Kali Linux cookbook effective penetration testing solutions
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hott...
Saved in:
| Main Authors: | Schultz, Corey P. (Author), Perciaccante, Bob (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Birmingham, U.K.
Packt Publishing Ltd.
2017
|
| Edition: | Second edition. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Learning Kali Linux security testing, penetration testing, and ethical hacking
by: Messier, Ric
Published: (2018)
by: Messier, Ric
Published: (2018)
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
Hacking with kali practical penetration testing techniques
by: Broad, James
Published: (2014)
by: Broad, James
Published: (2014)
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Computer security a comprehensive controls checklist
by: lh
Published: (1987)
by: lh
Published: (1987)
Metasploit bootcamp a fast-paced guide to enhance your pentesting skills
by: Jaswal, Nipun
Published: (2017)
by: Jaswal, Nipun
Published: (2017)
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
The antivirus hacker's handbook
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
Public-key cryphotography
by: Salomaa
Published: (1996)
by: Salomaa
Published: (1996)
Network security assessment know your network
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
Identity and access management business performance through connected intelligence
by: Osmanoglu, Ertem
Published: (2013)
by: Osmanoglu, Ertem
Published: (2013)
Digital identity management
Published: (2015)
Published: (2015)
Cryptography and security services mechanisms and applications
by: Mogollon, Manuel
Published: (2007)
by: Mogollon, Manuel
Published: (2007)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
Snort IDS and IPS toolkit
by: Beale, Jay, et al.
Published: (2007)
by: Beale, Jay, et al.
Published: (2007)
Malware analyst's cookbook and DVD tools and techniques for fighting malicious code
by: Ligh, Michael Hale, et al.
Published: (2011)
by: Ligh, Michael Hale, et al.
Published: (2011)
Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
by: Parasram, Shiva V. N.
Published: (2020)
by: Parasram, Shiva V. N.
Published: (2020)
Client - side attacks and defense
by: Shimonski, Robert
Published: (2012)
by: Shimonski, Robert
Published: (2012)
Multilevel modeling of secure systems in QoP-ML
by: Ksįeżopolski, Bogdan
Published: (2015)
by: Ksįeżopolski, Bogdan
Published: (2015)
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)
by: Thuraisingham, Bhavani, et al.
Published: (2018)
Hacking exposed Linux Linux security secrets & solutions
Published: (2008)
Published: (2008)
Practical intrusion analysis prevention and detection for the twenty-first century
by: Trost, Ryan
Published: (2010)
by: Trost, Ryan
Published: (2010)
AAA identity management security
by: Santuka, Vivek
Published: (2011)
by: Santuka, Vivek
Published: (2011)
The Hacker's handbook the strategy behind breaking into and defending networks
by: Young lhSusan
by: Young lhSusan
The hacker's handbook the strategy behind breaking into and defending network
by: Young 1968-
Published: (2004)
by: Young 1968-
Published: (2004)
Java cookbook solutions and examples for Java developers
by: Darwin, Ian F.
Published: (2014)
by: Darwin, Ian F.
Published: (2014)
Penetration testing essentials
by: Oriyano, Sean-Philip
Published: (2017)
by: Oriyano, Sean-Philip
Published: (2017)
Managing security with Snort and IDS tools
by: Cox, Kerry
Published: (2004)
by: Cox, Kerry
Published: (2004)
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
Identity and data security for web development best practices
by: LeBlanc, Jonathan, et al.
Published: (2016)
by: LeBlanc, Jonathan, et al.
Published: (2016)
Ninja hacking unconventional penetration testing tactics and techniques
by: Wilhelm, Thomas
Published: (2011)
by: Wilhelm, Thomas
Published: (2011)
Linux+ guide to linux certification
by: Eckert
Published: (2006)
by: Eckert
Published: (2006)
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen
by: Cobb lhStephen
Similar Items
-
Learning Kali Linux security testing, penetration testing, and ethical hacking
by: Messier, Ric
Published: (2018) -
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018) -
Hacking with kali practical penetration testing techniques
by: Broad, James
Published: (2014) -
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016) -
Innovative solutions for access control management
Published: (2016)


