LEADER 00792nam0-22002651i-450- 001 990004980970403321 005 19990530 035 $a000498097 035 $aFED01000498097 035 $a(Aleph)000498097FED01 035 $a000498097 100 $a19990530g19609999km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aPeriod of adjusment high point over a cavern$eA serius comedy$fby Tennessee Williams 210 $a[New York]$cA new directions book$dc1960. 215 $a120 p.$d21 cm 700 1$aWilliams,$bTennessee$0199944 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004980970403321 952 $aVX WI 20$bFil. Mod. s.i.$fFLFBC 959 $aFLFBC 996 $aPeriod of adjusment high point over a cavern$9526870 997 $aUNINA LEADER 01188nam 2200337Ka 450 001 9910698319303321 005 20080417152442.0 035 $a(CKB)4330000001903983 035 $a(OCoLC)225165779 035 $a(EXLCZ)994330000001903983 100 $a20080417d2006 ua 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aModel validation at the 204-MW New Mexico wind energy center$b[electronic resource] /$fE. Muljadi ... [and others] 210 1$aGolden, CO :$cNational Renewable Energy Laboratory,$d2006. 215 $a1 sheet $cdigital, PDF file 225 1 $aNREL/PO ;$v500-39771 300 $aTitle from title screen (viewed on Apr. 17, 2008). 517 3 $aModel validation at the two hundred four MW New Mexico wind energy center 606 $aWind power$zNew Mexico$xTesting 615 0$aWind power$xTesting. 701 $aMuljadi$b E$01384435 712 02$aNational Renewable Energy Laboratory (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910698319303321 996 $aModel validation at the 204-MW New Mexico wind energy center$93462481 997 $aUNINA LEADER 05337nam 2200817 a 450 001 9910955668403321 005 20200520144314.0 010 $a9786613775498 010 $a9781621989042 010 $a1621989046 010 $a9781281090133 010 $a1281090131 010 $a9781849517430 010 $a1849517436 035 $a(CKB)2670000000210878 035 $a(EBL)952079 035 $a(OCoLC)798535898 035 $a(SSID)ssj0000691416 035 $a(PQKBManifestationID)12257510 035 $a(PQKBTitleCode)TC0000691416 035 $a(PQKBWorkID)10628797 035 $a(PQKB)10370832 035 $a(Au-PeEL)EBL952079 035 $a(CaPaEBR)ebr10576350 035 $a(CaONFJC)MIL377549 035 $a(PPN)228009332 035 $a(OCoLC)812423802 035 $a(OCoLC)ocn812423802 035 $a(FR-PaCSA)88850752 035 $a(CaSebORM)9781849517423 035 $a(MiAaPQ)EBC952079 035 $a(FRCYB88850752)88850752 035 $a(DE-B1597)723078 035 $a(DE-B1597)9781849517430 035 $a(EXLCZ)992670000000210878 100 $a20120709d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMetasploit penetration testing cookbook $eover 70 recipes to master the most widely used penetration testing framework /$fAbhinav Singh 205 $a1st edition 210 $aBirmingham $cPackt Pub.$d2012 215 $a1 online resource (269 p.) 300 $a"Quick answers to common problems." 300 $aIncludes index. 311 08$a9781849517423 311 08$a1849517428 327 $aCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Metasploit Quick Tips for Security Professionals; Introduction; Configuring Metasploit on Windows; Configuring Metasploit on Ubuntu; Metasploit with BackTrack 5 - the ultimate combination; Setting up the penetration testing lab on a single machine; Setting up Metasploit on a virtual machine with SSH connectivity; Beginning with the interfaces - the ""Hello World"" of Metasploit; Setting up the database in Metasploit; Using the database to store penetration testing results 327 $aAnalyzing the stored results of the databaseChapter 2: Information Gathering and Scanning; Introduction; Passive information gathering 1.0 - the traditional way; Passive information gathering 2.0 - the next level; Port scanning - the Nmap way; Exploring auxiliary modules for scanning; Target service scanning with auxiliary modules; Vulnerability scanning with Nessus; Scanning with NeXpose; Sharing information with the Dradis framework; Chapter 3: Operating System-based Vulnerability Assessment and Exploitation; Introduction; Exploit usage quick tips 327 $aPenetration testing on a Windows XP SP2 machineBinding a shell to the target for remote access; Penetration testing on the Windows 2003 Server; Windows 7/Server 2008 R2 SMB client infinite loop; Exploiting a Linux (Ubuntu) machine; Understanding the Windows DLL injection flaws; Chapter 4: Client-side Exploitation and Antivirus Bypass; Introduction; Internet Explorer unsafe scripting misconfiguration vulnerability; Internet Explorer CSS recursive call memory corruption; Microsoft Word RTF stack buffer overflow; Adobe Reader util.printf() buffer overflow 327 $aGenerating binary and a shellcode from msfpayloadBypassing client-side antivirus protection using msfencode; Using