Basic Security Testing with Kali Linux

Basic Security Testing with Kali Linux pdf epub mobi txt 电子书 下载 2025

Daniel W. Dieterle has worked in the IT field for over 20 years. During this time he worked for a computer support company where he provided computer and network support for hundreds of companies across Upstate New York and throughout Northern Pennsylvania. He also worked in a Fortune 500 corporate data center, briefly worked at an Ivy League school’s computer support department and served as an executive at an electrical engineering company. For about the last 5 years Daniel has been completely focused on security. He created and authors the “CyberArms Computer Security Blog”, and his articles have been published in international security magazines, and referenced by both technical entities and the media. Daniel has assisted with numerous security training classes and technical training books mainly based on Backtrack and Kali Linux.

出版者:CreateSpace Independent Publishing Platform
作者:Daniel W. Dieterle
出品人:
页数:310
译者:
出版时间:2014-1-5
价格:USD 30.00
装帧:Paperback
isbn号码:9781494861278
丛书系列:
图书标签:
  • 计算机科学 
  • 计算机 
  • 编程 
  • 渗透测试 
  • Kali 
  • Hack 
  •  
想要找书就要到 图书目录大全
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.

Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.

In “Basic Security Testing with Kali Linux”, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.

This hands-on, step by step learning book covers topics like:

Kali Linux Introduction and Overview

Metasploit & Metasploitable 2 Tutorials

Information Gathering

A section on Shodan (the “Hacker’s Google”)

Exploiting Windows and Linux Systems

Escalating Privileges in Windows

Wireless (WiFi) Attacks

Social Engineering Attacks

Password Attacks

Kali on a Raspberry Pi

Securing your Network

Though no network can be completely “Hacker Proof”, knowing how an attacker works will help put you on the right track of better securing your network.

具体描述

读后感

评分

评分

评分

评分

评分

用户评价

评分

评分

评分

评分

评分

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有