Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities, Rahalkar Sagar


Варианты приобретения
Цена: 6068.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-23
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Rahalkar Sagar
Название:  Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities
ISBN: 9781838982669
Издательство: Packt Publishing
Классификация:
ISBN-10: 1838982663
Обложка/Формат: Paperback
Страницы: 246
Вес: 0.43 кг.
Дата издания: 10.04.2020
Язык: English
Издание: 2 ed
Размер: 23.50 x 19.05 x 1.32 cm
Читательская аудитория: General (us: trade)
Подзаголовок: Perform penetration testing to secure your it environment against threats and vulnerabilities
Рейтинг:
Поставляется из: США
Описание: Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.


A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities

Автор: Rahalkar Sagar
Название: A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities
ISBN: 1484264010 ISBN-13(EAN): 9781484264010
Издательство: Springer
Цена: 6288.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Chapter 1: Introduction to Burp SuiteChapter Goal: Introduce the Burp suite to the users explaining its need and a high-level overview. It would set the context for rest of the chapters.

No of pages - 6-8

Subtopics

1. Introduction to application security testing

2. Some basics of application security

3. A brief introduction to Burp Suite

4. Need for Burp Suite

5. Peer comparison

6. Burp Suite features and versions

7. High level feature overview

Chapter 2: Setting up the environment

Chapter Goal: Help the readers to setup the testing environment for rest of the chapters

No of pages 6

Subtopics

1. Burp Suite installation

2. Setting up vulnerable target web application

3. Configuring the browser

4. Using the Burp Suite CA certificate

Chapter 3: User options, project options, proxy

Chapter Goal: Introduce the readers to the user options, project options and proxy tab of Burp Suite. These are some basic building blocks to get started further.

No of pages 20-25

Subtopics

1. Platform authentication, upstream proxy servers, SOCKS proxy

2. Defining the hotkeys

3. Automatic project backups

4. Rest API

5. Proxy interception, proxy history logging

6. Performance feedback

7. Project Options - Time outs, host name resolution, out of scope requests, redirections, TLS configuration, session handling rules, cookie jar and macros

8. Proxy - Intercept, HTTP History, web socket history and options

Chapter 4: Dashboard, target, engagement tools

Chapter Goal: Introduce the readers to the dashboard, target tabs and the engagement tools

No of pages 10-15

Subtopics

1.Dashboard overview

2.Target Tab - introduction to various panes, filters

3.Engagement tools

Chapter 5: Intruder

Chapter Goal: Introduce the readers to the Burp Suite intruder tool.

No of pages 10

Subtopics

1. Target tab

2. Positions

3. Payloads

4. Options

Chapter 6: Repeater, sequencer, decoder and comparer

Chapter Goal: Introduce the readers to repeater, sequencer, decoder and comparer

No of pages 10 - 15

Subtopics

1. Repeater - request and response, search filters, show response and render

2. Sequencer - Live capture, manual load and analysis options

3. Decoder - Encoding, Decoding and Hashing

4. Efficiently using comparer

Chapter 7: Infiltrator, Collaborator and Clickbandit

Chapter Goal: Introduce the readers to infiltrator, collaborator and clickbandit tools

No of pages 10-15

Subtopics

1. Infiltrator - patching the java binaries

2.

Network Vulnerability Assessment

Автор: Rahalkar Sagar
Название: Network Vulnerability Assessment
ISBN: 1788627253 ISBN-13(EAN): 9781788627252
Издательство: Неизвестно
Цена: 8091.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Being able to identify security loopholes has become critical to many businesses. That`s where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model.

Metasploit for Beginners: Create a threat-free environment with the best-in-class tool

Автор: Rahalkar Sagar
Название: Metasploit for Beginners: Create a threat-free environment with the best-in-class tool
ISBN: 1788295978 ISBN-13(EAN): 9781788295970
Издательство: Неизвестно
Рейтинг:
Цена: 6505.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics, this book carries out penetration testing in highly-secured environments with Metasploit. It helps you learn to bypass different defenses to gain access into different systems.

Securing Network Infrastructure

Автор: Jetty Sairam, Rahalkar Sagar
Название: Securing Network Infrastructure
ISBN: 1838642307 ISBN-13(EAN): 9781838642303
Издательство: Неизвестно
Рейтинг:
Цена: 9194.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия