BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 🔍
Ramachandran, Vivek
Packt Publishing Limited, Packt Publishing, Birmingham [U.K.], 2011
英语 [en] · MOBI · 7.7MB · 2011 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
描述
In Detail Wireless has become ubiquitous in today's world. The mobility and flexibility provided by it makes our lives more comfortable and productive. But this comes at a cost - Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of wireless networking tools used to simulate network attacks and detect security loopholes.
Backtrack 5 Wireless Penetration Testing Beginner's Guide will take you through the journey of becoming a Wireless hacker. You will learn various wireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advanced wireless attacks.
This book will take you through the basic concepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions in wireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey by conducting bleeding edge wireless attacks in your lab.
There are many interesting and new things that you will learn in this book - War Driving, WLAN packet sniffing, Network Scanning, Circumventing hidden SSIDs and MAC filters, bypassing Shared Authentication, Cracking WEP and WPA/WPA2 encryption, Access Point MAC spoofing, Rogue Devices, Evil Twins, Denial of Service attacks, Viral SSIDs, Honeypot and Hotspot attacks, Caffe Latte WEP Attack, Man-in-the-Middle attacks, Evading Wireless Intrusion Prevention systems and a bunch of other cutting edge wireless attacks.
If you were ever curious about what wireless security and hacking was all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker.
Hands-on practical guide with a step-by-step approach to help you get started immediately with Wireless Penetration Testing
Approach Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along.
Who this book is for If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.
Backtrack 5 Wireless Penetration Testing Beginner's Guide will take you through the journey of becoming a Wireless hacker. You will learn various wireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advanced wireless attacks.
This book will take you through the basic concepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions in wireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey by conducting bleeding edge wireless attacks in your lab.
There are many interesting and new things that you will learn in this book - War Driving, WLAN packet sniffing, Network Scanning, Circumventing hidden SSIDs and MAC filters, bypassing Shared Authentication, Cracking WEP and WPA/WPA2 encryption, Access Point MAC spoofing, Rogue Devices, Evil Twins, Denial of Service attacks, Viral SSIDs, Honeypot and Hotspot attacks, Caffe Latte WEP Attack, Man-in-the-Middle attacks, Evading Wireless Intrusion Prevention systems and a bunch of other cutting edge wireless attacks.
If you were ever curious about what wireless security and hacking was all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker.
Hands-on practical guide with a step-by-step approach to help you get started immediately with Wireless Penetration Testing
Approach Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks in your lab. Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along.
Who this book is for If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.
备用文件名
lgli/Z:\Bibliotik_\12\B\BackTrack_5_Wireless_Penetration_Testing_Beginners_Guide.mobi
备用文件名
lgrsnf/Z:\Bibliotik_\12\B\BackTrack_5_Wireless_Penetration_Testing_Beginners_Guide.mobi
备用文件名
nexusstc/Backtrack 5 wireless penetration testing: beginner's guide/9772f2807651af9410bfb5411da75805.mobi
备用文件名
zlib/Computers/Networking/Ramachandran, Vivek/Backtrack 5 wireless penetration testing: beginner's guide_5930678.mobi
备选标题
Safari books online
备选作者
Vivek Ramachandran
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
Birmingham, UK, United Kingdom, 2011
备用版本
1, 2011
元数据中的注释
lg2679444
元数据中的注释
{"isbns":["1849515581","9781849515580"],"last_page":220,"publisher":"Packt Publishing"}
元数据中的注释
"Learn by doing: less theory, more results"--Cover.
Includes index.
Description based on online resource; title from title page (Safari Books Online, viewed March 15, 2012).
Includes index.
Description based on online resource; title from title page (Safari Books Online, viewed March 15, 2012).
