondetectionandpostexploitation