Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Penetration testing : a hands-on introduction to hacking
by
Weidman, Georgia
in
Kali Linux.
/ Penetration testing (Computer security)
/ Computer hackers.
/ COMPUTERS / Internet / Security.
/ COMPUTERS / Networking / Security.
/ COMPUTERS / Security / General.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Penetration testing : a hands-on introduction to hacking
by
Weidman, Georgia
in
Kali Linux.
/ Penetration testing (Computer security)
/ Computer hackers.
/ COMPUTERS / Internet / Security.
/ COMPUTERS / Networking / Security.
/ COMPUTERS / Security / General.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Book
Penetration testing : a hands-on introduction to hacking
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
\"In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software\"-- Provided by publisher.
Publisher
No Starch Press
Subject
ISBN
9781593275648, 1593275641
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| QA76.9.A25 W4258 2014 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.