Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Kali Linux Penetration Testing Bible, Khawaja Gus


Варианты приобретения
Цена: 5069.00р.
Кол-во:
Наличие: Ожидается поступление.
 Заказывайте скорее, чем раньше закажете, тем раньше получите заказ.
Ожидаемая дата поступления на склад: 2025-07-08

Добавить в корзину
в Мои желания

Автор: Khawaja Gus   (Гус Хаваджа)
Название:  Kali Linux Penetration Testing Bible
Перевод названия: Гус Хаваджа: Справочник для тестирования Kali Linux
ISBN: 9781119719083
Издательство: Wiley
Классификация:
ISBN-10: 1119719089
Обложка/Формат: Paperback
Страницы: 512
Вес: 0.84 кг.
Дата издания: 02.06.2021
Язык: English
Размер: 23.11 x 18.80 x 3.05 cm
Читательская аудитория: Professional & vocational
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание:

Your ultimate guide to pentesting with Kali Linux

Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kalis varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali.

Youll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether youre new to the field or an established pentester, youll find what you need in this comprehensive guide.

  • Build a modern dockerized environment
  • Discover the fundamentals of the bash language in Linux
  • Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more)
  • Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation
  • Apply practical and efficient pentesting workflows
  • Learn about Modern Web Application Security Secure SDLC
  • Automate your penetration testing with Python




The Hacker Playbook 3: Practical Guide to Penetration Testing

Автор: Kim Peter
Название: The Hacker Playbook 3: Practical Guide to Penetration Testing
ISBN: 1980901759 ISBN-13(EAN): 9781980901754
Издательство: Неизвестно
Цена: 5164.00 р.
Наличие на складе: Ожидается поступление.

Kali Linux Hacking: A Complete Guide to Learni the Fundamentals of Hacking, Cyber Security, and Penetration Testing.

Автор: Treu Peter
Название: Kali Linux Hacking: A Complete Guide to Learni the Fundamentals of Hacking, Cyber Security, and Penetration Testing.
ISBN: 1801259518 ISBN-13(EAN): 9781801259514
Издательство: Неизвестно
Рейтинг:
Цена: 2757.00 р.
Наличие на складе: Нет в наличии.

Описание:

Do you want to become a proficient specialist in cybersecurity and you want to learn the fundamentals of ethical hacking? Do you want to have a detailed overview of all the basic tools provided by the best Linux distribution for ethical hacking? THEN KEEP READING...


Hacking is becoming more complex and sophisticated, and companies are scrambling to protect their digital assets against threats by setting up cybersecurity systems. These systems need to be routinely checked to ensure that these systems do the jobs they're designed to do.

The people who can do these checks are penetration testers and ethical hackers, programmers who are trained to find and exploit vulnerabilities in networks and proffer ways to cover them up.

Now more than ever, companies are looking for penetration testers and cybersecurity professionals who have practical, hands-on experience with Kali Linux and other open-source hacking tools.

In this powerful book, you're going to learn how to master the industry-standard platform for hacking, penetration and security testing-Kali Linux.

This book assumes you know nothing about Kali Linux and hacking and will start from scratch and build up your practical knowledge on how to use Kali Linux and other open-source tools to become a hacker as well as understand the processes behind a successful penetration test.


In This Book you will Learn:


  • Definition of Hacking andiTypes of Hacker
  • Cybersecurity and Types of Cyber Attacks
  • Types of Malware and How the Hacking Process Works
  • Why Hackers Use Linux
  • Scanning (nmap, imassscan, ihping3) and Managing Networks (Wireshark)
  • Kali Linux on Portable Devices
  • Bypassing a Hidden SSH and Bypassing a Mac Address Authentication
  • Secure and Anonymous Using Tor, Proxy Chains, and VPN
  • IP Spoofing
  • Penetration Testing with Metasploit


Would you like to know more? Download the Book, Kali Linux Hacking


Scroll to the top of the page and click the "Buy now" button to get your copy now.


Hacking with Kali Linux: Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing.

