Penetration testing essentials.
IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. - Resumé vydavatel
Saved in:
| Main Author | |
|---|---|
| Format | Electronic eBook |
| Language | English |
| Published |
Hoboken, NJ :
Sybex,
2017.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781119235330 9781119323983 9781119235309 9781119419358 |
| Physical Description | 1 online resource |
Cover
| LEADER | 00000cam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 97044 | ||
| 003 | CZ-ZlUTB | ||
| 005 | 20251008101045.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 161125s2017 nju fof 000 0 eng d | ||
| 999 | |c 97044 |d 97044 | ||
| 020 | |a 9781119235330 |q (electronic bk.) | ||
| 020 | |a 9781119323983 |q (electronic bk.) | ||
| 020 | |z 9781119235309 | ||
| 020 | |a 9781119419358 |q (electronic bk.) | ||
| 035 | |a (OCoLC)964295404 |z (OCoLC)963932448 |z (OCoLC)965146834 |z (OCoLC)967317070 |z (OCoLC)968630982 |z (OCoLC)971032383 |z (OCoLC)971068062 |z (OCoLC)971219141 |z (OCoLC)976195802 |z (OCoLC)1043774895 |z (OCoLC)1044550279 |z (OCoLC)1045166140 |z (OCoLC)1051132549 |z (OCoLC)1062316653 |z (OCoLC)1088964316 |z (OCoLC)1118665599 | ||
| 040 | |a YDX |b eng |e pn |c YDX |d N$T |d EBLCP |d OCLCQ |d IDEBK |d IDB |d OCLCF |d OCLCO |d TEFOD |d OCLCQ |d UPM |d OCLCA |d MERUC |d OCLCQ |d LVT |d CUY |d ZCU |d ICG |d DKC |d OCLCQ |d N$T |d IUL |d UAB |d K6U |d DG1 |d OTZ |d LIV |d DEBSZ |d D6H |d VVB |d RRP |d CEF |d COO |d UKMGB |d WYU |d LOA |d U3W |d G3B |d CNCEN |d S8J |d COCUF |d CNNOR |d VT2 |d UKAHL |d GZM |d NLW |d OCLCQ |d BRF |d OCLCO | ||
| 072 | 7 | |a 004 |x Počítačová věda. Výpočetní technika. Informační technologie |2 Konspekt |9 23 | |
| 080 | |a 004.056.53 |2 MRF | ||
| 080 | |a 004.056.53 |2 MRF | ||
| 080 | |a 004.056.53-051 |2 MRF | ||
| 080 | |a 343.3/.7:004 |2 MRF | ||
| 080 | |a (0.034.2:08) |2 MRF | ||
| 080 | |a (035) |2 MRF | ||
| 100 | 1 | |a Oriyano, Sean-Philip. | |
| 245 | 1 | 0 | |a Penetration testing essentials. |
| 264 | 1 | |a Hoboken, NJ : |b Sybex, |c 2017. | |
| 300 | |a 1 online resource | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a počítač |b c |2 rdamedia | ||
| 338 | |a online zdroj |b cr |2 rdacarrier | ||
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. - Resumé vydavatel | ||
| 590 | |a John Wiley and Sons |b Wiley Online Library All Obooks | ||
| 650 | 0 | 7 | |a penetrační testy (počítačová bezpečnost) |2 czenas |7 ph888574 |
| 650 | 0 | 7 | |a hackeři |2 czenas |7 ph1066932 |
| 650 | 0 | 7 | |a hackování |2 czenas |7 ph138199 |
| 650 | 0 | 7 | |a počítačová kriminalita |2 czenas |7 ph124505 |
| 650 | 0 | 9 | |a penetration tests (computer security) |2 eczenas |
| 650 | 0 | 9 | |a hackers |2 eczenas |
| 650 | 0 | 9 | |a computer hacking |2 eczenas |
| 650 | 0 | 9 | |a computer crimes |2 eczenas |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 7 | |a příručky |7 fd133209 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 655 | 9 | |a handbooks and manuals |2 eczenas | |
| 776 | 0 | 8 | |i Print version: |z 9781119323983 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419358 |
| 942 | |2 udc | ||
| 992 | |c NTK-Wiley | ||
| 993 | |x NEPOSILAT |y EIZ | ||