The Hacker Playbook 2

Peter Kim CreateSpace

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides the

ISBN10 : 9781512214567 , ISBN13 : 1512214566

Page Number : 358

The Hacker Playbook

Peter Kim Createspace Independent Pub

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides the

ISBN10 : 9781494932633 , ISBN13 : 1494932636

Page Number : 276

Penetration Testing

Georgia Weidman No Starch Press

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate e

ISBN10 : 1593275641 , ISBN13 : 9781593275648

Page Number : 528

Metasploit

Jim O'Gorman No Starch Press

"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is

ISBN10 : 159327288X , ISBN13 : 9781593272883

Page Number : 328

Hacking With Kali

James Broad Newnes

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard d

ISBN10 : 0124078834 , ISBN13 : 9780124078833

Page Number : 238