Amazon cover image
Image from Amazon.com

Penetration testing : a hands-on introduction to hacking Georgia Weidman

By: Material type: TextTextPublication details: San Francisco : No Starch Press, c2014.Description: xxviii, 495 p. : ill. ; 24 cmISBN:
  • 9781593275648
  • 1593275641
Subject(s): DDC classification:
  • 005.8092 WE PE
Online resources: Summary: "In Penetration Testing, security researcher and trainer Georgia Weidman provide you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software"--
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Notes Date due Barcode
REGULAR University of Wollongong in Dubai Main Collection 005.8092 WE PE (Browse shelf(Opens below)) Available T0062935
CRS University of Wollongong in Dubai Closed Reserve 005.8092 WE PE (Browse shelf(Opens below)) Available T0062936
3 DAY LOAN University of Wollongong in Dubai Main Collection 005.8092 WE PE (Browse shelf(Opens below)) Ebook Available Available Sep.2019 T0062937

Includes bibliographical references (pages 473-476) index.

"In Penetration Testing, security researcher and trainer Georgia Weidman provide you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software"--

CSCI369

There are no comments on this title.

to post a comment.