02583nam 2200661Ia 450 991045048260332120200520144314.01-281-03556-40-08-048952-4(CKB)1000000000246657(EBL)254834(OCoLC)437163444(SSID)ssj0000738042(PQKBManifestationID)11378496(PQKBTitleCode)TC0000738042(PQKBWorkID)10788302(PQKB)10546805(SSID)ssj0000219397(PQKBManifestationID)11186921(PQKBTitleCode)TC0000219397(PQKBWorkID)10228623(PQKB)10774358(MiAaPQ)EBC254834(Au-PeEL)EBL254834(CaPaEBR)ebr10110285(CaONFJC)MIL103556(OCoLC)935230497(EXLCZ)99100000000024665720060112d2006 uy 0engur|n|---|||||txtccrPenetration tester's open source toolkit[electronic resource] /Johnny Long ... [et al.] ; foreword by Max MoserRockland, MA Syngress Pub.20061 online resource (736 p.)Includes index.1-59749-021-0 Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader "inside their heads? to unravel the mysteries of thins like identifyComputer hackersComputer networksSecurity measuresComputer securityElectronic information resourcesAccess controlElectronic books.Computer hackers.Computer networksSecurity measures.Computer security.Electronic information resourcesAccess control.005.8Long Johnny627580MiAaPQMiAaPQMiAaPQBOOK9910450482603321Penetration tester's open source toolkit1463983UNINA