元数据中的注释
MiU
备用描述
Annotation Wireless has become ubiquitous in todays world. The mobility and flexibility provided by it makes our lives more comfortable and productive. But this comes at a cost Wireless technologies are inherently insecure and can be easily broken. BackTrack is a penetration testing and security auditing distribution that comes with a myriad of wireless networking tools used to simulate network attacks and detect security loopholes. Backtrack 5 Wireless Penetration Testing Beginners Guide will take you through the journey of becoming a Wireless hacker. You will learn various wireless testing methodologies taught using live examples, which you will implement throughout this book. The engaging practical sessions very gradually grow in complexity giving you enough time to ramp up before you get to advanced wireless attacks. This book will take you through the basic concepts in Wireless and creating a lab environment for your experiments to the business of different lab sessions in wireless security basics, slowly turn on the heat and move to more complicated scenarios, and finally end your journey by conducting bleeding edge wireless attacks in your lab. There are many interesting and new things that you will learn in this book War Driving, WLAN packet sniffing, Network Scanning, Circumventing hidden SSIDs and MAC filters, bypassing Shared Authentication, Cracking WEP and WPA/WPA2 encryption, Access Point MAC spoofing, Rogue Devices, Evil Twins, Denial of Service attacks, Viral SSIDs, Honeypot and Hotspot attacks, Caffe Latte WEP Attack, Man-in-the-Middle attacks, Evading Wireless Intrusion Prevention systems and a bunch of other cutting edge wireless attacks. If you were ever curious about what wireless security and hacking was all about, then this book will get you started by providing you with the knowledge and practical know-how to become a wireless hacker. Hands-on practical guide with a step-by-step approach to help you get started immediately with Wireless Penetration Testing
备用描述
Wireless lab setup -- WLAN and its inherent insecurities -- Bypassing WLAN authentication -- WLAN encryption flaws -- Attacks on the WLAN infrastructure -- Attacking the client -- Advanced WLAN attacks -- Attacking WPA-enterprise and RADIUS -- WLAN penetration testing methodology -- Appendix A: Conclusion and road ahead -- Appendix B: Pop quiz answers.;Annotation
备用描述
Master bleeding edge wireless testing techniques with BackTrack 5
开源日期
2020-07-26
ISBN-13978-1-283-30827-4
ISBN-13978-1-62198-900-4
ISBN-13978-1-84951-558-0
ISBN-13978-1-84951-559-7
ISBN-139786613308276
ISBN-101-283-30827-4
ISBN-101-62198-900-3
ISBN-101-84951-558-1
ISBN-101-84951-559-X
ISBN-106613308277
OCLC755791127
OCLC761692548
OCLC763159118
OCLC780488275
AacIdaacid__ebscohost_records__20240823T164204Z__KyeuFZ5nXZPNLYdxhkaV4R
AacIdaacid__goodreads_records__20240913T115838Z__12747005__dKAXRLv2sZe8iezta6LGF9
AacIdaacid__isbngrp_records__20240920T194930Z__Gboj65ZkSqq5F6hzzAcM5P
AacIdaacid__nexusstc_records__20240516T153213Z__Fiv6WGcWMuNYK8LVobh11o
AacIdaacid__upload_records_bibliotik__20240627T230308Z__8622800__W53hQBCsmCpHyEmtyQMcRS
AacIdaacid__worldcat__20250804T000000Z__5wef7278bMk7KseBdaCZjf
AacIdaacid__worldcat__20250804T000000Z__7dhKrxX6WFne4LmN9hnx4M
AacIdaacid__worldcat__20250804T000000Z__ARDnH4iQngZsc2LaySn2e2
AacIdaacid__worldcat__20250804T000000Z__DKLuLzyp4AzbfFNxUz8ZN7
AacIdaacid__worldcat__20250804T000000Z__GYWCCZUzyXqSZVY3G3DaR5
AacIdaacid__worldcat__20250804T000000Z__GZ2QnaAjZSPkp3t8deVxoT
