ISBN
| 9781782163121 |
DDC
| 005.8 |
Tác giả CN
| Beggs, Robert W. |
Nhan đề
| Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / Robert W. Beggs |
Thông tin xuất bản
| Birmingham, UK : Packt Pub., 2014 |
Mô tả vật lý
| 356 pages. : illustrations ; cm. |
Tùng thư
| Community experience distilled |
Phụ chú
| Includes index |
Tóm tắt
| This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network—directly attacking the end user. |
Từ khóa tự do
| Internet general |
Từ khóa tự do
| Security general |
Từ khóa tự do
| Penetration testing (Computer security) |
Từ khóa tự do
| Computer networks security measures |
Khoa
| Khoa Công nghệ Thông tin |
Địa chỉ
| Thư Viện Đại học Nguyễn Tất Thành |
|
000
| 00000nam#a2200000u##4500 |
---|
001 | 51651 |
---|
002 | 1 |
---|
004 | 90867598-9F15-406F-A4F0-3C14EC4ECFB7 |
---|
005 | 202408011452 |
---|
008 | 240801s2014 xxk eng |
---|
009 | 1 0 |
---|
020 | |a9781782163121 |
---|
039 | |a20240801145216|bquyennt|c20240801095959|dquyennt|y20240801094518|zquyennt |
---|
040 | |aNTT |
---|
041 | |aeng |
---|
044 | |axxk |
---|
082 | |a005.8|bB416|223 |
---|
100 | |aBeggs, Robert W. |
---|
245 | |aMastering Kali Linux for advanced penetration testing : |ba practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / |cRobert W. Beggs |
---|
260 | |aBirmingham, UK : |bPackt Pub., |c2014 |
---|
300 | |a356 pages. : |billustrations ; |ccm. |
---|
490 | |aCommunity experience distilled |
---|
500 | |aIncludes index |
---|
520 | |aThis book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network—directly attacking the end user. |
---|
653 | |aInternet general |
---|
653 | |aSecurity general |
---|
653 | |aPenetration testing (Computer security) |
---|
653 | |aComputer networks security measures |
---|
690 | |aKhoa Công nghệ Thông tin |
---|
691 | |aMạng máy tính & truyền thông dữ liệu |
---|
852 | |aThư Viện Đại học Nguyễn Tất Thành |
---|
856 | 1|uhttp://elib.ntt.edu.vn/documentdata01/1 giaotrinh/000 tinhocthongtin/biasach_2024/51651_masteringkalithumbimage.jpg |
---|
890 | |a0|b0|c1|d0 |
---|
| |
Không tìm thấy biểu ghi nào
|
|
|
|