Whether you are a Kali Linux beginner or a professional, this book is for you. This book provides a thorough explanation of what Linux is. The explanation in the book starts with the emergence of Linux and how it was developed until the present day. The differences between Linux as it was then and Linux today are explained in detail.
The book progresses to how to use Kali Linux; the advanced aspects of Linux. Kali is loaded with advanced tools for penetration testing. Added to these tools are commands that help to make the penetration testing process very easy. Some of these commands include: pwd, whoami, cd, ls, help, locate, find, whereis, grep, cat, mkdir, cp, rm, rmdir, set, and echo. This book explains each of the tools listed above and many others. It also examines some basic processes that can help a hacker excel at his or her skills. Using Kali Linux is not only different from using other operating systems but also more advanced than most operating systems like Windows and Mac OS. This book examines the complexities of Kali Linux and provides shortcuts to some of the complexities. In this book, you will learn how to install Kali on your system and how to run Kali through a virtual machine. The knowledge of the virtual machine is such that running Kali Linux on the system poses no threat to running other operating systems.In addition, advanced hacking knowledge, like how to use the host file to direct traffic on your LAN and how you can use the SUID bit to gain access to malicious information like passwords at the etc/shadows, are also provided. With this book, you will learn how to cover your tracks using the rsyslog utility and how to connect and listen to wireless networks. You would also learn how to build your hacking devices, like cameras, for spying and password crackers. All of the provided information and instructions in the book are simple, thorough, and flexible. If you're interested in ethical hacking with Linux and are looking for tips and tricks to help you advance your skills, then this book is for you! Click the Buy Now button to get started.Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
EUR 6,98 expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : California Books, Miami, FL, Etats-Unis
Etat : New. N° de réf. du vendeur I-9781913842055
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
PAP. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur IQ-9781913842055
Quantité disponible : 15 disponible(s)
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
Paperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 218. N° de réf. du vendeur C9781913842055
Quantité disponible : Plus de 20 disponibles
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9781913842055_new
Quantité disponible : Plus de 20 disponibles
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
Paperback or Softback. Etat : New. Linux for Hackers: Tips and Tricks of Using Linux Theories for Hacking 0.48. Book. N° de réf. du vendeur BBS-9781913842055
Quantité disponible : 5 disponible(s)
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
PAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur IQ-9781913842055
Quantité disponible : 15 disponible(s)
Vendeur : Chiron Media, Wallingford, Royaume-Uni
PF. Etat : New. N° de réf. du vendeur 6666-IUK-9781913842055
Quantité disponible : 10 disponible(s)
Vendeur : moluna, Greven, Allemagne
Kartoniert / Broschiert. Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. KlappentextrnrnWhether you are a Kali Linux beginner or a professional, this book is for you. This book provides a thorough explanation of what Linux is. The explanation in the book starts with the emergence of Linux and how it was developed unt. N° de réf. du vendeur 448403741
Quantité disponible : Plus de 20 disponibles
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 156 pages. 9.02x5.98x0.33 inches. In Stock. N° de réf. du vendeur x-1913842053
Quantité disponible : 2 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Whether you are a Kali Linux beginner or a professional, this book is for you. This book provides a thorough explanation of what Linux is. The explanation in the book starts with the emergence of Linux and how it was developed until the present day. The differences between Linux as it was then and Linux today are explained in detail. The book progresses to how to use Kali Linux; the advanced aspects of Linux. Kali is loaded with advanced tools for penetration testing. Added to these tools are commands that help to make the penetration testing process very easy. Some of these commands include: pwd, whoami, cd, ls, help, locate, find, whereis, grep, cat, mkdir, cp, rm, rmdir, set, and echo. This book explains each of the tools listed above and many others. It also examines some basic processes that can help a hacker excel at his or her skills. Using Kali Linux is not only different from using other operating systems but also more advanced than most operating systems like Windows and Mac OS. This book examines the complexities of Kali Linux and provides shortcuts to some of the complexities. In this book, you will learn how to install Kali on your system and how to run Kali through a virtual machine. The knowledge of the virtual machine is such that running Kali Linux on the system poses no threat to running other operating systems.In addition, advanced hacking knowledge, like how to use the host file to direct traffic on your LAN and how you can use the SUID bit to gain access to malicious information like passwords at the etc/shadows, are also provided. With this book, you will learn how to cover your tracks using the rsyslog utility and how to connect and listen to wireless networks. You would also learn how to build your hacking devices, like cameras, for spying and password crackers. All of the provided information and instructions in the book are simple, thorough, and flexible. If you're interested in ethical hacking with Linux and are looking for tips and tricks to help you advance your skills, then this book is for you! Click the Buy Now button to get started. N° de réf. du vendeur 9781913842055
Quantité disponible : 1 disponible(s)