TEST - Catálogo BURRF
   

Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner.

Por: Colaborador(es): Tipo de material: TextoTextoEditor: Amsterdam ; Boston : Syngress, an imprint of Elsevier, 2014Fecha de copyright: ©2014Edición: First editionDescripción: ix, 227 páginas : ilustraciones ; 24 cmTipo de contenido:
  • texto
Tipo de medio:
  • no mediado
Tipo de portador:
  • volumen
ISBN:
  • 9780124077492
Tema(s): Clasificación LoC:
  • QA76.9.A25 B772 2014
Resumen: Introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Signatura Copia número Estado Fecha de vencimiento Código de barras
Libro Libro BURRF: FG (PP) QA76.9.A25 B772 2014 1 1080258343

Incluye referencias bibliográficas e índice.

Introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha