Hacking with Kali: Practical Penetration Testing Techniques
Autor James Broad, Andrew Bindneren Limba Engleză Paperback – 3 dec 2013
Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.
This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
- Provides detailed explanations of the complete penetration testing lifecycle
- Complete linkage of the Kali information, resources and distribution downloads
- Hands-on exercises reinforce topics
Preț: 269.33 lei
Preț vechi: 336.65 lei
-20% Nou
Puncte Express: 404
Preț estimativ în valută:
51.55€ • 53.61$ • 43.20£
51.55€ • 53.61$ • 43.20£
Carte tipărită la comandă
Livrare economică 14-28 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780124077492
ISBN-10: 0124077498
Pagini: 238
Ilustrații: 20 illustrations
Dimensiuni: 152 x 229 x 13 mm
Greutate: 0.46 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0124077498
Pagini: 238
Ilustrații: 20 illustrations
Dimensiuni: 152 x 229 x 13 mm
Greutate: 0.46 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information Security professionals of all levels, hackers, systems administrators, network administrators, beginning and intermediate professional Pen Testers, and an academic audience among information security majors.Cuprins
Introduction
Getting and Running Kali
Hard Drive Installation
Thumb Drive Installation
SD Card Installation
Building a Custom Live CD
Updating Kali and Installing Additional Software
Configuring Network Devices
Configuring Servers and Services
Configuring and Accessing Internal and External Media
Introduction to the Pen Testing Life Cycle
Reconnaissance
Scanning
Exploitation
Maintaining Access
Getting and Running Kali
Hard Drive Installation
Thumb Drive Installation
SD Card Installation
Building a Custom Live CD
Updating Kali and Installing Additional Software
Configuring Network Devices
Configuring Servers and Services
Configuring and Accessing Internal and External Media
Introduction to the Pen Testing Life Cycle
Reconnaissance
Scanning
Exploitation
Maintaining Access