Kali Linux Cookbook: Over 70 recipes to help you master Kali Linux for effective penetration security testing
A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.
1148316097
Kali Linux Cookbook: Over 70 recipes to help you master Kali Linux for effective penetration security testing
A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.
67.99 In Stock
Kali Linux Cookbook: Over 70 recipes to help you master Kali Linux for effective penetration security testing

Kali Linux Cookbook: Over 70 recipes to help you master Kali Linux for effective penetration security testing

by Willie L. Pritchett, David De Smet
Kali Linux Cookbook: Over 70 recipes to help you master Kali Linux for effective penetration security testing

Kali Linux Cookbook: Over 70 recipes to help you master Kali Linux for effective penetration security testing

by Willie L. Pritchett, David De Smet

eBook

$67.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

Product Details

ISBN-13: 9781783289608
Publisher: Packt Publishing
Publication date: 10/15/2013
Sold by: Barnes & Noble
Format: eBook
Pages: 260
File size: 25 MB
Note: This product may take a few minutes to download.

About the Author

Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT field. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management firm specializing in secure, data-driven, application development, and staffing services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifications and currently trains students on various topics including ethical hacking and penetration testing.
David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultancy, customer requirements specification analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is very passionate about what he does and spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.

Table of Contents

Table of Contents
  1. Setting Up Kali Linux and Pentesting Environment
  2. Customizing Kali Linux
  3. Understanding Kali Linux Tools
  4. Learning About Your Target
  5. Vulnerability Assessment
  6. Exploiting Vulnerabilities
  7. Escalating Privileges
  8. Password Attacks
  9. Wireless Attacks
  10. Performing a Network Audit
From the B&N Reads Blog

Customer Reviews