AacIdaacid__worldcat__20250804T000000Z__PphrC8XPnJtneGzGpdQ3QQ
AacIdaacid__worldcat__20250804T000000Z__SzcDidSakKtXziUznDWuYd
AacIdaacid__worldcat__20250804T000000Z__UiRwC8LEBA7RhraM7xJdXW
AacIdaacid__worldcat__20250804T000000Z__Xgzcxy9jyaKSWoMwf2VwRF
AacIdaacid__worldcat__20250804T000000Z__e2neSY64qk4xZW5i2XnnXF
AacIdaacid__worldcat__20250804T000000Z__fWDb88JU8xfeNyjgv7NoVm
AacIdaacid__worldcat__20250804T000000Z__iyHQ4xywbRcvx36MxoTQKa
AacIdaacid__worldcat__20250804T000000Z__mHbGfLx5Ruq8Tq2dXTwAbG
AacIdaacid__zlib3_records__20240809T231509Z__5930678__9DPDyGPjLKMNyKjDTthXFK
AA Record IDmd5:9772f2807651af9410bfb5411da75805
Collectionlgli
Collectionlgrs
Collectionnexusstc
Collectionupload
Collectionzlib
Content Typebook_nonfiction
SHA-2568fe270f3
EBSCOhost eBook Index Source Scrape Date2024-08-23
File Exiftool Created Date2012-01-30
Goodreads Source Scrape Date2024-09-13
ISBNdb Scrape Date2022-09-01
ISBN GRP Source Scrape Date2024-09-20
Libgen.li Source Date2020-07-26
Libgen.rs Non-Fiction Date2020-07-26
Nexus/STC Source issued_at Date2011-01-01
Nexus/STC Source Updated Date2024-05-16
OCLC Scrape Date2025-01-01
OpenLib 'created' Date2014-07-28
Upload Collection Record Date2024-06-27
Z-Library Source Date2020-10-10
DDC005.8
EBSCOhost eBook Index Accession Number389270
EBSCOhost eBook Index Subjectbisac/COMPUTERS / Internet / Online Safety & Privacy
EBSCOhost eBook Index Subjectbisac/COMPUTERS / Security / General
EBSCOhost eBook Index Subjectbisac/COMPUTERS / Security / Network Security
EBSCOhost eBook Index Subjectunclass/Computer networks--Security measures--Testing
EBSCOhost eBook Index Subjectunclass/Computers--Access control
EBSCOhost eBook Index Subjectunclass/Penetration testing (Computer security)
Filepathlgli/Z:\Bibliotik_\12\B\BackTrack_5_Wireless_Penetration_Testing_Beginners_Guide.mobi
Filepathlgrsnf/Z:\Bibliotik_\12\B\BackTrack_5_Wireless_Penetration_Testing_Beginners_Guide.mobi
Filepathnexusstc/Backtrack 5 wireless penetration testing: beginner's guide/9772f2807651af9410bfb5411da75805.mobi
Filepathupload/bibliotik/B/BackTrack_5_Wireless_Penetration_Testing_Beginners_Guide.mobi
Filepathzlib/Computers/Networking/Ramachandran, Vivek/Backtrack 5 wireless penetration testing: beginner's guide_5930678.mobi
Filesize7703596
Goodreads12747005
IPFS CIDQmbEmQBHy5uApZB54iwR28mR1VAwqKnSTzSPfzCGWh415v
IPFS CIDbafykbzacebvjlqyiyelrqh6c3uw2ls6wctqudvxitoaegy5ftfasjmgjnlbvi
ISBN GRP ID453f8c3657d0994ed7dfc6f661abe3a1
Languageen
LCCQA76.9.A25
LCCQA76.9.A25 R36 2011eb
Libgen.li File93659472
Libgen.li libgen_id2679444
Libgen.rs Non-Fiction2702636
Libgen.rs Non-Fiction779234
Linkhttp://proxy.lib.umich.edu/login?url=http://proquest.safaribooksonline.com/9781849515580
MD59772f2807651af9410bfb5411da75805
Nexus/STC7hddxp0pv2phjbvwd7s5rne75
Nexus/STC TagAccess control
Nexus/STC TagComputer networks
Nexus/STC TagComputers
Nexus/STC TagPenetration testing (Computer security)
Nexus/STC TagSecurity measures
Nexus/STC TagTesting
Nexus/STC TagWireless Internet
OCLC Editions1
OCLC Editions (from search_holdings_summary_all_editions)1
OCLC 'From Filename'2023_04_v3/1084/1084812192
OCLC 'From Filename'2023_04_v3/4630/463010836
OCLC 'From Filename'2023_05_v4_type123/1273/1273525381
OCLC 'From Filename'2023_05_v4_type123/1436/143649933
OCLC 'From Filename'2023_05_v4_type123/4454/445484683
OCLC 'From Filename'2023_05_v4_type123/9768/976802359
OCLC 'From Filename'range_query/661330####
OCLC 'From Filename'range_query/6613308###
OCLC 'From Filename'range_query/6613308###____2
