Cargando…

Mastering Kali Linux for Advanced Penetration Testing : Secure Your Network with Kali Linux 2019. 1 - the Ultimate White Hat Hackers' Toolkit.

A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers. This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Velu, Vijay Kumar
Otros Autores: Beggs, Robert
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2019.
Edición:3rd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_on1085179774
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 190209s2019 enk ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d TEFOD  |d CHVBK  |d OCLCO  |d TEFOD  |d OCLCF  |d UKMGB  |d YDX  |d OCLCQ  |d N$T  |d SFB  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO 
015 |a GBB978958  |2 bnb 
016 7 |a 019247281  |2 Uk 
019 |a 1084499206  |a 1084696396  |a 1151196213 
020 |a 1789340616 
020 |a 9781789340617  |q (electronic bk.) 
029 1 |a AU@  |b 000065066019 
029 1 |a CHNEW  |b 001040193 
029 1 |a CHVBK  |b 559038569 
029 1 |a UKMGB  |b 019247281 
029 1 |a AU@  |b 000065270638 
035 |a (OCoLC)1085179774  |z (OCoLC)1084499206  |z (OCoLC)1084696396  |z (OCoLC)1151196213 
037 |a 196694A5-A180-4C00-8951-E3E665EF6F6B  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b .V458 2019 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Velu, Vijay Kumar. 
245 1 0 |a Mastering Kali Linux for Advanced Penetration Testing :  |b Secure Your Network with Kali Linux 2019. 1 - the Ultimate White Hat Hackers' Toolkit. 
250 |a 3rd ed. 
260 |a Birmingham :  |b Packt Publishing Ltd,  |c 2019. 
300 |a 1 online resource (540 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
505 0 |a Goal-Based Penetration Testing with Kali Linux -- Open Source Intelligence and Passive Reconnaissance -- Active Reconnaissance of the External and Internal Networks -- Vulnerability Assessment -- Advanced Social Engineering and Physical Security -- Wireless Attacks -- Exploiting Web-Based Applications -- Client-Side Exploitation -- By-Passing Security Controls -- Exploitation -- Action on the Objective and Lateral Movement -- Privilege Escalation -- Command and Control -- Embedded and RFID Hacking. 
520 |a A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers. This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks. 
650 2 |a Computer Communication Networks 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs. 
650 7 |a Computer networks  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
700 1 |a Beggs, Robert. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2014794  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5662705 
938 |a EBSCOhost  |b EBSC  |n 2014794 
938 |a YBP Library Services  |b YANK  |n 16023604 
994 |a 92  |b IZTAP