Chargement en cours…

Ethical hacking : orchestrating attacks /

"Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an ant...

Description complète

Détails bibliographiques
Cote:Libro Electrónico
Autres auteurs: Gupta, Sunil (Intervenant)
Format: Électronique Vidéo
Langue:Inglés
Publié: [Place of publication not identified] : Apress, 2018.
Sujets:
Accès en ligne:Texto completo (Requiere registro previo con correo institucional)