LEADER 04890nam 2200685 a 450 001 9910461757703321 005 20200520144314.0 010 $a1-283-37675-X 010 $a9786613376756 010 $a1-84951-395-3 035 $a(CKB)2670000000089229 035 $a(EBL)950518 035 $a(OCoLC)797916375 035 $a(SSID)ssj0000521050 035 $a(PQKBManifestationID)11361210 035 $a(PQKBTitleCode)TC0000521050 035 $a(PQKBWorkID)10517708 035 $a(PQKB)10028033 035 $a(MiAaPQ)EBC950518 035 $a(CaSebORM)9781849513944 035 $a(PPN)228036399 035 $a(Au-PeEL)EBL950518 035 $a(CaPaEBR)ebr10467620 035 $a(CaONFJC)MIL337675 035 $a(EXLCZ)992670000000089229 100 $a20110518d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBackTrack 4$b[electronic resource] $eassuring security by penetration testing : master the art of penetration testing with BackTrack /$fShakeel Ali, Tedi Heriyanto 205 $a1st edition 210 $aBirmingham, U.K. $cPackt Open Source$d2011 215 $a1 online resource (599 p.) 225 1 $aCommunity experience distilled 300 $aIncludes index. 311 $a1-84951-394-5 327 $aBackTrack 4: Assuring Security by Penetration Testing; BackTrack 4: Assuring Security by Penetration Testing; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; I. Lab Preparation and Testing Procedures; 1. Beginning with BackTrack; History; BackTrack purpose; Getting BackTrack; Using BackTrack; Live DVD 327 $aInstalling to hard diskInstallation in real machine; Installation in VirtualBox; Portable BackTrack; Configuring network connection; Ethernet setup; Wireless setup; Starting the network service; Updating BackTrack; Updating software applications; Updating the kernel; Installing additional weapons; Nessus vulnerability scanner; WebSecurify; Customizing BackTrack; Summary; 2. Penetration Testing Methodology; Types of penetration testing; Black-box testing; White-box testing; Vulnerability assessment versus penetration testing; Security testing methodologies 327 $aOpen Source Security Testing Methodology Manual (OSSTMM)Key features and benefits; Information Systems Security Assessment Framework (ISSAF); Key features and benefits; Open Web Application Security Project (OWASP) Top Ten; Key features and benefits; Web Application Security Consortium Threat Classification (WASC-TC); Key features and benefits; BackTrack testing methodology; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting 327 $aThe ethicsSummary; II. Penetration Testers Armory; 3. Target Scoping; Gathering client requirements; Customer requirements form; Deliverables assessment form; Preparing the test plan; Test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; 4. Information Gathering; Public resources; Document gathering; Metagoofil; DNS information; dnswalk; dnsenum; dnsmap; dnsmap-bulk; dnsrecon; fierce; Route information; 0trace; dmitry; itrace; tcpraceroute; tctrace; Utilizing search engines; goorecon; theharvester 327 $aAll-in-one intelligence gatheringMaltego; Documenting the information; Dradis; Summary; 5. Target Discovery; Introduction; Identifying the target machine; ping; arping; arping2; fping; genlist; hping2; hping3; lanmap; nbtscan; nping; onesixtyone; OS fingerprinting; p0f; xprobe2; Summary; 6. Enumerating Target; Port scanning; AutoScan; Netifera; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification; Nmap output options; Nmap timing options; Nmap scripting engine; Unicornscan; Zenmap; Service enumeration; Amap; Httprint; Httsquash 327 $aVPN enumeration 330 $aMaster the art of penetration testing with BackTrack 606 $aComputer networks$xSecurity measures 606 $aComputer security$xEvaluation 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security$xEvaluation. 676 $a005.8 700 $aAli$b Shakeel$01047928 701 $aHeriyanto$b Tedi$01047929 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910461757703321 996 $aBackTrack 4$92475850 997 $aUNINA LEADER 01963oam 2200625 450 001 9910717476903321 005 20220214173026.0 035 $a(CKB)4100000012063467 035 $a(OCoLC)1273935564 035 $a(EXLCZ)994100000012063467 100 $a20211008d2021 ua 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aFederal armed career criminals $eprevalence, patterns, and pathways 210 1$aWashington DC :$cUnited States Sentencing Commission,$d2021. 215 $a1 online resource (83 pages) $ccolor illustrations 300 $a"March 2021." 320 $aIncludes bibliographical references (page 75-82). 