Автор: Hack Anthony
Название: Hacking with Kali Linux: Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing.
ISBN: 1671818725 ISBN-13(EAN): 9781671818729
Издательство: Неизвестно
Цена: 2824.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Have you always been interested in the world of hacking?

Do you want to discover the skills, tactics, and methods behind ethical hacking? One of the most important and sought-after IT security capabilities?

If you want to learn the art of hacking then keep reading...


Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn.

Hopefully, this book will give you the most basic information so that you will be able to do this properly. If you can follow these tips and use the information that we have given you in this book, you should be able to perform the tasks that you need to with ease and learn how to understand the Linux system without any difficulty.

Linux works as a multi-front operating system and can serve different purposes according to the customization. Unlike other operating systems, Linux comes only as a foundation on which one builds their operating system. The OS is booted to let the users add what they need as they customize it to fit needs.

The first step into learning how to hack using Linux is to understand the Linux operating.

Once you can understand the basics you can move on to the more complicated aspects of this subject such as networking.

This book gives a comprehensive guide on the following:

  • Hacking with Kali Linux
  • Back Door Attacks
  • Cybersecurity
  • Wireless Networking
  • How to Initiate A Hack Using Kali Linux?
  • Your First Hack
  • Ethical Hacking and Penetration Testing
  • Solving Level Problems
  • Exploitation of Computer Systems
  • How to Spoof Addresses
  • FAQs... AND MORE

This book will also be able to give you the information on text manipulation and understand why it is important. If you can use this to your benefit, you will be able to perform the tasks that you need to with ease and set the words up the way you need to.

This book will offer aspiring moral hackers a brief overview of the Hacking with Kali Linux.

Cybersecurity specialist Malcolm Shore explains how to set up a virtual testing environment, customize Kali Linux, and download information gathering software, vulnerability analysis, key and hash cracking, and aim manipulation.

SCROLL UP AND CLICK THE BUY NOW BUTTON

Kali linux: a step by step guide to learn wireless penetration techniques and basics of penetration testing, includes command line

Автор: Tools Steven
Название: Kali linux: a step by step guide to learn wireless penetration techniques and basics of penetration testing, includes command line
ISBN: 1911684116 ISBN-13(EAN): 9781911684114
Издательство: Неизвестно
Рейтинг:
Цена: 3442.00 р.
Наличие на складе: Нет в наличии.

Описание: Do you want to learn how you can protect yourself from hackers in your office and home and how to carry out ethical hacking? If yes, then keep reading...


In layman's terms, hacking is the act of breaking into someone else's computer to which you have no access and stealing private information by circumventing the security measures. It is dangerous because it sabotages the entire computer system.


The origin of the word "hacking" can be traced back to the 1960's and 1970's. Some hackers, called Yippe, were anti-war protestors and members of the Youth International Party. They played pranks in the streets, and most of their prank techniques were taught within their group. It is important to note that they were involved in tapping telephone lines as well.


Gradually, what was called a prank grew to another level and became known as hacking. However, this time their tools were state-of-the-art mega core processors and multi-function plasma screens.


Hacking tactics are increasingly being used by terrorist organizations for numerous acts of evil, including obtaining illegal funding, spreading propaganda, launching missiles, threatening the government and gathering intelligence about secret military movements.


In this book, various types of hacking will be broken down and explained. Step by step instructions will be provided so that you can protect yourself from hackers in your office and home, as well as on the internet. This book gives a comprehensive guide on the following: A step by step process on installing and downloading Kali LinuxVarious tools that are available in Kali Linux, which can be used for penetrating wireless devicesBasic Linux CommandsTips and tricks on Penetration Testing and Web SecurityLinux ToolsHow exploits are classifiedThe role of firewallWhat are cryptography and digital signatureThe Threat of Malware and Cyber AttacksManagement of Linux Kernel and Loadable Kernel ModulesBash and python scripting

... AND MORE


Even if it is your first approach with hacking, by the end of this book you will be armed with all the knowledge you require to get started in ethical hacking.This book is a very and complete guide with a lot of practice and little theory.All you need to know is in this book with detailed descriptions and step by step processes.Even if you are a complete beginner, this book will act as your guide as you traverse the virtual world.


