000 04339cam a2200841 i 4500
001 ocn973882552
003 OCoLC
005 20240523125540.0
006 m o d
007 cr cnu|||unuuu
008 170227s2017 xx o 001 0 eng d
010 _a 2017931255
040 _aN$T
_beng
_erda
_epn
_cN$T
_dYDX
_dIDEBK
_dDG1
_dN$T
_dEBLCP
_dTEFOD
_dOCLCF
_dCOO
_dUMI
_dUPM
_dIDB
_dOTZ
_dLIV
_dK6U
_dUAB
_dOCLCQ
_dDEBSZ
_dOCLCQ
_dMERUC
_dDEBBG
_dD6H
_dOCLCQ
_dHCO
_dVVB
_dKSU
_dRRP
_dNLE
_dUKMGB
_dWYU
_dRECBK
_dLVT
_dCUY
_dLOA
_dU3W
_dZCU
_dG3B
_dCNCEN
_dS8J
_dICG
_dCOCUF
_dCNNOR
_dESU
_dVT2
_dDKC
_dAU@
_dOCLCQ
_dUKAHL
_dOCLCQ
_dBRF
_dOCLCO
_dOCLCQ
_dOCLCO
_dINARC
_dOCLCL
_dOCLCQ
015 _aGBB785048
_2bnb
016 7 _a018245543
_2Uk
019 _a984829416
_a1135207640
_a1228556204
_a1244447670
_a1249218642
_a1412394387
020 _a9781119367741
_q(electronic bk.)
020 _a1119367743
_q(electronic bk.)
020 _a9781119367710
_q(electronic bk.)
020 _a1119367719
_q(electronic bk.)
020 _a9781119367666
020 _a1119367662
020 _z9781119367680
020 _a1119367689
020 _a9781119367680
029 1 _aAU@
_b000059957371
029 1 _aCHBIS
_b011081521
029 1 _aCHNEW
_b000948327
029 1 _aCHVBK
_b483028010
029 1 _aDEBSZ
_b491139462
029 1 _aUKMGB
_b018245543
029 1 _aAU@
_b000066761653
029 1 _aAU@
_b000068767517
035 _a(OCoLC)973882552
_z(OCoLC)984829416
_z(OCoLC)1135207640
_z(OCoLC)1228556204
_z(OCoLC)1244447670
_z(OCoLC)1249218642
_z(OCoLC)1412394387
037 _a3F530514-2A70-4684-889E-8A5933139FA9
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aQA76.9.A25
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aAllsopp, Wil,
_eauthor.
245 1 0 _aAdvanced penetration testing :
_bhacking the world's most secure networks /
_cWil Allsopp.
264 1 _a[Place of publication not identified] :
_bWiley,
_c2017.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aMedical Records (In)security -- Stealing Research -- Twenty-First Century Heist -- Pharma Karma -- Guns and Ammo -- Criminal Intelligence -- War Games -- Hack Journalists -- Northern Exposure.
500 _aIncludes index.
588 0 _aOnline resource; title from title details screen (John Wiley, viewed March 8, 2017).
520 _aFeaturing techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. --
_cEdited summary from book.
504 _aIncludes bibliographical references at the end of each chapters and index.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aPenetration testing (Computer security)
650 0 _aComputer networks
_xSecurity measures.
650 6 _aTests d'intrusion.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aPenetration testing (Computer security)
_2fast
758 _ihas work:
_aAdvanced penetration testing (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGR9JcwJk7CDYj9VDwV7VC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aAllsopp, Wil.
_tAdvanced penetration testing : hacking the world's most secure networks.
_dIndianapolis, Indiana : Wiley, c2017
_hxxxiii, 248 pages
_z9781119367680
_w2017931255
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119367741
938 _aAskews and Holts Library Services
_bASKH
_nAH32562308
938 _aAskews and Holts Library Services
_bASKH
_nAH32485095
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00744110
938 _aProQuest Ebook Central
_bEBLB
_nEBL4813145
938 _aEBSCOhost
_bEBSC
_n1472836
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis37692808
938 _aYBP Library Services
_bYANK
_n13519045
938 _aYBP Library Services
_bYANK
_n13551578
938 _aInternet Archive
_bINAR
_nadvancedpenetrat0000alls
994 _a92
_bINLUM
999 _c12418
_d12418