000758472 000__ 01593cam\a2200373Ma\4500 000758472 001__ 758472 000758472 005__ 20210515120136.0 000758472 006__ m\\\\\o\\d\\\\\\\\ 000758472 007__ cr\cn\nnnunnun 000758472 008__ 130603s2013\\\\ne\a\\\\ob\\\\001\0\eng\d 000758472 010__ $$z 2013017241 000758472 020__ $$z9780124116443 000758472 020__ $$a9780124116412$$q(electronic book) 000758472 035__ $$a(CaPaEBR)ebr10726038 000758472 035__ $$a(OCoLC)852159073 000758472 040__ $$aCaPaEBR$$cCaPaEBR 000758472 05014 $$aQA76.9.A25$$bE5443 2013eb 000758472 08204 $$a005.8$$223 000758472 1001_ $$aEngebretson, Pat$$q(Patrick Henry),$$d1974- 000758472 24514 $$aThe basics of hacking and penetration testing$$h[electronic resource] :$$bethical hacking and penetration testing made easy /$$cPatrick Engebretson ; David Kennedy, technical editor. 000758472 250__ $$a2nd ed. 000758472 260__ $$aAmsterdam :$$bSyngress, an imprint of Elsevier,$$c2013. 000758472 300__ $$axviii, 204 p. :$$bill. 000758472 504__ $$aIncludes bibliographical references and index. 000758472 5050_ $$aWhat is Penetration Testing? -- Reconnaissance -- Scanning -- Exploitation -- Web Based Exploitation -- Maintaining Access with Backdoors and Rootkits -- Wrapping Up the Penetration Test. 000758472 506__ $$aAccess limited to authorized users. 000758472 650_0 $$aPenetration testing (Computer security) 000758472 650_0 $$aComputer hackers. 000758472 650_0 $$aComputer software$$xTesting. 000758472 650_0 $$aComputer crimes$$xPrevention. 000758472 7001_ $$aKennedy, David. 000758472 852__ $$bebk 000758472 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10726038$$zOnline Access 000758472 909CO $$ooai:library.usi.edu:758472$$pGLOBAL_SET 000758472 980__ $$aEBOOK 000758472 980__ $$aBIB 000758472 982__ $$aEbook 000758472 983__ $$aOnline