OCLC 'From Filename'range_query/6613308###____3
OCLC 'From Filename'range_query/backup_661330####____10
OCLC 'From Filename'range_query/backup_661330####____2
OCLC 'From Filename'range_query/backup_661330####____4
OCLC 'From Filename'range_query/backup_661330####____5
OCLC 'From Filename'range_query/backup_661330####____6
OCLC 'From Filename'range_query/backup_661330####____7
OCLC 'From Filename'range_query/backup_661330####____8
OCLC 'From Filename'range_query/backup_661330####____9
OCLC 'From Filename'search_editions_response/762003589
OCLC 'From Filename'search_holdings_summary_all_editions/755791127/index/26014569
OCLC 'From Filename'search_holdings_summary_all_editions/780488275/index/27165231
OCLC 'From Filename't123/3505/350581820
OCLC 'From Filename'w2/v6/1123/1123609157
OCLC 'From Filename'w2/v7/1078/1078552663
OCLC 'From Filename'w2/v7/1189/1189626452
OCLC 'From Filename'w2/v7/1235/1235150281
OCLC 'From Filename'w2/v7/3360/336054345
OCLC 'From Filename'w2/v7/4017/401720880
OCLC 'From Filename'w2/v7/4052/405245745
OCLC 'From Filename'w2/v7/4095/409542428
OCLC 'From Filename'w2/v7/5054/505470060
OCLC 'From Filename'w2/v7/5814/581414120
OCLC 'From Filename'w2/v7/6206/620641733
OCLC 'From Filename'w2/v7/6233/623364962
OCLC 'From Filename'w2/v7/6808/680813820
OCLC 'From Filename'w2/v7/8208/820875720
OCLC 'From Filename'w2/v7/8346/834660483
OCLC 'From Filename'w2/v7/8671/867168279
OCLC 'From Filename'worldcat_2022_09_titles_1_backup_2022_10_12/v3/0729/72930712
OCLC 'From Filename'worldcat_2022_09_titles_1_backup_2022_10_12/v3/0870/87097193
OCLC 'From Filename'worldcat_2022_09_titles_1_backup_2022_10_12/v3/1032/103237341
OCLC 'From Filename'worldcat_2022_09_titles_1_backup_2022_10_12/v3/1037/103775820
OCLC 'From Filename'worldcat_2022_09_titles_1_backup_2022_10_12/v3/1103/110395897
OCLC 'From Filename'worldcat_2022_09_titles_1_backup_2022_10_12/v6/6140/614029423
Open LibraryOL16929819W
Open LibraryOL25540665M
Open Library Source Recordbwb:9781849515580
Open Library Source Recordharvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:91791102:1257
Open Library Source Recordia:backtrackwireles00rama
Open Library Source Recordidb:9781849515580
Open Library Source Recordpromise:bwb_daily_pallets_2024-05-23:P9-CFM-390
Open Library SubjectAccess control
Open Library SubjectComputer networks
Open Library SubjectComputers
Open Library SubjectPenetration testing (Computer security)
Open Library SubjectSecurity measures
Open Library SubjectTesting
Open Library SubjectWireless Internet
Server Pathg4/libgenrs_nonfiction/libgenrs_nonfiction/2702000/9772f2807651af9410bfb5411da75805
SHA-1a2fc3ddf12189b5cab13c33072209b5f2db48036
SHA-25690da6a229f7114cc01f3a8404f75c676de7259d76c78539f8eb7961276f5b499
Torrentexternal/libgen_rs_non_fic/r_2702000.torrent
Year2011
Z-Library5930678
Zlib Category ID192
Zlib Category NameComputers/Networking
ISBN-13:
978-1-283-30827-4 / 9781283308274
ISBN-13:
978-1-62198-900-4 / 9781621989004
ISBN-13:
978-1-84951-558-0 / 9781849515580
ISBN-13:
978-1-84951-559-7 / 9781849515597
ISBN-13:
9786613308276
ISBN-10:
1-283-30827-4 / 1283308274
代码浏览器: 在代码浏览器中查看“isbn10:1283308274”
ISBN-10:
1-62198-900-3 / 1621989003
代码浏览器: 在代码浏览器中查看“isbn10:1621989003”
ISBN-10:
1-84951-558-1 / 1849515581
代码浏览器: 在代码浏览器中查看“isbn10:1849515581”
ISBN-10:
1-84951-559-X / 184951559X
代码浏览器: 在代码浏览器中查看“isbn10:184951559X”
ISBN-10:
6613308277
代码浏览器: 在代码浏览器中查看“isbn10:6613308277”
AacId:
aacid__ebscohost_records__20240823T164204Z__KyeuFZ5nXZPNLYdxhkaV4R
Anna’s Archive Container identifier.
