Anbieter: -OnTimeBooks-, Phoenix, AZ, USA
EUR 13,21
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: very_good. Gently read. May have name of previous ownership, or ex-library edition. Binding tight; spine straight and smooth, with no creasing; covers clean and crisp. Minimal signs of handling or shelving. 100% GUARANTEE! Shipped with delivery confirmation, if youâre not satisfied with purchase please return item for full refund. Ships USPS Media Mail.
Verlag: Packt Publishing, Limited, 2019
ISBN 10: 1838646078 ISBN 13: 9781838646073
Sprache: Englisch
Anbieter: Better World Books, Mishawaka, IN, USA
EUR 16,16
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbZustand: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
EUR 26,45
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. Very good with minor shelf-wear. Spine square and uncreased. Binding sound. Interior clean and bright, unmarked.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 51,85
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 51,24
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 51,84
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Best Price, Torrance, CA, USA
EUR 46,54
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. SUPER FAST SHIPPING.
Verlag: Packt Publishing Limited, GB, 2019
ISBN 10: 1838646078 ISBN 13: 9781838646073
Sprache: Englisch
Anbieter: Rarewaves.com UK, London, Vereinigtes Königreich
EUR 70,71
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworksKey FeaturesGain insights into the latest antivirus evasion techniquesSet up a complete pentesting environment using Metasploit and virtual machinesDiscover a variety of tools and techniques that can be used with Kali LinuxBook DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats.This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks.By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities.This Learning Path includes content from the following Packt products:Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-GutierrezMetasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et alWhat you will learnBuild and analyze Metasploit modules in RubyIntegrate Metasploit with other penetration testing toolsUse server-side attacks to detect vulnerabilities in web servers and their applicationsExplore automated attacks such as fuzzing web applicationsIdentify the difference between hacking a web application and network hackingDeploy Metasploit with the Penetration Testing Execution Standard (PTES)Use MSFvenom to generate payloads and backdoor files, and create shellcodeWho this book is forThis Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 56,47
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
EUR 56,93
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Verlag: Packt Publishing Limited, GB, 2019
ISBN 10: 1838646078 ISBN 13: 9781838646073
Sprache: Englisch
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
EUR 76,33
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbPaperback. Zustand: New. Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworksKey FeaturesGain insights into the latest antivirus evasion techniquesSet up a complete pentesting environment using Metasploit and virtual machinesDiscover a variety of tools and techniques that can be used with Kali LinuxBook DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats.This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks.By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities.This Learning Path includes content from the following Packt products:Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-GutierrezMetasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et alWhat you will learnBuild and analyze Metasploit modules in RubyIntegrate Metasploit with other penetration testing toolsUse server-side attacks to detect vulnerabilities in web servers and their applicationsExplore automated attacks such as fuzzing web applicationsIdentify the difference between hacking a web application and network hackingDeploy Metasploit with the Penetration Testing Execution Standard (PTES)Use MSFvenom to generate payloads and backdoor files, and create shellcodeWho this book is forThis Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.
Anbieter: Lucky's Textbooks, Dallas, TX, USA
EUR 51,33
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Verlag: Packt Publishing, Limited, 2019
ISBN 10: 1838646078 ISBN 13: 9781838646073
Sprache: Englisch
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 61,67
Währung umrechnenAnzahl: 4 verfügbar
In den WarenkorbZustand: New. Print on Demand pp. 712.