000 | 02000nkm a2200421Ia 4500 | ||
---|---|---|---|
001 | on1013545065 | ||
003 | OCoLC | ||
005 | 20180530132845.0 | ||
006 | m o c | ||
007 | cr cna|||||||| | ||
007 | vz czazuu | ||
008 | 171130s2017 xx 075 o vleng d | ||
035 | _a(OCoLC)1013545065 | ||
037 |
_aCL0500000916 _bSafari Books Online |
||
040 |
_aDLC _beng _cDLC _dSafari Books Online, LLC _dAU |
||
049 | _aAlfaisal Main Library | ||
050 | 4 | _aQA76.9.A25 | |
100 | 1 |
_aRussell, Chad, _eon-screen presenter. |
|
245 | 1 | 0 |
_aEthical hacking : _bhacking applications / _cChad Russell. |
246 | 3 | 0 | _aHacking applications |
264 | 1 |
_a[Place of publication not identified] : _bStone River eLearning, _c2017. |
|
300 |
_a1 online resource (1 streaming video file (1 hr., 14 min., 12 sec.)) : _bdigital, sound, color |
||
336 |
_atwo-dimensional moving image _btdi _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
337 |
_avideo _bv _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
511 | 0 | _aPresenter, Chad Russell. | |
500 | _aTitle from resource description page (Safari, viewed November 28, 2017). | ||
520 | _a"This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX."--Resource description page. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aHacking. | |
650 | 0 | _aPenetration testing (Computer security) | |
655 | 7 |
_aElectronic books. _2local |
|
710 | 2 | _aSafari eBooks. | |
856 | 4 | 0 | _uhttp://ezproxy.alfaisal.edu/login?url=http://academic.safaribooksonline.com/?uiCode=sdl&xmlId=100000006A0717 |
942 |
_2lcc _cEBOOKS |
||
994 |
_aC0 _bUMI |
||
260 | _c2017. | ||
999 |
_c549957 _d549957 |