krainaksiazek hacking basic security penetration testing and how to hack 20115131
- znaleziono 4 produkty w 3 sklepach
Basics of Hacking and Penetration Testing SYNGRESS MEDIA
Książki / Literatura obcojęzyczna
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.§Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. §Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. §Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.
Książki Obcojęzyczne>Angielskie>Computing & information technology>Computer security>Computer fraud & hacking
Serves As An Introduction To The Steps Required To Complete A Penetration Test Or Perform An Ethical Hack. This Title Helps You Learn How To Properly Utilize And Interpret The Results Of Modern Day Hacking Tools; Which Are Required To Complete A Penetration Test.
Penetration Testing with Kali SYNGRESS MEDIA
Książki / Literatura obcojęzyczna
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security. It provides detailed explanations of the complete penetration testing lifecycle. It features a complete linkage of the Kali information, resources and distribution downloads. It includes hands-on exercises reinforce topics.
Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice
Szukaj w sklepach lub całym serwisie
t1=0.043, t2=0, t3=0, t4=0.027, t=0.043