<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>03428cam a2200397 a 4500</leader>
  <controlfield tag="001">1/38074</controlfield>
  <controlfield tag="008">090828s2006    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781597490214</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1597490210</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1423787625 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781423787624 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="z">1597490210</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="z">9780080489520</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">40703</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">NTG</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">NTG</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">COCUF</subfield>
   <subfield code="d">DKDLA</subfield>
   <subfield code="d">MERUC</subfield>
   <subfield code="d">CCO</subfield>
   <subfield code="d">E7B</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">N$T</subfield>
   <subfield code="d">YDXCP</subfield>
   <subfield code="d">B24X7</subfield>
   <subfield code="d">OPELS</subfield>
   <subfield code="d">FVL</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Penetration tester's open source toolkit</subfield>
   <subfield code="h">[electronic resource] /</subfield>
   <subfield code="c">Johnny Long ... [et al.].</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Rockland, Mass. :</subfield>
   <subfield code="b">Syngress Pub.,</subfield>
   <subfield code="c">c2006.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xxix, 704 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Title from title screen.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using &quot;nmap&quot; to perform a portscan Chapter 6. Using &quot;scanrand&quot; to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using &quot;metasploit framework&quot; to verify and exploit vulnerabilities. Chapter 13. &quot;CGE&quot; to exploit vulnerabilities in Cisco devices.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the &quot;Auditor Security Collection&quot;; a bootable Linux CD with over 300 of the most popular open source penetration testing tools.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computers</subfield>
   <subfield code="x">Access control.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Database security.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Web servers</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Open source software.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer hackers.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Electronic information resources</subfield>
   <subfield code="x">Access control.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Long, Johnny.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20100625</subfield>
   <subfield code="p">00b40703</subfield>
   <subfield code="q">00b40703</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781597490214</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/02/40703_9781597490214.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/02/40703_1597490210.jpg</subfield>
  </datafield>
 </record>
</collection>
