Kali Linux – Assuring Security by Penetration Testing

· Packt Publishing Ltd
4,0
15 водгукаў
Электронная кніга
450
Старонкі

Пра гэту электронную кнігу

Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually. If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.

Ацэнкі і агляды

4,0
15 водгукаў

Звесткі пра аўтара

Lee Allen is currently working as a security architect at a prominent university. Throughout the years, he has continued his attempts to remain up to date with the latest and greatest developments in the security industry and the security community. He has several industry certifications including the OSWP and has been working in the IT industry for over 15 years. Lee Allen is the author of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide, Packt Publishing.; Tedi Heriyanto currently works as a principal consultant in an Indonesian information security company. In his current role, he has been engaged with various penetration testing assignments in Indonesia and other countries. In his previous role, he was engaged with several well-known business institutions across Indonesia and overseas. Tedi has an excellent track record in designing secure network architecture, deploying and managing enterprise-wide security systems, developing information security policies and procedures, performing information security audits and assessments, and providing information security awareness training. In his spare time, he manages to research, learn, and participate in the Indonesian Security Community activities and has a blog http://theriyanto.wordpress.com. He shares his knowledge in the security field by writing several information security books.; Shakeel Ali is a Security and Risk Management consultant at Fortune 500. Previously, he was the key founder of Cipher Storm Ltd., UK. His expertise in the security industry markedly exceeds the standard number of security assessments, audits, compliance, governance, and forensic projects that he carries out in day-to-day operations. He has also served as a Chief Security Officer at CSS Providers SAL. As a senior security evangelist and having spent endless nights without taking a nap, he provides constant security support to various businesses, educational organizations, and government institutions globally. He is an active, independent researcher who writes various articles and whitepapers and manages a blog at Ethical-Hacker.net. Also, he regularly participates in BugCon Security Conferences held in Mexico, to highlight the best-of-breed cyber security threats and their solutions from practically driven countermeasures.

Ацаніце гэту электронную кнігу

Падзяліцеся сваімі меркаваннямі.

Чытанне інфармацыb

Смартфоны і планшэты
Усталюйце праграму "Кнігі Google Play" для Android і iPad/iPhone. Яна аўтаматычна сінхранізуецца з вашым уліковым запісам і дазваляе чытаць у інтэрнэце або па-за сеткай, дзе б вы ні былі.
Ноўтбукі і камп'ютары
У вэб-браўзеры камп'ютара можна слухаць аўдыякнігі, купленыя ў Google Play.
Электронныя кнiгi i iншыя прылады
Каб чытаць на такіх прыладах для электронных кніг, як, напрыклад, Kobo, трэба спампаваць файл і перанесці яго на сваю прыладу. Выканайце падрабязныя інструкцыі, прыведзеныя ў Даведачным цэнтры, каб перанесці файлы на прылады, якія падтрымліваюцца.