Inicio > > Seguridad informática > Privacidad y protección de datos > Step by Step Guide to Penetration Testing
Step by Step Guide to Penetration Testing

Step by Step Guide to Penetration Testing

Step by Step Guide to Penetration Testing

Radhi Shatob

80,67 €
IVA incluido
Consulta disponibilidad
Editorial:
Tellwell Talent
Año de edición:
2019
Materia
Privacidad y protección de datos
ISBN:
9781999541200

Selecciona una librería:

  • Librería Perelló (Valencia)
  • Librería Aciertas (Toledo)
  • El AlmaZen del Alquimista (Sevilla)
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Donde los libros
  • Librería Proteo (Málaga)

This Guide requires no prior hacking experience, Step by Step Guide to Penetration Testing supplies all the steps required to do the different Exercises in easy to follow instructions with screen shots of the Exercises done by the author in order to produce the book.This Guide is considered a good starting point for those who want to start their career as Ethical hackers, Penetration testers or Security analysts. Also the book would be valuable to Information Security Managers, Systems administrators and network Engineers who would like to understand the tools and threats that hackers pose to their networks and systems.This Guide is a practical guide and does not go in detail about the theoretical aspects of the subjects explained. This is to keep readers focused on the practical part of Penetration Testing, users can get the theoretical details from other sources that after they have hands on experience with the subject.This Guide is an ideal resource for those who want to learn about ethical hacking but don't know where to start. It will help take your hacking skills to the next level. The topics and exercises described comply with international standards and form a solid hands on experience for those seeking Information security or offensive security certifications.

Artículos relacionados

  • Handbook of Research on Emerging Developments in Data Privacy
    Manish Gupta
    Data collection allows today’s businesses to cater to each customer’s individual needs and provides a necessary edge in a competitive market. However, any breach in confidentiality can cause serious consequences for both the consumer and the company. The Handbook of Research on Emerging Developments in Data Privacy brings together new ideas on how to deal with potential leaks o...
    Disponible

    426,38 €

  • Scrappy Information Security
    Michael Seese
    The Internet, like Elvis, is everywhere. It is in our homes, our places of work, our phones. Unfortunately, cyberspace is teeming with bad people who want to steal our identities, pilfer our corporate secrets, get their grubby little fingers into our online wallets, and -- to add insult to injury -- latch onto our PCs to perpetuate their crimes.Modern corporations do their best...
  • The GnuTLS 3.6.1 Manual
    Nikos Mavrogiannopoulos / Simon Josefsson
    GnuTLS is a portable ANSI C based library which implements the protocols ranging from SSL 3.0 to TLS 1.2, accompanied with the required framework for authentication and public key infrastructure. Important features of the GnuTLS library include: Support for TLS 1.2, TLS 1.1, TLS 1.0 and SSL 3.0 protocols. Support for Datagram TLS 1.0 and 1.2. Support for handling and verifi...
    Disponible

    20,92 €

  • Information Assurance and Security Technologies for Risk Assessment and Threat Management
    Te-Shun Chou
    The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by tho...
    Disponible

    255,99 €

  • Cybercrime
    Denise M. Chatam / Denise MChatam
    Cybercrime: Secure IT or Lose IT looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements. ...
    Disponible

    14,40 €

  • Have You Been Hacked Yet?
    N. Stakhanova & O. Stakhanov
    Do you or someone in your house:have a computer, an iPad, or a smartphone? browse the internet, use e-mail or have a Facebook, Twitter, LinkedIn or other social account? ordo online banking, or purchase things online? If your answer is "yes" to any of the above questions, than it's not a question of "if", but "when" cybercriminals will try to steal your or your loved ones&#...

Otros libros del autor

  • Penetration Testing Step By Step Guide
    Radhi Shatob
    This book is intended for people who have no prior knowledge of penetration testing, ethical hacking and would like to enter the field. It is a practical step by step guide to penetration testing that teaches the techniques and tools the real hackers use to hack networks and exploit vulnerabilities. The guide is based in Kali Linux and other tools . This guide assumes that rea...
    Disponible

    101,16 €

  • Web Penetration Testing
    Radhi Shatob
    This Guide is considered Entry-To-Medium level in Websites and Web Applications penetration testing, it is a good starting point for those who want to start their career as a Web Applications Penetration testers or Security analysts. Also, the book would be valuable to Information Security Managers, Systems administrators, Web administrators and Web developers who would like to...
    Disponible

    54,34 €