AacId:
aacid__goodreads_records__20240913T115838Z__12747005__dKAXRLv2sZe8iezta6LGF9
Anna’s Archive Container identifier.
AacId:
aacid__isbngrp_records__20240920T194930Z__Gboj65ZkSqq5F6hzzAcM5P
Anna’s Archive Container identifier.
AacId:
aacid__nexusstc_records__20240516T153213Z__Fiv6WGcWMuNYK8LVobh11o
Anna’s Archive Container identifier.
AacId:
aacid__upload_records_bibliotik__20240627T230308Z__8622800__W53hQBCsmCpHyEmtyQMcRS
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__5wef7278bMk7KseBdaCZjf
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__7dhKrxX6WFne4LmN9hnx4M
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__ARDnH4iQngZsc2LaySn2e2
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__DKLuLzyp4AzbfFNxUz8ZN7
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__GYWCCZUzyXqSZVY3G3DaR5
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__GZ2QnaAjZSPkp3t8deVxoT
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__PphrC8XPnJtneGzGpdQ3QQ
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__SzcDidSakKtXziUznDWuYd
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__UiRwC8LEBA7RhraM7xJdXW
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__Xgzcxy9jyaKSWoMwf2VwRF
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__e2neSY64qk4xZW5i2XnnXF
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__fWDb88JU8xfeNyjgv7NoVm
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__iyHQ4xywbRcvx36MxoTQKa
Anna’s Archive Container identifier.
AacId:
aacid__worldcat__20250804T000000Z__mHbGfLx5Ruq8Tq2dXTwAbG
Anna’s Archive Container identifier.
AacId:
aacid__zlib3_records__20240809T231509Z__5930678__9DPDyGPjLKMNyKjDTthXFK
Anna’s Archive Container identifier.
AA Record ID:
md5:9772f2807651af9410bfb5411da75805
Anna’s Archive record ID.
Collection:
lgli
The collection on Anna’s Archive that provided data for this record.
URL: /datasets/lgli
网站: /datasets
代码浏览器: 在代码浏览器中查看“collection:lgli”
Collection:
lgrs
The collection on Anna’s Archive that provided data for this record.
URL: /datasets/lgrs
网站: /datasets
代码浏览器: 在代码浏览器中查看“collection:lgrs”
Collection:
nexusstc
The collection on Anna’s Archive that provided data for this record.
URL: /datasets/nexusstc
网站: /datasets
Collection:
upload
The collection on Anna’s Archive that provided data for this record.
URL: /datasets/upload
网站: /datasets
代码浏览器: 在代码浏览器中查看“collection:upload”
Collection:
zlib
The collection on Anna’s Archive that provided data for this record.
URL: /datasets/zlib
网站: /datasets
代码浏览器: 在代码浏览器中查看“collection:zlib”
Content Type:
book_nonfiction
Content type, determined by Anna’s Archive.
SHA-256:
8fe270f3
代码浏览器: 在代码浏览器中查看“crc32:8fe270f3”
EBSCOhost eBook Index Source Scrape Date:
2024-08-23
Date Anna’s Archive scraped the EBSCOhost metadata.
网站: /datasets/edsebk
File Exiftool Created Date:
2012-01-30
Date of creation from the file’s own metadata.
网站: /datasets/upload
Goodreads Source Scrape Date:
2024-09-13
Date Anna’s Archive scraped the Goodreads collection.
ISBNdb Scrape Date:
2022-09-01
The date that Anna’s Archive scraped this ISBNdb record.
