Penetration testing : a hands-on introduction to hacking
By: Weidman, Georgia
Material type:![](/opac-tmpl/lib/famfamfam/BK.png)
Summary:
"In Penetration Testing, security researcher and trainer Georgia Weidman provide you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software"--
Item type | Home library | Call number | Copy number | Status | Notes | Date due | Barcode | Item holds | Course reserves |
---|---|---|---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 005.8092 WE PE (Browse shelf) | Available | T0062935 | |||||
CRS | University of Wollongong in Dubai Closed Reserve | 005.8092 WE PE (Browse shelf) | Available | T0062936 | |||||
3 DAY LOAN | University of Wollongong in Dubai Main Collection | 005.8092 WE PE (Browse shelf) | Ebook Available | Available | Sep.2019 | T0062937 |
Total holds: 0
Includes bibliographical references (pages 473-476) index.
"In Penetration Testing, security researcher and trainer Georgia Weidman provide you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software"--
CSCI369