Quick Start Guide to Penetration Testing: With NMAP, OpenVAS and Metasploit
Get started with NMAP, OpenVAS, and Metasploit in this short book and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. You will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences...
Information Security: The Complete Reference, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Develop and implement an effective end-to-end security program
Today’s complex world of mobile platforms, cloud...
Kali Linux Wireless Penetration Testing Essentials
Plan and execute penetration tests on wireless networks with the Kali Linux distribution
About This Book
Learn the fundamentals of wireless LAN security and penetration testing
Discover and attack wireless networks using specialized Kali Linux tools
|Result Page: 29 28 27 26 25 24 23 22 21 20 |