Over 80 recipes to effectively test your network and boost your career in security
Key Features
Book Description
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals.
This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional.
Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process.
What you will learn
Who this book is for:
If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Corey P. Schultz is a technologist focusing on security research, Internet of Things, and the impact of technology on education and learning. He has over 20 years of experience in the security industry doing security architecture, penetration testing, incident response, and forensic analysis. Corey is currently a technical solutions architect for Cisco Systems Global Security Sales Organization. He works on a daily basis with large environments on designing and architecting secure enterprise networks. You can also find Corey active on Twitter @cschultz0000, where you can also see his schedule of speaking engagements and appearances.
Bob Perciaccante is seasoned information security practitioner who has been in the security field for almost 20 years. Currently, he is a consulting systems engineer for Cisco Systems in Pennsylvania where he has worked for the last 10 years focusing on network and data security, network access control, and secure network architectures. His primary day-to-day responsibilities focus on designing secure network solutions for his customers and working to train customers and partners on security solution implementations and daily operations to get the most out of their infrastructure. When not involved in security activities, Bob enjoys eclectic hobbies such as working on cars, 3D printing, and camping. Collaborating with his Cisco peer, Corey P. Schultz, this book is his first security publication.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 9,56 expédition depuis Etats-Unis vers France
Destinations, frais et délaisEUR 6,96 expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : BooksRun, Philadelphia, PA, Etats-Unis
Paperback. Etat : Good. 2nd Revised edition. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. N° de réf. du vendeur 1784390305-11-1
Quantité disponible : 1 disponible(s)
Vendeur : ThriftBooks-Atlanta, AUSTELL, GA, Etats-Unis
Paperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.2. N° de réf. du vendeur G1784390305I3N00
Quantité disponible : 1 disponible(s)
Vendeur : Bookworm, Tewkesbury, Royaume-Uni
Soft cover. Etat : Fine. Etat de la jaquette : Fine. 2nd Edition. Fine condition copy (unread?) See photos. N° de réf. du vendeur 002510
Quantité disponible : 1 disponible(s)
Vendeur : Hanselled Books, Burntisland, FIFE, Royaume-Uni
Soft cover. Etat : Very Good. 2nd Edition. p/b 417 pages, condition is very good. N° de réf. du vendeur 072088
Quantité disponible : 1 disponible(s)
Vendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9781784390303
Quantité disponible : Plus de 20 disponibles
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9781784390303_new
Quantité disponible : Plus de 20 disponibles
Vendeur : Chiron Media, Wallingford, Royaume-Uni
PF. Etat : New. N° de réf. du vendeur 6666-IUK-9781784390303
Quantité disponible : 10 disponible(s)
Vendeur : Webster's Bookstore Cafe, Inc., State College, PA, Etats-Unis
Paperback. Etat : Very Good. Edge of front corner lightly creased/rolled. Corners lightly bumped. A clean and tight copy otherwise. N° de réf. du vendeur mon0000111466
Quantité disponible : 1 disponible(s)
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
Paperback or Softback. Etat : New. Kali Linux Cookbook - Second Edition: Effective penetration testing solutions 1.65. Book. N° de réf. du vendeur BBS-9781784390303
Quantité disponible : 5 disponible(s)
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
Paperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 526. N° de réf. du vendeur C9781784390303
Quantité disponible : Plus de 20 disponibles