网站: /datasets/isbndb
ISBN GRP Source Scrape Date:
2024-09-20
Date Anna’s Archive scraped the ISBN GRP collection.
Libgen.rs Non-Fiction Date:
2020-07-26
Date Libgen.rs Non_Fiction published this file.
网站: /datasets/lgrs
Nexus/STC Source issued_at Date:
2011-01-01
Date Nexus/STC reports in their issued_at field, which is the “issuing time of the item described by record.”
Nexus/STC Source Updated Date:
2024-05-16
Date Nexus/STC last updated this record.
OCLC Scrape Date:
2025-01-01
The date that Anna’s Archive scraped this OCLC/WorldCat record.
网站: /datasets/oclc
OpenLib 'created' Date:
2014-07-28
The 'created' metadata field on the Open Library, indicating when the first version of this record was created.
网站: /datasets/ol
Upload Collection Record Date:
2024-06-27
Date Anna’s Archive indexed this file in our 'upload' collection.
网站: /datasets/upload
EBSCOhost eBook Index Accession Number:
389270
ID in the EBSCOhost eBook Index (edsebk).
网站: /datasets/edsebk
代码浏览器: 在代码浏览器中查看“edsebk:389270”
EBSCOhost eBook Index Subject:
bisac/COMPUTERS / Internet / Online Safety & Privacy
Tag in EBSCOhost eBook Index.
网站: /datasets/edsebk
EBSCOhost eBook Index Subject:
bisac/COMPUTERS / Security / General
Tag in EBSCOhost eBook Index.
网站: /datasets/edsebk
EBSCOhost eBook Index Subject:
bisac/COMPUTERS / Security / Network Security
Tag in EBSCOhost eBook Index.
网站: /datasets/edsebk
EBSCOhost eBook Index Subject:
unclass/Computer networks--Security measures--Testing
Tag in EBSCOhost eBook Index.
网站: /datasets/edsebk
EBSCOhost eBook Index Subject:
unclass/Computers--Access control
Tag in EBSCOhost eBook Index.
网站: /datasets/edsebk
EBSCOhost eBook Index Subject:
unclass/Penetration testing (Computer security)
Tag in EBSCOhost eBook Index.
网站: /datasets/edsebk
Filepath:
lgli/Z:\Bibliotik_\12\B\BackTrack_5_Wireless_Penetration_Testing_Beginners_Guide.mobi
Browse collections using their original file paths (particularly 'upload' is interesting)
Filepath:
lgrsnf/Z:\Bibliotik_\12\B\BackTrack_5_Wireless_Penetration_Testing_Beginners_Guide.mobi
Browse collections using their original file paths (particularly 'upload' is interesting)
Filepath:
nexusstc/Backtrack 5 wireless penetration testing: beginner's guide/9772f2807651af9410bfb5411da75805.mobi
Browse collections using their original file paths (particularly 'upload' is interesting)
Filepath:
upload/bibliotik/B/BackTrack_5_Wireless_Penetration_Testing_Beginners_Guide.mobi
Browse collections using their original file paths (particularly 'upload' is interesting)
Filepath:
zlib/Computers/Networking/Ramachandran, Vivek/Backtrack 5 wireless penetration testing: beginner's guide_5930678.mobi
Browse collections using their original file paths (particularly 'upload' is interesting)
Filesize:
7703596
Filesize in bytes.
Goodreads:
12747005
Goodreads social cataloging site
IPFS CID:
QmbEmQBHy5uApZB54iwR28mR1VAwqKnSTzSPfzCGWh415v
Content Identifier (CID) of the InterPlanetary File System (IPFS).
IPFS CID:
bafykbzacebvjlqyiyelrqh6c3uw2ls6wctqudvxitoaegy5ftfasjmgjnlbvi
Content Identifier (CID) of the InterPlanetary File System (IPFS).
ISBN GRP ID:
453f8c3657d0994ed7dfc6f661abe3a1
ISBN GRP ID.
LCC:
QA76.9.A25 R36 2011eb
Library of Congress Classification
Libgen.li File:
93659472
Global file ID in Libgen.li. Directly taken from the 'f_id' field in the 'files' table.
