ISBN 10: 1494861275 / ISBN 13: 9781494861278
Gebraucht / Anzahl: 0
Bei weiteren Verkäufern erhältlich
Alle  Exemplare dieses Buches anzeigen

Über dieses Buch

Leider ist dieses Exemplar nicht mehr verfügbar. Wir haben Ihnen weitere Exemplare dieses Titels unten aufgelistet.

Beschreibung:

This Book is in Good Condition. Clean Copy With Light Amount of Wear. 100% Guaranteed. Summary: With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do. In "Basic Security Testing with Kali Linux", you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system. This hands-on, step by step learning book covers topics like: Kali Linux Introduction and Overview Metasploit & Metasploitable 2 Tutorials Information Gathering A section on Shodan (the "Hacker's Google") Exploiting Windows and Linux Systems Escalating Privileges in Windows Wireless (WiFi) Attacks Social Engineering Attacks Password Attacks Kali on a Raspberry Pi Securing your Network Though no network can be completely "Hacker Proof", knowing how an attacker works will help put you on the right track of better securing your network. Buchnummer des Verkäufers

Über diesen Titel:

Bewertung (bereitgestellt von Goodreads):
3,95 durchschnittlich
(55 Bewertungen)

Inhaltsangabe:

(Updated 12/2014 - All reported issues have been corrected including print issues, spelling issues & typos; also Veil install has been updated.)

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.

Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.

In ?Basic Security Testing with Kali Linux?, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.

This hands-on, step by step learning book covers topics like:

  • Kali Linux Introduction and Overview
  • Metasploit & Metasploitable 2 Tutorials
  • Information Gathering
  • A section on Shodan (the ?Hacker?s Google?)
  • Exploiting Windows and Linux Systems
  • Escalating Privileges in Windows
  • Wireless (WiFi) Attacks
  • Social Engineering Attacks
  • Password Attacks
  • Kali on a Raspberry Pi
  • Securing your Network
Though no network can be completely ?Hacker Proof?, knowing how an attacker works will help put you on the right track of better securing your network.

Inhaltsangabe:

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.

Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.

In ?Basic Security Testing with Kali Linux?, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.

This hands-on, step by step learning book covers topics like:

  • Kali Linux Introduction and Overview
  • Metasploit & Metasploitable 2 Tutorials
  • Information Gathering
  • A section on Shodan (the ?Hacker?s Google?)
  • Exploiting Windows and Linux Systems
  • Escalating Privileges in Windows
  • Wireless (WiFi) Attacks
  • Social Engineering Attacks
  • Password Attacks
  • Kali on a Raspberry Pi
  • Securing your Network
Though no network can be completely ?Hacker Proof?, knowing how an attacker works will help put you on the right track of better securing your network.

(Updated 12/2014 - All reported issues have been corrected including print issues, spelling issues & typos; also Veil install has been updated.)

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

Bibliografische Details

Zustand: Used

Beste Suchergebnisse bei AbeBooks

1.

Dieterle, Daniel W.
Verlag: CreateSpace Independent Publishing Platform
ISBN 10: 1494861275 ISBN 13: 9781494861278
Gebraucht Anzahl: 1
Anbieter
Goodwill Discount Books
(North Las Vegas, NV, USA)
Bewertung
[?]

Buchbeschreibung CreateSpace Independent Publishing Platform. Buchzustand: Good. Good shape, medium wear. shows little to no wear. Unless otherwise noted any CDs are not included. Buchnummer des Verkäufers 20-B-005147

Weitere Informationen zu diesem Verkäufer | Frage an den Anbieter

Gebraucht kaufen
EUR 17,02
Währung umrechnen

In den Warenkorb

Versand: EUR 3,55
Innerhalb USA
Versandziele, Kosten & Dauer

2.

Dieterle, Daniel W.
ISBN 10: 1494861275 ISBN 13: 9781494861278
Gebraucht Anzahl: 2
Anbieter
medimops
(Berlin, Deutschland)
Bewertung
[?]

Buchbeschreibung Buchzustand: very good. 676 Gramm. Buchnummer des Verkäufers M01494861275-V

Weitere Informationen zu diesem Verkäufer | Frage an den Anbieter

Gebraucht kaufen
EUR 73,99
Währung umrechnen

In den Warenkorb

Versand: EUR 8,00
Von Deutschland nach USA
Versandziele, Kosten & Dauer