Kali Linux Network Scanning Cookbook - Second Edition
Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning
About This Book
-
Learn the fundamentals behind commonly used scanning techniques
-
Deploy powerful scanning tools that are integrated...
| | Improving Web Application Security: Threats and CountermeasuresThis guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide... | | Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |