Cover of Penetration Testing QA0076.90000000.A25W4258 2014
Recommended

Penetration Testing

by Georgia Weidman

✓ Read

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series o

First published 2014 531 pages
Category
Mathematics
Priority
Recommended
Author works
1
Editions known
1
Classification
LCC QA-0076.90000000.A25W4258 2014 COMPUTERS / Internet / SecurityCOMPUTERS / Networking / SecurityCOMPUTERS / Security / GeneralComputer securityHackersKali LinuxPenetration testing (Computer security)
This edition
ISBN 9781593275648 English
FROM THE STACKS Returned · Read

On the Same Shelf

Books one call-number away from QA0076.90000000.A25W4258 2014 in the LCC stacks.

More in Mathematics


← Back to browse