thông tin biểu ghi
  • Giáo trình
  • Ký hiệu PL/XG: 005.8 B416
    Nhan đề: Mastering Kali Linux for advanced penetration testing :

ISBN 9781782163121
DDC 005.8
Tác giả CN Beggs, Robert W.
Nhan đề Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / Robert W. Beggs
Thông tin xuất bản Birmingham, UK : Packt Pub., 2014
Mô tả vật lý 356 pages. : illustrations ; cm.
Tùng thư Community experience distilled
Phụ chú Includes index
Tóm tắt This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network—directly attacking the end user.
Từ khóa tự do Internet general
Từ khóa tự do Security general
Từ khóa tự do Penetration testing (Computer security)
Từ khóa tự do Computer networks security measures
Khoa Khoa Công nghệ Thông tin
Địa chỉ Thư Viện Đại học Nguyễn Tất Thành
000 00000nam#a2200000u##4500
00151651
0021
00490867598-9F15-406F-A4F0-3C14EC4ECFB7
005202408011452
008240801s2014 xxk eng
0091 0
020 |a9781782163121
039|a20240801145216|bquyennt|c20240801095959|dquyennt|y20240801094518|zquyennt
040 |aNTT
041 |aeng
044 |axxk
082 |a005.8|bB416|223
100 |aBeggs, Robert W.
245 |aMastering Kali Linux for advanced penetration testing : |ba practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers / |cRobert W. Beggs
260 |aBirmingham, UK : |bPackt Pub., |c2014
300 |a356 pages. : |billustrations ; |ccm.
490 |aCommunity experience distilled
500 |aIncludes index
520 |aThis book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network—directly attacking the end user.
653 |aInternet general
653 |aSecurity general
653 |aPenetration testing (Computer security)
653 |aComputer networks security measures
690 |aKhoa Công nghệ Thông tin
691 |aMạng máy tính & truyền thông dữ liệu
852 |aThư Viện Đại học Nguyễn Tất Thành
8561|uhttp://elib.ntt.edu.vn/documentdata01/1 giaotrinh/000 tinhocthongtin/biasach_2024/51651_masteringkalithumbimage.jpg
890|a0|b0|c1|d0
Không tìm thấy biểu ghi nào