LEADER 02806nam 2200625 a 450 001 996426339303316 005 20200520144314.0 010 $a0-12-411641-8 035 $a(CKB)2670000000385989 035 $a(EBL)1249222 035 $a(OCoLC)854974406 035 $a(SSID)ssj0000915342 035 $a(PQKBManifestationID)11612247 035 $a(PQKBTitleCode)TC0000915342 035 $a(PQKBWorkID)10869267 035 $a(PQKB)10116037 035 $a(MiAaPQ)EBC1249222 035 $a(CaSebORM)9780124116443 035 $a(PPN)176638628 035 $a(Au-PeEL)EBL1249222 035 $a(CaPaEBR)ebr10726038 035 $a(CaONFJC)MIL501343 035 $a(EXLCZ)992670000000385989 100 $a20130603d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe basics of hacking and penetration testing$b[electronic resource] $eethical hacking and penetration testing made easy /$fPatrick Engebretson ; David Kennedy, technical editor 205 $a2nd ed. 210 $aAmsterdam $cSyngress, an imprint of Elsevier$d2013 215 $a1 online resource (223 p.) 300 $aDescription based upon print version of record. 311 $a0-12-411644-2 320 $aIncludes bibliographical references and index. 327 $aWhat is Penetration Testing? -- Reconnaissance -- Scanning -- Exploitation -- Web Based Exploitation -- Maintaining Access with Backdoors and Rootkits -- Wrapping Up the Penetration Test. 330 $aThe Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and 606 $aPenetration testing (Computer security) 606 $aComputer hackers 606 $aComputer software$xTesting 606 $aComputer crimes$xPrevention 608 $aElectronic books. 615 0$aPenetration testing (Computer security) 615 0$aComputer hackers. 615 0$aComputer software$xTesting. 615 0$aComputer crimes$xPrevention. 676 $a005.8 700 $aEngebretson$b Pat$g(Patrick Henry),$f1974-$0855967 701 $aKennedy$b David$0163908 801 0$bMiAaPQ 906 $aBOOK 912 $a996426339303316 996 $aThe basics of hacking and penetration testing$91911064 997 $aUNISA LEADER 02749nam 22005652 450 001 996248113203316 005 20221011235916.0 010 $a1-139-08572-7 010 $a0-511-61208-7 010 $a0-511-00771-X 024 7 $a2027/heb07651 035 $a(CKB)1000000000442641 035 1 $aMAHS97B824 035 1 $zDCLC9646053B 035 $a(MH)007298204-7 035 $a(SSID)ssj0000211211 035 $a(PQKBManifestationID)11189900 035 $a(PQKBTitleCode)TC0000211211 035 $a(PQKBWorkID)10311199 035 $a(PQKB)10996035 035 $a(UkCbUP)CR9780511612084 035 $a(dli)HEB07651 035 $a(MiU)MIU01000000000000007432757 035 $a(EXLCZ)991000000000442641 100 $a20090914d1997|||| uy| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNielsen, Symphony no. 5 /$fDavid Fanning$b[electronic resource] 210 1$aCambridge :$cCambridge University Press,$d1997. 215 $a1 online resource (viii, 127 pages) $cdigital, PDF file(s) 225 1 $aCambridge music handbooks 300 $aTitle from publisher's bibliographic system (viewed on 05 Oct 2015). 311 $a0-521-44632-5 311 $a0-521-44088-2 320 $aDiscography: p. 87-90. 320 $aIncludes bibliographical references (p. 117-121) and index. 330 $aAfter the death of Mahler in 1911 the great Austro-German symphonic line was carried on mainly in England, America, Scandinavia and Russia. The Fifth Symphony of Carl Nielsen, Denmark's greatest composer, was composed in 1921-2. David Fanning discusses its place within the symphonic tradition since Beethoven, revealing the personal background to the work and taking full account of the extensive Danish commentaries, including the composer's own, which are given in English for the first time. In an absorbing analysis of the music he lays bare the origins of its images of inertia, anxiety and collapse in Nielsen's tone poems and incidental music for the theatre. Insights are offered into the symphony's 'progressive tonality' and its relationship to traditional structural models. 410 0$aCambridge music handbooks. 676 $a784.2/184 700 $aFanning$b David$g(David J.),$01016627 801 0$bUkCbUP 801 1$bUkCbUP 906 $aBOOK 912 $a996248113203316 996 $aNielsen, Symphony no. 5$92379517 997 $aUNISA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress