Network vulnerability assessment : identify security loopholes in your network's infrastructure /
Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Rahalkar, Sagar (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
2018.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Securing network infrastructure : discover practical network security with Nmap and Nessus 7 /
por: Jetty, Sairam, et al.
Publicado: (2019) -
Network security assessment : from vulnerability to patch /
por: Manzuik, Steve
Publicado: (2006) -
Inside network security assessment : guarding your IT infrastructure /
por: Gregg, Michael (Michael C.)
Publicado: (2005) -
Network security assessment : from vulnerability to patch /
por: Manzuik, Steve
Publicado: (2007) -
Network Security Assessment : From Vulnerability to Patch.
por: Manzuik, Steve
Publicado: (2006)