Электронная библиотека

ЭЛЕКТРОННАЯ БИБЛИОТЕКА






Добро пожаловать на сайт электронной библиотеки!
Здесь можно найти произведения русских и зарубежных авторов.
Скачать множество книг и журналов различных жанров и направлений.
Большой выбор художественной, бизнес, учебной и технической литературы.
Все представленные здесь книги и журналы имеют подробное описание и обложку.
Наша библиотека регулярно пополняется только новыми и интересными материалами!

«Подробнее о сайте»            «Правила сайта»            «Написать нам»            «Статьи»

Penetration Testing: A Hands-On Introduction to Hacking

Компьютерные >> Сетевые технологии





Разместил: ups1965

6-06-2014, 06:57

Просмотров: 496





Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.

Автор: Georgia Weidman
Название: Penetration Testing: A Hands-On Introduction to Hacking
Издательство: No Starch Press
Год: 2014
Формат: pdf
Язык: английский
Размер: 28,2 Мб










Похожие публикации

Python Penetration Testing Essentials Python Penetration Testing Essentials
If you are a Python programmer or a security researcher who has basic knowledge of Python programming and want to learn about penetration testing with the help of Python, this book is ideal for you. Even if you are new to the field of ethical

The Hacker's Guide to OS X: Exploiting OS X from the Root Up The Hacker's Guide to OS X: Exploiting OS X from the Root Up
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the

Modern Operating Systems Modern Operating Systems
The widely anticipated revision of this worldwide best-seller incorporates the latest developments in operating systems technologies. The Third Edition includes up-to-date materials on relevant operating systems such as Linux, Windows, and embedded

Android Hacker's Handbook Android Hacker's Handbook
The first comprehensive guide to discovering and preventing attacks on the Android OS. As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank

Wireless LAN Security and Penetration Testing Megaprimer Tutorials Training Wireless LAN Security and Penetration Testing Megaprimer Tutorials Training
Этот Megaprimer обеспечит высокотехническое и углубленное изучение WLAN безопасности и взлома.

Practical Lock Picking: A Physical Penetration Tester's Training Guide Practical Lock Picking: A Physical Penetration Tester's Training Guide
For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers.

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies
Cyber security, encompassing both information and network security, is of utmost importance in today's information age.

Electronic Postage Systems: Technology, Security, Economics Electronic Postage Systems: Technology, Security, Economics
This book offers the first comprehensive overview of contemporary systems for secure electronic/digital postage

Google Hacking for Penetration Testers Google Hacking for Penetration Testers
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice

Hacking Exposed Wireless, 2 Edition Hacking Exposed Wireless, 2 Edition
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition




Отзывы и Комментарии





Добавление комментария

Ваше Имя:
Ваш E-Mail:(необязательно)
  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent

Книги




Союз образовательных сайтов