Penetration testing with the Bash shell : : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / / Keith Makan.

Saved in:
Bibliographic Details
Superior document:Community Experience Distilled
VerfasserIn:
Place / Publishing House:Birmingham, England : : Packt Publishing Ltd,, 2014.
2014
Year of Publication:2014
Language:English
Series:Community experience distilled.
Online Access:
Physical Description:1 online resource (151 pages) :; illustrations (some color), tables.
Notes:Includes index.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5001688642
ctrlnum (MiAaPQ)5001688642
(Au-PeEL)EBL1688642
(CaPaEBR)ebr10875448
(CaONFJC)MIL613591
(OCoLC)881035340
collection bib_alma
record_format marc
spelling Makan, Keith, author.
Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / Keith Makan.
Birmingham, England : Packt Publishing Ltd, 2014.
2014
1 online resource (151 pages) : illustrations (some color), tables.
text rdacontent
computer rdamedia
online resource rdacarrier
Community Experience Distilled
Includes index.
Description based on online resource; title from PDF title page (ebrary, viewed June 4, 2014).
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Penetration testing (Computer security) Examinations.
User interfaces (Computer systems) Design.
Electronic books.
Print version: Makan, Keith. Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools. Birmingham, England : Packt Publishing Ltd, c2014 iii, 130 pages Community experience distilled. 9781849695107
ProQuest (Firm)
Community experience distilled.
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1688642 Click to View
language English
format eBook
author Makan, Keith,
spellingShingle Makan, Keith,
Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
Community Experience Distilled
author_facet Makan, Keith,
author_variant k m km
author_role VerfasserIn
author_sort Makan, Keith,
title Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
title_sub make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
title_full Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / Keith Makan.
title_fullStr Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / Keith Makan.
title_full_unstemmed Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools / Keith Makan.
title_auth Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
title_new Penetration testing with the Bash shell :
title_sort penetration testing with the bash shell : make the most of the bash shell and kali linux's command-line-based security assessment tools /
series Community Experience Distilled
series2 Community Experience Distilled
publisher Packt Publishing Ltd,
publishDate 2014
physical 1 online resource (151 pages) : illustrations (some color), tables.
isbn 9781849695114
9781849695107
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.59 M35 42014
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1688642
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8092
dewey-sort 15.8092
dewey-raw 005.8092
dewey-search 005.8092
oclc_num 881035340
work_keys_str_mv AT makankeith penetrationtestingwiththebashshellmakethemostofthebashshellandkalilinuxscommandlinebasedsecurityassessmenttools
status_str n
ids_txt_mv (MiAaPQ)5001688642
(Au-PeEL)EBL1688642
(CaPaEBR)ebr10875448
(CaONFJC)MIL613591
(OCoLC)881035340
hierarchy_parent_title Community Experience Distilled
is_hierarchy_title Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
container_title Community Experience Distilled
_version_ 1792330779819245568
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02075nam a2200445 i 4500</leader><controlfield tag="001">5001688642</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">140603t20142014enka o 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849695107</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849695114</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001688642</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1688642</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10875448</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL613591</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881035340</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.M35 2014</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8092</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Makan, Keith,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Penetration testing with the Bash shell :</subfield><subfield code="b">make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /</subfield><subfield code="c">Keith Makan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, England :</subfield><subfield code="b">Packt Publishing Ltd,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (151 pages) :</subfield><subfield code="b">illustrations (some color), tables.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community Experience Distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (ebrary, viewed June 4, 2014).</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="x">Examinations.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">User interfaces (Computer systems)</subfield><subfield code="x">Design.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Makan, Keith.</subfield><subfield code="t">Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools.</subfield><subfield code="d">Birmingham, England : Packt Publishing Ltd, c2014 </subfield><subfield code="h">iii, 130 pages </subfield><subfield code="k">Community experience distilled.</subfield><subfield code="z">9781849695107 </subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1688642</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>