|
|
|
|
LEADER |
00000nam a2200000 a 4500 |
003 |
AR-LpUFIB |
005 |
20250311170224.0 |
008 |
230201s2006 xxua o 000 0 eng d |
020 |
|
|
|a 1597490210
|
024 |
8 |
|
|a DIF-M1940
|b 2021
|z DIF001849
|
040 |
|
|
|a AR-LpUFIB
|b spa
|c AR-LpUFIB
|
100 |
1 |
|
|a Sin autor
|
245 |
1 |
0 |
|a Penetration tester's open source toolkit
|
260 |
|
|
|a Rockland :
|b [S.n.],
|c c2006
|
300 |
|
|
|a xxix, 704 p. : il. ;
|c 23 cm + 1 CD-ROM
|
500 |
|
|
|a "Foreword by Max Moser" -en cubierta. -- Incluye índice. --
|
505 |
0 |
|
|a Reconnaissance -- Enumeration and scanning -- Introduction to testing databases -- Web server & web application testing -- Wireless penetration testing using Auditor -- Network devices -- Writing open source security tools -- Nessus -- Coding for Nessus -- NASL extensions and custom tests -- Understanding the extended capabilities of the Nessus environment -- Extending Metasploit I -- Extending Metasploit II. -- Contenido del disco: Auditor Security Collection. -- Consulta URL: 16-02-07.
|
650 |
|
4 |
|a SEGURIDAD Y PROTECCIÓN
|
650 |
|
4 |
|a SEGURIDAD INFORMÁTICA
|
650 |
|
4 |
|a HERRAMIENTAS OPEN SOURCE
|
650 |
|
4 |
|a AUDITORÍA DE SISTEMAS
|
700 |
1 |
|
|a Foster, James C.
|
700 |
1 |
|
|a Bayles, Aaron W.
|
700 |
1 |
|
|a Long, Johnny
|
942 |
|
|
|c BK
|
952 |
|
|
|0 0
|1 0
|4 0
|6 C20_LON
|7 0
|9 75833
|a DIF
|b DIF
|d 2007-02-16
|i DIF-02768
|l 0
|o C.2.0 LON
|p DIF-02768
|r 2025-03-11 17:02:24
|w 2025-03-11
|x CD-351
|y BK
|
952 |
|
|
|0 0
|1 0
|4 0
|6 CD_351
|7 0
|9 75834
|a DIF
|b DIF
|d 2007-02-16
|i DIF-03604
|l 0
|o CD 351
|p DIF-03604
|r 2025-03-11 17:02:24
|w 2025-03-11
|y BK
|
952 |
|
|
|0 0
|1 0
|4 0
|7 3
|8 BD
|9 75835
|a DIF
|b DIF
|d 2025-03-11
|l 0
|r 2025-03-11 17:02:24
|u remote-exploit.org
|w 2025-03-11
|y BK
|
999 |
|
|
|c 51761
|d 51761
|