LEADER 02525nam 2200481 450 001 9910795006903321 005 20230105202155.0 010 $a3-657-78263-X 024 7 $a10.30965/9783657782635 035 $a(CKB)4920000000125914 035 $a(nllekb)BRILL9783657782635 035 $a(MiAaPQ)EBC6513946 035 $a(Au-PeEL)EBL6513946 035 $a(OCoLC)1243535922 035 $a(EXLCZ)994920000000125914 100 $a20220530d2015 uy 0 101 0 $ager 135 $aurun####uuuua 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $2rdacarrier 200 10$aHerbert Graf von Bismarck $eErinnerungen und Aufzeichnungen 1871-1895 /$fHerbert Bismarck, Winfried Baumgart and Mathias Friedel 210 1$aPaderborn, Germany :$cFerdinand Scho?ningh,$d[2015] 210 4$d©2015 215 $a1 online resource 300 $aSource materials. 311 $a3-506-78263-0 320 $aIncludes bibliographical references and index. 327 $tPreliminary Material /$rWinfried Baumgart -- Vorwort /$rWinfried Baumgart -- Einleitung /$rWinfried Baumgart -- Verzeichnis der weniger gebräuchlichen Abkürzungen /$rWinfried Baumgart -- Erinnerungen /$rWinfried Baumgart -- Die Deutsch-Russischen Beziehungen 1879?1887 /$rWinfried Baumgart -- Wilhelm II. 1884?1890 /$rWinfried Baumgart -- Wilhelm II. 1887?1889 /$rWinfried Baumgart -- Bismarcks Entlassung 1890 /$rWinfried Baumgart -- Die Deutsch-Russischen Beziehungen 1890?1895 /$rWinfried Baumgart -- Verzeichnis der gedruckten Quellen und der Literatur /$rWinfried Baumgart -- Register /$rWinfried Baumgart. 330 $aHerbert von Bismarck, von 1871 zwei Jahrzehnte lang engster Mitarbeiter seines Vaters, hat nach seiner Entlassung längere Aufzeichnungen über Kaiser Wilhelm II. und große Themen der deutschen Außenpolitik der 1880er Jahre verfasst. Er wollte sie für ein Erinnerungswerk verwerten, das er durch seinen frühen Tod nur für die Jahre 1871 bis 1886 fertigstellen konnte. Diese Erinnerungen und die Aufzeichnungen werden hier zusammengefügt veröffentlicht. 606 $aDiplomats$zGermany$vBiography 615 0$aDiplomats 676 $a943.083092 700 $aBismarck$b Herbert$cFu?rst von,$f1849-1904,$01475197 702 $aFriedel$b Mathias$f1973- 702 $aBaumgart$b Winfried 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910795006903321 996 $aHerbert Graf von Bismarck$93689326 997 $aUNINA LEADER 05499nam 2200697 450 001 9910824037803321 005 20211115232314.0 010 $a1-84951-949-8 035 $a(CKB)2550000001262795 035 $a(EBL)1572946 035 $a(SSID)ssj0001216393 035 $a(PQKBManifestationID)11817417 035 $a(PQKBTitleCode)TC0001216393 035 $a(PQKBWorkID)11197042 035 $a(PQKB)10854799 035 $a(Au-PeEL)EBL1572946 035 $a(CaPaEBR)ebr10859685 035 $a(CaONFJC)MIL589154 035 $a(OCoLC)879386170 035 $a(CaSebORM)9781849519489 035 $a(MiAaPQ)EBC1572946 035 $a(PPN)22802272X 035 $a(EXLCZ)992550000001262795 100 $a20140425d2014 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aKali Linux $eassuring security by penetration testing /$fLee Allen, Tedi Heriyanto, Shakeel Ali 205 $a2nd ed. 210 1$aBirmingham :$cPackt Publishing,$d2014. 215 $a1 online resource (454 p.) 225 1 $aCommunity experience distilled 300 $a"Master the art of penetration testing with Kali Linus." 311 $a1-84951-948-X 311 $a1-306-57903-1 320 $aIncludes bibliographical references and index. 327 $aTable of Contents; Preface; Part I: Lab Preparation and Testing Procedures; Chapter 1: Beginning with Kali Linux; A brief history of Kali Linux; Kali Linux tool categories; Downloading Kali Linux; Using Kali Linux; Running Kali using Live DVD; Installing on a hard disk; Installing Kali on a physical machine; Installing Kali on a virtual machine; Installing Kali on a USB disk; Configuring the virtual machine; VirtualBox guest additions; Setting up networking ; Setting up a wired connection; Setting up a wireless connection; Starting the network service; Configuring shared folders 327 $aSaving the guest machine stateExporting a virtual machine; Updating Kali Linux; Network services in Kali Linux; HTTP; MySQL; SSH; Installing a vulnerable server; Installing additional weapons; Installing the Nessus vulnerability scanner; Installing the Cisco password cracker; Summary; Chapter 2: Penetration Testing Methodology; Types of penetration testing; Black box testing; White box testing; Vulnerability assessment versus penetration testing; Security testing methodologies; Open Source Security Testing Methodology Manual (OSSTMM); Key features and benefits 327 $aInformation Systems Security Assessment Framework (ISSAF)Key features and benefits; Open Web Application Security Project (OWASP) ; Key features and benefits; Web Application Security Consortium Threat Classification (WASC-TC); Key features and benefits; Penetration Testing Execution Standard (PTES); Key features and benefits; General penetration testing framework; Target scoping; Information gathering; Target discovery; Enumerating target; Vulnerability mapping; Social engineering; Target exploitation; Privilege escalation; Maintaining access; Documentation and reporting; The ethics; Summary 327 $aPart II: Penetration Testers ArmoryChapter 3: Target Scoping; Gathering client requirements; Creating the customer requirements form; Deliverables assessment form; Preparing the test plan; Test plan checklist; Profiling test boundaries; Defining business objectives; Project management and scheduling; Summary; Chapter 4: Information Gathering; Using public resources; Querying the domain registration information; Analyzing the DNS records; host; dig; dnsenum; dnsdict6; fierce; DMitry; Maltego; Getting network routing information; tcptraceroute; tctrace; Utilizing the search engine; theharvester 327 $aMetagoofilSummary; Chapter 5: Target Discovery; Starting off with target discovery; Identifying the target machine; ping; arping; fping; hping3; nping; alive6; detect-new-ip6; passive_discovery6; nbtscan; OS fingerprinting; p0f; Nmap; Summary; Chapter 6: Enumerating Target; Introducing port scanning; Understanding the TCP/IP protocol; Understanding the TCP and UDP message format; Network scanner; Nmap; Nmap target specification; Nmap TCP scan options; Nmap UDP scan options; Nmap port specification; Nmap output options; Nmap timing options; Nmap useful options 327 $aNmap for scanning the IPv6 target 330 $aWritten as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you. 410 0$aCommunity experience distilled. 606 $aOperating systems (Computers) 606 $aOpen source software 615 0$aOperating systems (Computers) 615 0$aOpen source software. 676 $a005.8 700 $aAllen$b Lee$c(Information security specialist)$0944552 702 $aAli$b Shakeel 702 $aHeriyanto$b Tedi 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910824037803321 996 $aKali Linux$94016215 997 $aUNINA