悟空视频

    在线播放云盘网盘BT下载影视图书

    Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide - 图书

    2012计算机·计算机综合
    导演:Lee Allen
    An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP.
    Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide
    图书

    Mastering Kali Linux for Advanced Penetration Testing - 图书

    2014计算机·理论知识
    导演:Robert W. Beggs
    This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques.If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management, and documentation of penetration testing by building on your understanding of Kali Linux and wireless concepts.
    Mastering Kali Linux for Advanced Penetration Testing
    搜索《Mastering Kali Linux for Advanced Penetration Testing》
    图书

    Mastering Kali Linux for Advanced Penetration Testing - 图书

    2014计算机·理论知识
    导演:Robert W. Beggs
    This book provides an overview of the kill chain approach to penetration testing, and then focuses on using Kali Linux to provide examples of how this methodology is applied in the real world. After describing the underlying concepts, step-by-step examples are provided that use selected tools to demonstrate the techniques.If you are an IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you. This book will teach you how to become an expert in the pre-engagement, management, and documentation of penetration testing by building on your understanding of Kali Linux and wireless concepts.
    Mastering Kali Linux for Advanced Penetration Testing
    搜索《Mastering Kali Linux for Advanced Penetration Testing》
    图书

    Building Virtual Pentesting Labs for Advanced Penetration Testing - 图书

    2016科学技术·工业技术
    导演:Kevin Cardwell
    While the book targets advanced penetration testing, the process is systematic and as such will provide even beginners with a solid methodology and approach to testing.You are expected to have network and security knowledge. The book is intended for anyone who wants to build and enhance their existing professional security and penetration testing methods and skills.
    Building Virtual Pentesting Labs for Advanced Penetration Testing
    搜索《Building Virtual Pentesting Labs for Advanced Penetration Testing》
    图书

    Building Virtual Pentesting Labs for Advanced Penetration Testing - 图书

    2016科学技术·工业技术
    导演:Kevin Cardwell
    While the book targets advanced penetration testing, the process is systematic and as such will provide even beginners with a solid methodology and approach to testing.You are expected to have network and security knowledge. The book is intended for anyone who wants to build and enhance their existing professional security and penetration testing methods and skills.
    Building Virtual Pentesting Labs for Advanced Penetration Testing
    搜索《Building Virtual Pentesting Labs for Advanced Penetration Testing》
    图书

    BackTrack 4: Assuring Security by Penetration Testing - 图书

    导演:Shakeel Ali
    Shakeel Ali,英国Cipher Storm公司的首席技术官和主要创始人。他从事过大量的安全评估、审计、规则制定、管理和取证工作,并从中积累了出色的安全领域专业知识。他还是CSS- Providers S.A.L的首席安全官。 Tedi Heriyanto,印度尼西亚的一家信息安全公司的资深技术咨询人员。他曾经和许多世界各地知名研究机构合作,设计安全的网络架构、部署和管理企业级的安全系统、设计信息安全制度和流程等。
    BackTrack 4: Assuring Security by Penetration Testing
    搜索《BackTrack 4: Assuring Security by Penetration Testing》
    图书

    BackTrack 4: Assuring Security by Penetration Testing - 图书

    导演:Shakeel Ali
    Shakeel Ali,英国Cipher Storm公司的首席技术官和主要创始人。他从事过大量的安全评估、审计、规则制定、管理和取证工作,并从中积累了出色的安全领域专业知识。他还是CSS- Providers S.A.L的首席安全官。 Tedi Heriyanto,印度尼西亚的一家信息安全公司的资深技术咨询人员。他曾经和许多世界各地知名研究机构合作,设计安全的网络架构、部署和管理企业级的安全系统、设计信息安全制度和流程等。
    BackTrack 4: Assuring Security by Penetration Testing
    搜索《BackTrack 4: Assuring Security by Penetration Testing》
    图书

    Learn Penetration Testing - 图书

    2019医学健康·医学
    导演:Rishalin Pillay
    Sending information via the internet is not entirely private, as evidenced by the rise in hacking, malware attacks, and security threats. With the help of this book, you'll learn crucial penetration testing techniques to help you evaluate enterprise defenses.You'll start by understanding each stage of pentesting and deploying target virtual machines, including Linux and Windows. Next, the book will guide you through performing intermediate penetration testing in a controlled environment. With the help of practical use cases, you'll also be able to implement your learning in real-world scenarios. By studying everything from setting up your lab, information gathering and password attacks, through to social engineering and post exploitation, you'll be able to successfully overcome security threats. The book will even help you leverage the best tools, such as Kali Linux, Metasploit, Burp Suite, and other open source pentesting tools to perform these techniques. Toward the later chapters, you'll focus on best practices to quickly resolve security threats.By the end of this book, you'll be well versed with various penetration testing techniques so as to be able to tackle security threats effectively
    Learn Penetration Testing
    搜索《Learn Penetration Testing》
    图书

    Kali Linux Wireless Penetration Testing:Beginners Guide - 图书

    2015计算机·编程设计
    导演:Vivek Ramachandran Cameron Buchanan
    If you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.
    Kali Linux Wireless Penetration Testing:Beginners Guide
    搜索《Kali Linux Wireless Penetration Testing:Beginners Guide》
    图书

    Penetration Testing with the Bash shell - 图书

    2014计算机·编程设计
    导演:Keith Makan
    An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
    Penetration Testing with the Bash shell
    搜索《Penetration Testing with the Bash shell》
    图书
    加载中...