Web Penetration Testing with Kali Linux
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Learn key reconnaissance concepts needed as a penetration tester
Attack and exploit key features, authentication, and sessions on web...
Practical Oracle Database Appliance
Practical Oracle Database Appliance is a hands-on book taking you through the components and implementation of the Oracle Database Appliance. Learn about architecture, installation, configuration, and reconfiguration. Install and configure the Oracle Database Appliance with confidence. Make the right choices between the various...
Hacking: The Art of Exploitation, 2nd Edition Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,...
Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
Explore the insights and importance of testing your corporate network systems before the hackers strike
Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Recipes designed to educate you extensively on the penetration testing principles and Kali...
Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...
|Result Page: 21 20 19 18 17 16 15 14 13 12 |