Normal view MARC view ISBD view

Penetration testing : a hands-on introduction to hacking

By: Weidman, Georgia
Material type: BookPublisher: San Francisco : No Starch Press, c2014.Description: xxviii, 495 p. : ill. ; 24 cm.ISBN: 9781593275648; 1593275641Program: CSCI369Subject(s): Penetration testing (Computer security) | Hackers | COMPUTERS / Internet / Security | COMPUTERS / Networking / Security | COMPUTERS / Security / GeneralDDC classification: 005.8092 WE PE Online resources: Ebook | Location Map
Summary:
"In Penetration Testing, security researcher and trainer Georgia Weidman provide you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software"--
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Copy number Status Notes Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8092 WE PE (Browse shelf) Available T0062935
CRS University of Wollongong in Dubai
Closed Reserve
005.8092 WE PE (Browse shelf) Available T0062936
3 DAY LOAN University of Wollongong in Dubai
Main Collection
005.8092 WE PE (Browse shelf) Ebook Available Available Sep.2019 T0062937
Total holds: 0

Includes bibliographical references (pages 473-476) index.

"In Penetration Testing, security researcher and trainer Georgia Weidman provide you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software"--

CSCI369

Powered by Koha