Cargando…
Kali Linux: assuring security by penetration testing
Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux tes...
Autores principales: | , , |
---|---|
Lenguaje: | eng |
Publicado: |
Packt Publ.
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1701444 |
_version_ | 1780936271458205696 |
---|---|
author | Ali, Shakeel Heriyanto, Tedi Allen, Lee |
author_facet | Ali, Shakeel Heriyanto, Tedi Allen, Lee |
author_sort | Ali, Shakeel |
collection | CERN |
description | Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you. |
id | cern-1701444 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Packt Publ. |
record_format | invenio |
spelling | cern-17014442021-04-21T21:02:27Zhttp://cds.cern.ch/record/1701444engAli, ShakeelHeriyanto, TediAllen, LeeKali Linux: assuring security by penetration testingComputing and ComputersWritten as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.Packt Publ.oai:cds.cern.ch:17014442014 |
spellingShingle | Computing and Computers Ali, Shakeel Heriyanto, Tedi Allen, Lee Kali Linux: assuring security by penetration testing |
title | Kali Linux: assuring security by penetration testing |
title_full | Kali Linux: assuring security by penetration testing |
title_fullStr | Kali Linux: assuring security by penetration testing |
title_full_unstemmed | Kali Linux: assuring security by penetration testing |
title_short | Kali Linux: assuring security by penetration testing |
title_sort | kali linux: assuring security by penetration testing |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1701444 |
work_keys_str_mv | AT alishakeel kalilinuxassuringsecuritybypenetrationtesting AT heriyantotedi kalilinuxassuringsecuritybypenetrationtesting AT allenlee kalilinuxassuringsecuritybypenetrationtesting |