Mastering Kali Linux for Advanced Penetration Testing - Second Edition

Mastering Kali Linux for Advanced Penetration Testing – Second Edition

By 作者: Vijay Kumar Velu

ISBN-10 书号: 1787120236
ISBN-13 书号: 9781787120235
Edition 版本: 2nd Revised edition
Release Finelybook 出版日期: 2017-09-06
pages 页数: 538

$49.99


Book Description to Finelybook sorting


Key Features

Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Book Description to Finelybook sorting

This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers. After learning the hands-on techniques to perform an effective and covert attack, specific routes to the target will be examined, including bypassing physical security. You will also get to grips with concepts such as social engineering, attacking wireless networks, web services, and remote access connections. Finally, you will focus on the most vulnerable part of the network-directly attacking the end user.
This book will provide all the practical knowledge needed to test your network’s security using a proven hacker’s methodology.
What you will learn
Select and configure the most effective tools from Kali Linux to test network security
Employ stealth to avoid detection in the network being tested
Recognize when stealthy attacks are being used against your network
Exploit networks and data systems using wired and wireless networks as well as web services
Identify and download valuable data from target systems
Maintain access to compromised systems
Use social engineering to compromise the weakest part of the network-the end users
Contents
Chapter 1. Getting Up and Running with Cassandra
Chapter 2. The First Table
Chapter 3. Organizing Related Data
Chapter 4. Beyond Key-Value Lookup
Chapter 5. Establishing Relationships
Chapter 6. Denormalizing Data for Maximum Performance
Chapter 7. Expanding Your Data Model
Chapter 8. Collections, Tuples, and User-Defined Types
Chapter 9. Aggregating Time-Series Data
Chapter 10. How Cassandra Distributes Data
Chapter 11. Cassandra Multi-Node Cluster
Chapter 12. Application Development Using the Java Driver
Chapter 13. Peeking under the Hood
Chapter 14. Authentication and Authorization

此资源下载价格为0.1积分,请先
下载前先升级VIP或点立即购买,即可获取下载地址

捐助 即送35积分点击了解一下
Mastering Kali Linux for Advanced Penetration Testing, 2nd Edition

发表评论

电子邮件地址不会被公开。 必填项已用*标注