• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Penetration testing with Raspberry Pi :

پدید آورنده

موضوع
Kali Linux.,Kali Linux.,Penetration testing (Computer security),Raspberry Pi (Computer),COMPUTERS-- Hardware-- General.,COMPUTERS-- Microprocessors.,COMPUTERS-- Security-- Networking.,Penetration testing (Computer security),Raspberry Pi (Computer)

رده
QA76
.
9
.
A25
M37
2016eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1787126234
(Number (ISBN
9781787126237
Erroneous ISBN
1787126137

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Penetration testing with Raspberry Pi :
General Material Designation
[Book]
Other Title Information
learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2.

EDITION STATEMENT

Edition Statement
Second edition /
Statement of Responsibility Relating to Edition
Michale McPhee, Jason Beltrame.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Birmingham :
Name of Publisher, Distributor, etc.
Packt,
Date of Publication, Distribution, etc.
November 2016.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (iv, 296 pages)

GENERAL NOTES

Text of Note
"Production reference: 1231116"--Title page verso.
Text of Note
Includes index.
Text of Note
Previous edition as: Penetration testing with paspberry Pi : construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi / Aamir Lakhani, Joseph Muniz. January 2015.

SUMMARY OR ABSTRACT

Text of Note
Annotation

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
MIL
Stock Number
974338

OTHER EDITION IN ANOTHER MEDIUM

International Standard Book Number
9781787126237

TITLE USED AS SUBJECT

Kali Linux.
Kali Linux.

TOPICAL NAME USED AS SUBJECT

Penetration testing (Computer security)
Raspberry Pi (Computer)
COMPUTERS-- Hardware-- General.
COMPUTERS-- Microprocessors.
COMPUTERS-- Security-- Networking.
Penetration testing (Computer security)
Raspberry Pi (Computer)

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
M37
2016eb

PERSONAL NAME - PRIMARY RESPONSIBILITY

McPhee, Michael

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Beltrame, Jason

ORIGINATING SOURCE

Date of Transaction
20200823055550.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival