03720cam a2200397Ii 4500991003250019707536m d cr cn|||||||||070806s2006 maua s 001 0 eng d97815974902141597490210b13655450-39ule_inst114101:114194Elsevier Science & Technologyhttp://www.sciencedirect.comOPELSOPELSOPELSTEFA005.822Penetration tester's open source toolkit.[electronic resource] /Johnny Long ... [et al.] ; foreword by Max Moser.Pentester's open source toolkitRockland, MA :Syngress Publishing.,2006.xxix, 704 p. :ill. ;23 cm. +1 CD-ROM (4 3/4 in.)Includes index.Chapter 1. Know Your Target. Verify that the IP range or domain belongs to the correct target, perform basic reconnaissance and identify possible target user accounts. Chapter 2. Host Detection Chapter 3. Service Detection Chapter 4. Use port scan tool to enumerate open ports Chapter 5. Using "nmap" to perform a portscan Chapter 6. Using "scanrand" to perform a portscan Chapter 7. Results: List of open ports Chapter 8. Application Fingerprinting Chapter 9. Password Attacks Chapter 10. Exploiting Identified Vulnerabilities Chapter 11. Use exploit toolkits Chapter 12. Using "metasploit framework" to verify and exploit vulnerabilities. Chapter 13. "CGE" to exploit vulnerabilities in Cisco devices.Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools.Electronic reproduction.Amsterdam :Elsevier Science & Technology,2007.Mode of access: World Wide Web.System requirements: Web browser.Title from title screen (viewed on Aug. 2, 2007).Access may be restricted to users at subscribing institutions.Computer security.Computer networksSecurity measures.Electronic books.localLong, Johnny.authorhttp://id.loc.gov/vocabulary/relators/aut627580Original15974902109781597490214(OCoLC)62883800Referexhttp://www.sciencedirect.com/science/book/9781597490214An electronic book accessible through the World Wide Web; click for information.b1365545024-02-2224-01-08991003250019707536C0TEFPenetration tester's open source toolkit1463983UNISALENTOle02924-01-08mm -engmau0003174oam 2200673zu 450 991014013660332120250709215644.09782709917650270991765310.4000/books.irdeditions.8001(CKB)2560000000351864(SSID)ssj0001541924(PQKBManifestationID)11919730(PQKBTitleCode)TC0001541924(PQKBWorkID)11535379(PQKB)11224733(WaSeSS)IndRDA00046199(FrMaCLE)OB-irdeditions-8001(oapen)https://directory.doabooks.org/handle/20.500.12854/57491(PPN)267949138(FR-PaCSA)88876566(FRCYB88876566)88876566(oapen)doab57491(EXLCZ)99256000000035186420160829d2007 uy freur|||||||||||txtccrQuelles aires protégées pour l'Afrique de l'Ouest ? : conservation de la biodiversité et développementIRD Éditions2007[Place of publication not identified]IRD Éditions20071 online resource (606 pages)Colloques et séminairesBibliographic Level Mode of Issuance: Monograph9782709916349 2709916347 Concilier conservation dans les aires protégées et développement des populations locales exige une bonne connaissance de la dynamique des systèmes naturels et sociaux. Issu d’un séminaire interdisciplinaire qui a réuni les partenaires de 16 pays, en majorité africains, ce CD-ROM présente les données biologiques et sociales permettant de questionner les pratiques en cours dans les aires protégées d’Afrique de l’Ouest. Il s’adresse aux scientifiques, aux gestionnaires et aux décideurs. Reconciling conservation in protected areas and development for the local people requires a good knowledge of the dynamics of natural and social systems. The result of an interdisciplinary seminar which brought together participants of 16 countries, mostly African, this work presents biological and social data in support of a re-consideration of the practices in progress in the protected areas of West Africa. It is intended as much for scientists as for managers and decision-makers.Collection Colloques et séminaires.Earth & Environmental SciencesHILCCEcologyHILCCvégétationfaune sauvageprotection de l’écosystèmeenvironnementgestion de l’environnementressources naturellesEarth & Environmental SciencesEcologyBrice Sinsinauth1356901Sinsin BFournier AnneMensah Guy ApollinairePQKBBOOK9910140136603321Quelles aires protégées pour l'Afrique de l'Ouest ? : conservation de la biodiversité et développement3361994UNINA