网站: /datasets/lgli
代码浏览器: 在代码浏览器中查看“lgli:93659472”
Libgen.li libgen_id:
2679444
Repository ID for the 'libgen' repository in Libgen.li. Directly taken from the 'libgen_id' field in the 'files' table. Corresponds to the 'thousands folder' torrents.
网站: /datasets/lgli
Libgen.rs Non-Fiction:
2702636
Repository ID for the non-fiction ('libgen') repository in Libgen.rs. Directly taken from the 'id' field in the 'updated' table. Corresponds to the 'thousands folder' torrents.
网站: /datasets/lgrs
代码浏览器: 在代码浏览器中查看“lgrsnf:2702636”
Libgen.rs Non-Fiction:
779234
Repository ID for the non-fiction ('libgen') repository in Libgen.rs. Directly taken from the 'id' field in the 'updated' table. Corresponds to the 'thousands folder' torrents.
网站: /datasets/lgrs
代码浏览器: 在代码浏览器中查看“lgrsnf:779234”
Link:
http://proxy.lib.umich.edu/login?url=http://proquest.safaribooksonline.com/9781849515580
Arbitrary external link, optionally suffixed with a description (after ###).
MD5:
9772f2807651af9410bfb5411da75805
Nexus/STC:
7hddxp0pv2phjbvwd7s5rne75
ID of an individual edition of a file in Nexus/STC.
Nexus/STC Tag:
Access control
Tag in Nexus/STC.
Nexus/STC Tag:
Computer networks
Tag in Nexus/STC.
Nexus/STC Tag:
Computers
Tag in Nexus/STC.
Nexus/STC Tag:
Penetration testing (Computer security)
Tag in Nexus/STC.
Nexus/STC Tag:
Security measures
Tag in Nexus/STC.
Nexus/STC Tag:
Testing
Tag in Nexus/STC.
Nexus/STC Tag:
Wireless Internet
Tag in Nexus/STC.
OCLC Editions:
1
Number of editions (unique OCLC IDs) reported by OCLC/WorldCat metadata. 'many' means 20 or more.
网站: /datasets/oclc
代码浏览器: 在代码浏览器中查看“oclc_editions:1”
OCLC Editions (from search_holdings_summary_all_editions):
1
网站: /datasets/oclc
OCLC 'From Filename':
2023_04_v3/1084/1084812192
网站: /datasets/oclc
OCLC 'From Filename':
2023_04_v3/4630/463010836
网站: /datasets/oclc
OCLC 'From Filename':
2023_05_v4_type123/1273/1273525381
网站: /datasets/oclc
OCLC 'From Filename':
2023_05_v4_type123/1436/143649933
网站: /datasets/oclc
OCLC 'From Filename':
2023_05_v4_type123/4454/445484683
网站: /datasets/oclc
OCLC 'From Filename':
2023_05_v4_type123/9768/976802359
网站: /datasets/oclc
OCLC 'From Filename':
range_query/661330####
网站: /datasets/oclc
OCLC 'From Filename':
range_query/6613308###
网站: /datasets/oclc
OCLC 'From Filename':
range_query/6613308###____2
网站: /datasets/oclc
OCLC 'From Filename':
range_query/6613308###____3
网站: /datasets/oclc
OCLC 'From Filename':
range_query/backup_661330####____10
网站: /datasets/oclc
OCLC 'From Filename':
range_query/backup_661330####____2
网站: /datasets/oclc
OCLC 'From Filename':
range_query/backup_661330####____4
网站: /datasets/oclc
OCLC 'From Filename':
range_query/backup_661330####____5
网站: /datasets/oclc
OCLC 'From Filename':
range_query/backup_661330####____6
网站: /datasets/oclc
OCLC 'From Filename':
range_query/backup_661330####____7
网站: /datasets/oclc
OCLC 'From Filename':
range_query/backup_661330####____8
网站: /datasets/oclc
OCLC 'From Filename':
range_query/backup_661330####____9
网站: /datasets/oclc
OCLC 'From Filename':
search_editions_response/762003589
网站: /datasets/oclc
OCLC 'From Filename':
search_holdings_summary_all_editions/755791127/index/26014569
网站: /datasets/oclc
OCLC 'From Filename':
search_holdings_summary_all_editions/780488275/index/27165231
网站: /datasets/oclc
OCLC 'From Filename':
t123/3505/350581820
网站: /datasets/oclc
OCLC 'From Filename':
w2/v6/1123/1123609157
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/1078/1078552663
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/1189/1189626452