What are you waiting for?Scroll to the top of the page and select the buy now button
Ethical Hacking and Penetration Testing Guide

Автор: Baloch
Название: Ethical Hacking and Penetration Testing Guide
ISBN: 1482231611 ISBN-13(EAN): 9781482231618
Издательство: Taylor&Francis
Рейтинг:
Цена: 9033.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end.

Topical Drug Bioavailability, Bioequivalence, and Penetration

Автор: Vinod P. Shah; Howard I. Maibach; John Jenner
Название: Topical Drug Bioavailability, Bioequivalence, and Penetration
ISBN: 1493938568 ISBN-13(EAN): 9781493938568
Издательство: Springer
Рейтинг:
Цена: 18284.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This authoritative volume explores advances in the techniques used to measure percutaneous penetration of drugs and chemicals to assess bioavailability and bioequivalence and discusses how they have been used in clinical and scientific investigations.

Mobile application penetration testing

Автор: Velu, Vijay Kumar
Название: Mobile application penetration testing
ISBN: 1785883372 ISBN-13(EAN): 9781785883378
Издательство: Неизвестно
Рейтинг:
Цена: 10114.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book - Gain insights into the current threat landscape of mobile applications in particular - Explore the different options that are available on mobile platforms and prevent circumventions made by attackers - This is a step-by-step guide to setting up your own mobile penetration testing environment Who This Book Is For If you are a mobile application evangelist, mobile application developer, information security practitioner, penetration tester on infrastructure web applications, an application security professional, or someone who wants to learn mobile application security as a career, then this book is for you. This book will provide you with all the skills you need to get started with Android and iOS pen-testing. What You Will Learn - Gain an in-depth understanding of Android and iOS architecture and the latest changes - Discover how to work with different tool suites to assess any application - Develop different strategies and techniques to connect to a mobile device - Create a foundation for mobile application security principles - Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device - Get to know secure development strategies for both iOS and Android applications - Gain an understanding of threat modeling mobile applications - Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app In Detail Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done "Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured. This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches. This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats. Style and approach This is an easy-to-follow guide full of hands-on examples of real-world attack simulations. Each topic is explained in context with respect to testing, and for the more inquisitive, there are more details on the concepts and techniques used for different platforms.

Hacking with Kali Linux: Penetration Testing Hacking Bible

Автор: Wagner Alex
Название: Hacking with Kali Linux: Penetration Testing Hacking Bible
ISBN: 1839381132 ISBN-13(EAN): 9781839381133
Издательство: Неизвестно
Рейтинг:
Цена: 5513.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.

Mastering Kali Linux for Advanced Penetration Testing

Автор: Beggs Robert
Название: Mastering Kali Linux for Advanced Penetration Testing
ISBN: 1782163123 ISBN-13(EAN): 9781782163121
Издательство: Неизвестно
Рейтинг:
Цена: 11217.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Kali Linux Cookbook - Second Edition: Effective penetration testing solutions

Автор: Schultz Corey P., Perciaccante Bob
Название: Kali Linux Cookbook - Second Edition: Effective penetration testing solutions
ISBN: 1784390305 ISBN-13(EAN): 9781784390303
Издательство: Неизвестно
Рейтинг:
Цена: 9010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world`s most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for mi..

Kali Linux Wireless Penetration Testing Cookbook

Автор: Oriyano Sean-Philip
Название: Kali Linux Wireless Penetration Testing Cookbook
ISBN: 1783554088 ISBN-13(EAN): 9781783554089
Издательство: Неизвестно
Рейтинг:
Цена: 8091.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes

Автор: Mining Ethem
Название: Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes
ISBN: 1914028120 ISBN-13(EAN): 9781914028120
Издательство: Неизвестно
Рейтинг:
Цена: 3111.00 р.
Наличие на складе: Нет в наличии.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия