354 50 4MB
English Pages 509 Year 2007
Report DMCA / Copyright
DOWNLOAD PDF FILE
Annotation
570 58 74MB Read more
Leverage Kali Linux to learn the latest ethical hacking tools and techniquesKey Features Learn to use Linux commands lik
122 97 82MB Read more
Plug the gaps in your network's infrastructure with resilient network security models Key FeaturesDevelop a cost-ef
388 19 38MB Read more
Master one of the most essential tools a professional pen tester needs to know. Book Description This essential handboo
108 44 5MB Read more
Master Wireshark and discover how to analyze network packets and protocols effectively, along with engaging recipes to t
376 24 72MB Read more
Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of info
780 134 14MB Read more
Learn how to execute web application penetration testing end-to-end Key Features Build an end-to-end threat model landsc
114 29 16MB Read more
Learn how to execute web application penetration testing end-to-end Key FeaturesBuild an end-to-end threat model landsca
102 65 19MB Read more
This book is an effective introduction to Intruder Detection, demonstrating how popular open-source tools can be used. I
409 78 2MB Read more
584 79 22MB Read more