 Kali Linux Social Engineering
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux
Overview
-
Learn about various attacks and tips and tricks to avoid them
-
Get a grip on efficient ways to perform penetration testing.
-
Use advanced techniques to bypass...
|  |  Protecting Oracle Database 12c
Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation... |  |  Security for Multihop Wireless Networks
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area... |