01252nam2 2200325 450 00003312220130510103613.020130510d2007----km-y0itaa50------baitaITChimica. Scienze della terra[direttore scientifico Sandro Petruccioli]RomaIstituto della Enciclopedia Italiana2007XXII, 644 p.ill31 cm.0010000219062001Scienze e tecnica4.503(22. ed.)Scienze naturali e matematica. Dizionari, enciclopedie, concordanzePetruccioli,SandroITUniversità della Basilicata - B.I.A.REICATunimarc000033122Chimica. Scienze della terra99039UNIBASLETTERETTM3020120531BAS011507MDL0020121005BAS011008STD0820120121009BAS011218MDL0020130503BAS010929MDL3020130510BAS011036BATCH0020180801BAS011239BAS01BAS01BOOKBASA1Polo Storico-UmanisticoGENCollezione generaleSL/111859/francioso111859L1118592013051098Consultazioneall 000889802045oam 2200457Ia 450 991069730740332120081003162206.0(CKB)5470000002387863(OCoLC)75192087(EXLCZ)99547000000238786320061106d2006 ua 0engurmn|||||||||txtrdacontentcrdamediacrrdacarrierSources of water to wells in updip areas of the Wenonah-Mount Laurel aquifer, Gloucester and Camden Counties, New Jersey[electronic resource] /by Martha K. Watt and Lois M. Voronin ; prepared in cooperation with the New Jersey Department of Environmental ProtectionReston, Va. :U.S. Dept. of the Interior, U.S. Geological Survey,2006.vi, 34 pages digital, PDF fileScientific investigations report ;2005-5250Title from PDF title screen (viewed on Nov. 6, 2006).At head of title on HTML title screen: New Jersey Water Science Center.Includes bibliographical references (page 34).Groundwater flowNew JerseyGloucester CountyComputer simulationGroundwater flowNew JerseyCamden CountyComputer simulationWater withdrawalsEnvironmental aspectsNew JerseyDeptford RegionGroundwater flowComputer simulation.Groundwater flowComputer simulation.Water withdrawalsEnvironmental aspectsWatt Martha K1387556Voronin Lois M1394423New Jersey.Department of Environmental Protection.USGS New Jersey Water Science Center.Geological Survey (U.S.)GISGISGPOBOOK9910697307403321Sources of water to wells in updip areas of the Wenonah-Mount Laurel aquifer, Gloucester and Camden Counties, New Jersey3524576UNINA04119nam 2200625 450 991081114530332120200520144314.01-78216-317-4(CKB)2550000001120678(OCoLC)859388541(CaPaEBR)ebrary10772054(SSID)ssj0001140135(PQKBManifestationID)11748034(PQKBTitleCode)TC0001140135(PQKBWorkID)11221801(PQKB)10977374(Au-PeEL)EBL1420531(CaPaEBR)ebr10772054(CaONFJC)MIL523877(CaSebORM)9781782163169(MiAaPQ)EBC1420531(PPN)227992563(EXLCZ)99255000000112067820131029d2013 uy 0engurcnu||||||||txtccrWeb penetration testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux /Joseph Muniz, Aamir Lakhani1st editionBirmingham, England :Packt Publishing,2013.©20131 online resource (342 p.) "Community expertise distilled"--Cover.Includes index.1-78216-316-6 1-299-92626-6 Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit. Learn key reconnaissance concepts needed as a penetration tester Attack and exploit key features, authentication, and sessions on web applications Learn how to protect systems, write reports, and sell web penetration testing services In Detail Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications. "Web Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises. You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls. On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them.Computer networksSecurity measuresWeb sitesTestingWeb sitesEvaluationComputer networksSecurity measures.Web sitesTesting.Web sitesEvaluation.006.7Muniz Joseph1682814Lakhani Aamir1682815MiAaPQMiAaPQMiAaPQBOOK9910811145303321Web penetration testing with Kali Linux4053194UNINA