Ethical hacking and penetration testing guide / Rafay Baloch
Material type:
- text
- unmediated
- volume
- 9781482231618
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books - Printed | PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH | kpm QA76.9.A25 B195 2015 (Browse shelf(Opens below)) | Available | SF0002219 |
Browsing PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
kpm QA403.5 .W872 2014 Partial differential equations : topics in fourier analysis / | kpm QA76.73.C15 T882 2014 C, from theory to practice / | kpm QA76.73.L62 H195 2015 LogiQL : a query language for smart databases / | kpm QA76.9.A25 B195 2015 Ethical hacking and penetration testing guide / | kpm QA911 .M958 2015 Essentials of computational fluid dynamics / | kpm QA927 .N218 2015 Waves and oscillations in nature : an introduction / | kpm QC52 .B566 2015 Introduction to numerical programming : a practical guide for scientists and engineers using Python and C/C++ / |
Include bibliographical references and index
"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- Provided by publisher.
There are no comments on this title.