Recommended
Penetration Testing
✓ Read
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series o
- Category
- Mathematics
- Priority
- Recommended
- Author works
- 1
- Editions known
- 1
FROM THE STACKS Returned · Read
On the Same Shelf
Books one call-number away from QA0076.90000000.A25W4258 2014 in the LCC stacks.
QA0076.90000000.A25S739 2020
Black Hat Go: Go Programming for Hackers and Pentesters
Tom Steele, Chris Patten, Dan Kottmann
QA0076.90000000.A25T474 2016
iOS Application Security
David Thiel
QA0076.90000000.A43 L96 1997
Distributed Algorithms
Nancy A. Lynch
QA0076.90000000.A43 S55 2008
The Algorithm Design Manual
Steven Skiena
More in Mathematics
← Back to browse