LEADER 01021nam--2200373---450- 001 990003692980203316 005 20120928132450.0 010 $a978-88-8416-317-2 035 $a000369298 035 $aUSA01000369298 035 $a(ALEPH)000369298USA01 035 $a000369298 100 $a20120928d2012----km-y0itay50------ba 101 $aita 102 $aIT 105 $a||||||||001yy 200 1 $aDürer$emirabile incisore$fcon un testo di Erwin Panofsky 210 $aMilano$cAbscondita$d2012 215 $a303 p.$d30 cm 225 2 $aMnemosyne$v16 410 0$12001$aMnemosyne$v16 454 1$12001 600 1$aDürer,$bAlbrecht$2BNCF 676 $a759.3 702 1$aPANOFSKY,$bErwin 801 0$aIT$bsalbc$gISBD 912 $a990003692980203316 951 $aXII.2.B. 1740$b238105 L.M.$cXII.2.B.$d00316594 959 $aBK 969 $aUMA 979 $aALESSANDRA$b90$c20120928$lUSA01$h1317 979 $aALESSANDRA$b90$c20120928$lUSA01$h1324 996 $aDürer$91142009 997 $aUNISA LEADER 02618nam 22005175 450 001 9910254749303321 005 20200706232336.0 010 $a1-4842-1857-4 024 7 $a10.1007/978-1-4842-1857-0 035 $a(CKB)3710000000765484 035 $a(DE-He213)978-1-4842-1857-0 035 $a(MiAaPQ)EBC4603744 035 $a(PPN)194517357 035 $a(EXLCZ)993710000000765484 100 $a20160714d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPenetration Testing Basics$b[electronic resource] $eA Quick-Start Guide to Breaking into Systems /$fby Ric Messier 205 $a1st ed. 2016. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2016. 215 $a1 online resource (XV, 114 p. 41 illus., 34 illus. in color.) 300 $aIncludes index. 311 $a1-4842-1856-6 327 $a1. What Is Penetration Testing? -- 2. Digging for Information -- 3. What?s Open? -- 4. Vulnerabilities -- 5. Exploitation -- 6. Breaking Web Sites -- 7. Reporting. 330 $aPenetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes. 606 $aData protection 606 $aComputer programming 606 $aSoftware engineering 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 615 0$aData protection. 615 0$aComputer programming. 615 0$aSoftware engineering. 615 14$aSecurity. 615 24$aProgramming Techniques. 615 24$aSoftware Engineering. 676 $a005.11 700 $aMessier$b Ric$4aut$4http://id.loc.gov/vocabulary/relators/aut$0861748 906 $aBOOK 912 $a9910254749303321 996 $aPenetration Testing Basics$91923090 997 $aUNINA