Penetration testing using Kali Linux 2.0

The sale of this product is temporarily suspended. Please check again later or subscribe for notification of when the product is back in stock.

Try to search similar items from other sellers.

Sold: 293 last one 30.12.2017
Refunds: 0

Uploaded: 25.01.2016
Content: text 294 symbols
WebWare Team seller information
offlineAsk a question

Seller will give you a gift certificate in the amount of 0.27 $ for a positive review

Product description

Penetration testing using Kali Linux 2.0


Format PDF
348 pages

"Penetration testing ( zhargy. Pentest ) - a method of evaluating the security of computer systems or networks by means of a simulated attack an intruder." - WiKi

The information in this book is intended for inspection or penetration testing of their own networks. To test the networks of third parties, get written permission. The entire responsibility for the implementation of the actions described in this book is for you. Remember that for the wrongful acts provides for liability, including criminal.

Additional information

I learn system administration Linux operating system and Web server -based Linux, to analyze the quality settings are different scanners, audit tools, methods, penetration testing, and so on - is what is collected in the Kali Linux. And to date and quality information on these issues in Russian small. The main sources of its production - the English-language books and English-language websites.

Feedback

19  1
Period
1 month 3 months 12 months
0 0 0
0 0 0
Seller will give you a gift certificate in the amount of 0.27 $ for a positive review.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at support@plati.market the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)

This website uses cookies to provide a more effective user experience. See our Cookie policy for details.