|
|
|
|
|
Penetration Testing with the Bash shell
Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools
About This Book
-
Utilize the command line to create, run, and execute tests
-
Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
| | Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s... | | The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it
was unimportant: a quirky mechanism that allowed a
handful of students, plus a bunch of asocial, basementdwelling
geeks, to visit each other’s home pages dedicated
to science, pets, or poetry. Today, it is the platform
of choice for writing ... |
|
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |