1.

Record Nr.

UNINA990006558780403321

Autore

Farr, James R.

Titolo

Hands of honor : artisans and their world in Dijon, 1550-1650 / James R. Farr

Pubbl/distr/stampa

Ithaca-London : Cornell University Press, 1988

Descrizione fisica

XVI, 298 p. ; 23 cm

Locazione

FSPBC

Collocazione

XI A 2144

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA990009739080403321

Autore

Mill, John Stuart

Titolo

A system of logic ratiocinative and inductive : being a connected view of the principles of evidence and the methods of scientific investigation : volume VIII / by John Stuart Mill

Pubbl/distr/stampa

Toronto ; London : University of Toronto press : Routledge & Kegan Paul, 1974

ISBN

0-8020-1875-0

Descrizione fisica

639-1251 p. ; 25 cm

Locazione

SES

Collocazione

A/7.0 MIL

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia



3.

Record Nr.

UNINA9910254749303321

Autore

Messier Ric

Titolo

Penetration Testing Basics [[electronic resource] ] : A Quick-Start Guide to Breaking into Systems / / by Ric Messier

Pubbl/distr/stampa

Berkeley, CA : , : Apress : , : Imprint : Apress, , 2016

ISBN

1-4842-1857-4

Edizione

[1st ed. 2016.]

Descrizione fisica

1 online resource (XV, 114 p. 41 illus., 34 illus. in color.)

Disciplina

005.11

Soggetti

Data protection

Computer programming

Software engineering

Security

Programming Techniques

Software Engineering

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

1. What Is Penetration Testing? -- 2. Digging for Information -- 3. What’s Open? -- 4. Vulnerabilities -- 5. Exploitation -- 6. Breaking Web Sites -- 7. Reporting.

Sommario/riassunto

Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.