the killav.rb script to disable antivirus programs; A Deeper look into the killav.rb script; Killing antivirus services from the command line; Chapter 5: Using Meterpreter to Explore the Compromised Target; Introduction; Analyzing meterpreter system commands; Privilege escalation and process migration; Setting multiple communication channels with the target; Meterpreter filesystem commands; Changing file attributes using timestomp; Using meterpreter networking commands 327 $aThe getdesktop and keystroke sniffingUsing a scraper meterpreter script; Chapter 6: Advanced Meterpreter Scripting; Introduction; Passing the hash; Setting up a persistent connection with backdoors; Pivoting with meterpreter; Port forwarding with meterpreter; Meterpreter API and mixins; Railgun -- converting Ruby into a weapon; Adding a DLL and function definition to Railgun; Building a ""Windows Firewall De-activator"" meterpreter script; Analyzing an existing meterpreter script; Chapter 7: Working with Modules for Penetration Testing; Introduction; Working with scanner auxiliary modules 327 $aWorking with auxiliary admin modules 330 $aOver 80 recipes to master the most widely used penetration testing framework 606 $aComputers$xAccess control 606 $aPenetration testing (Computer security) 606 $aComputer networks$xSecurity measures$xTesting 615 0$aComputers$xAccess control. 615 0$aPenetration testing (Computer security) 615 0$aComputer networks$xSecurity measures$xTesting. 676 $a005.8 700 $aSingh$b Abhinav$0788951 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910955668403321 996 $aMetasploit penetration testing cookbook$94336273 997 $aUNINA LEADER 03717nam 22007095 450 001 9910739478103321 005 20230820140343.0 010 $a9783031403958 010 $a3031403959 024 7 $a10.1007/978-3-031-40395-8 035 $a(MiAaPQ)EBC30716858 035 $a(Au-PeEL)EBL30716858 035 $a(DE-He213)978-3-031-40395-8 035 $a(PPN)272262358 035 $a(CKB)28008128400041 035 $a(OCoLC)1395011679 035 $a(EXLCZ)9928008128400041 100 $a20230820d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aScience, Engineering Management and Information Technology $eFirst International Conference, SEMIT 2022, Ankara, Turkey, February 2?3, 2022, Revised Selected Papers, Part I /$fedited by Abolfazl Mirzazadeh, Babek Erdebilli, Erfan Babaee Tirkolaee, Gerhard-Wilhelm Weber, Arpan Kumar Kar 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (410 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1808 311 08$aPrint version: Mirzazadeh, Abolfazl Science, Engineering Management and Information Technology Cham : Springer,c2023 9783031403941 327 $aApplication of Computer Science and Technology in Operations and Supply Chain Management -- Advances of Engineering Technology and Artificial Intelligence in Application Management -- Human Factors Management Systems based on Information Technology -- Technology-Aided Decision-Making: Systems, Applications, and Modern Solutions. 330 $aThis two-volume set constitutes selected papers presented during the First First International Conference on Science, Engineering Management and Information Technology, SEMIT 2022, held virtually in Ankara, Turkey, in February 2?3, 2022 and in September 8-9, 2022. The 37 papers presented were carefully reviewed and selected from the 261 qualified submissions. The papers are organized in the following topical sections: application of computer science and technology in operations and supply chain management; advances of engineering technology and Artificial Intelligence in application management; human factors management systems based on information technology; technology-aided decision-making: systems, applications, and modern solutions. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1808 606 $aArtificial intelligence 606 $aApplication software 606 $aComputer networks 606 $aComputer systems 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 606 $aComputer System Implementation 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aComputer networks. 615 0$aComputer systems. 615 14$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 676 $a004 676 $a004 700 $aMirzazadeh$b Abolfazl$01423713 701 $aErdebilli$b Babek$01423714 701 $aBabaee Tirkolaee$b Erfan$01423715 701 $aWeber$b Gerhard-Wilhelm$01368889 701 $aKar$b Arpan Kumar$01423716 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910739478103321 996 $aScience, Engineering Management and Information Technology$93552086 997 $aUNINA