517 $aFederal Armed Career Criminals 606 $aFirearms and crime$zUnited States$vStatistics 606 $aCriminals$zUnited States 606 $aRecidivists$zUnited States 606 $aSentences (Criminal procedure)$zUnited States 606 $aCriminal statistics$zUnited States 606 $aCriminal statistics$2fast 606 $aCriminals$2fast 606 $aFirearms and crime$2fast 606 $aRecidivists$2fast 606 $aSentences (Criminal procedure)$2fast 607 $aUnited States$2fast 608 $aStatistics.$2fast 608 $aStatistics.$2lcgft 615 0$aFirearms and crime 615 0$aCriminals 615 0$aRecidivists 615 0$aSentences (Criminal procedure) 615 0$aCriminal statistics 615 7$aCriminal statistics. 615 7$aCriminals. 615 7$aFirearms and crime. 615 7$aRecidivists. 615 7$aSentences (Criminal procedure) 712 02$aUnited States Sentencing Commission, 801 0$bUCO 801 1$bUCO 801 2$bOCLCF 801 2$bUCO 801 2$bGPO 906 $aBOOK 912 $a9910717476903321 996 $aFederal armed career criminals$93464058 997 $aUNINA LEADER 04037oam 2200745I 450 001 9910783742603321 005 20230421043253.0 010 $a1-134-69506-3 010 $a0-203-26864-4 010 $a1-280-33436-3 010 $a0-203-01587-8 010 $a1-134-69507-1 010 $a9786610334360 024 7 $a10.4324/9780203015872 035 $a(CKB)1000000000247998 035 $a(EBL)169655 035 $a(OCoLC)277588680 035 $a(SSID)ssj0000107330 035 $a(PQKBManifestationID)11128728 035 $a(PQKBTitleCode)TC0000107330 035 $a(PQKBWorkID)10013375 035 $a(PQKB)10766019 035 $a(SSID)ssj0000277092 035 $a(PQKBManifestationID)11212956 035 $a(PQKBTitleCode)TC0000277092 035 $a(PQKBWorkID)10233265 035 $a(PQKB)11245314 035 $a(MiAaPQ)EBC169655 035 $a(Au-PeEL)EBL169655 035 $a(CaPaEBR)ebr10054831 035 $a(CaONFJC)MIL33436 035 $a(OCoLC)76898502 035 $a(EXLCZ)991000000000247998 100 $a20180331d1998 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAtmospheric processes and systems /$fRussell D. Thompson 210 1$aLondon ;$aNew York :$cRoutledge,$d1998. 215 $a1 online resource (217 p.) 225 1 $aRoutledge introductions to environment series 300 $aDescription based upon print version of record. 311 $a0-415-17146-6 311 $a0-415-17145-8 320 $aIncludes bibliographical references (p. [182]-183) and index. 327 $aBook Cover; Title; Contents; Series editors' preface; List of plates; List of figures; List of tables; List of boxes; List of case studies; Preface; Acknowledgements; Introduction to the Atmosphere; The composition of the atmosphere; The structure of the atmosphere; Radiative Fluxes and Energy Transfers in the Atmosphere and at the Earth's Surface; Radiative fluxes and radiation balance; Net radiation and energy transfers within the atmosphere and at the Earth's surface; Energy transfers within the troposphere and their influence on atmospheric stability tendencies; Atmospheric Water 327 $aEvaporation and evapotranspirationThe condensation process and condensation forms at or close to the Earth's surface: dew, hoar frost and fog; Condensation forms in the troposphere, away from the Earth's surface: clouds and precipitation; The Primary Atmospheric Circulation: Global Pressure and Winds at the Earth's Surface and within the Troposphere; The distribution of global surface pressure systems; Surface airflow; Upper troposphere pressure and wind systems; Secondary and Tertiary Circulations: Synoptic Situations and Local Airflows; Air masses and fronts; Weather disturbances 327 $aWeather disturbances of middle and high latitudesTropical weather disturbances; Tertiary circulations/local airflows; Glossary; References; Index 330 $aAtmospheric Processes and Systems presents a concise introduction to the atmosphere and the fundamentals of weather. Examining different aspects of the mass, energy and circulation systems in the atmosphere, this text provides detailed accounts of specific phenomena, including* the composition and structure of the atmosphere* energy transfers* the cycle of atmospheric water in terms of evaporation, condensation and precipitation* pressure and winds at the primary or global scale* secondary air masses and fronts* thermal differences and weather disturbances. 410 0$aRoutledge introductions to environment series. 606 $aAtmospheric physics 606 $aDynamic meteorology 615 0$aAtmospheric physics. 615 0$aDynamic meteorology. 676 $a551.5 700 $aThompson$b Russell D.$01552918 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910783742603321 996 $aAtmospheric processes and systems$93813071 997 $aUNINA