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/1235/1235150281
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/3360/336054345
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/4017/401720880
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/4052/405245745
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/4095/409542428
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/5054/505470060
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/5814/581414120
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/6206/620641733
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/6233/623364962
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/6808/680813820
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/8208/820875720
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/8346/834660483
网站: /datasets/oclc
OCLC 'From Filename':
w2/v7/8671/867168279
网站: /datasets/oclc
OCLC 'From Filename':
worldcat_2022_09_titles_1_backup_2022_10_12/v3/0729/72930712
网站: /datasets/oclc
OCLC 'From Filename':
worldcat_2022_09_titles_1_backup_2022_10_12/v3/0870/87097193
网站: /datasets/oclc
OCLC 'From Filename':
worldcat_2022_09_titles_1_backup_2022_10_12/v3/1032/103237341
网站: /datasets/oclc
OCLC 'From Filename':
worldcat_2022_09_titles_1_backup_2022_10_12/v3/1037/103775820
网站: /datasets/oclc
OCLC 'From Filename':
worldcat_2022_09_titles_1_backup_2022_10_12/v3/1103/110395897
网站: /datasets/oclc
OCLC 'From Filename':
worldcat_2022_09_titles_1_backup_2022_10_12/v6/6140/614029423
网站: /datasets/oclc
Open Library:
OL16929819W
代码浏览器: 在代码浏览器中查看“ol:OL16929819W”
Open Library:
OL25540665M
代码浏览器: 在代码浏览器中查看“ol:OL25540665M”
Open Library Source Record:
bwb:9781849515580
The code for a source record that Open Library imported from.
网站: /datasets/ol
Open Library Source Record:
harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:91791102:1257
The code for a source record that Open Library imported from.
网站: /datasets/ol
Open Library Source Record:
ia:backtrackwireles00rama
The code for a source record that Open Library imported from.
网站: /datasets/ol
Open Library Source Record:
idb:9781849515580
The code for a source record that Open Library imported from.
网站: /datasets/ol
Open Library Source Record:
promise:bwb_daily_pallets_2024-05-23:P9-CFM-390
The code for a source record that Open Library imported from.
网站: /datasets/ol
Server Path:
g4/libgenrs_nonfiction/libgenrs_nonfiction/2702000/9772f2807651af9410bfb5411da75805
Path on Anna’s Archive partner servers.
SHA-1:
a2fc3ddf12189b5cab13c33072209b5f2db48036
SHA-256:
90da6a229f7114cc01f3a8404f75c676de7259d76c78539f8eb7961276f5b499
Torrent:
external/libgen_rs_non_fic/r_2702000.torrent
Bulk torrent for long-term preservation.
网站: /torrents
Z-Library:
5930678
ID in Z-Library.
URL: https://z-lib.gd/
网站: /datasets/zlib
代码浏览器: 在代码浏览器中查看“zlib:5930678”
Zlib Category ID:
192
Category ID on the Z-Library website.
Zlib Category Name:
Computers/Networking
Name for the zlib_category_id (category ID on the Z-Library website).
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
今日下载剩余 XXXXXX 次。感谢您成为会员!❤️
你已经用完了今日的高速下载次数。
你最近下载过此文件。链接在一段时间内仍然有效。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
- Libgen.rs 非虚构文学板块
- Libgen.li (点击顶部的“GET”) 已知他们的广告包含恶意软件,因此请使用广告拦截器或不要点击广告
- Nexus/STC (Nexus/STC 文件下载可能不可靠)
- IPFS
- Z-Library
- Z-Library TOR (需要TOR浏览器)
- Z-Library
- Z-Library TOR (需要TOR浏览器)
- 批量种子下载 (仅限专家) 馆藏 “libgen_rs_non_fic” → 种子 “r_2702000.torrent” → file “9772f2807651af9410bfb5411da75805”
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.