語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite/ Debasish Mandal.
作者:
Mandal, Debasish.
面頁冊數:
1 online resource (340 pages)
標題:
COMPUTERS / Security / Cryptography & Encryption. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000340.html
ISBN:
9789355511973
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
Mandal, Debasish.
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
[electronic resource] /Debasish Mandal. - 1 online resource (340 pages)
Includes bibliographical references and index.
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite -- About the Author -- About the Reviewers -- Acknowledgement -- Preface -- Disclaimer -- Table of Contents -- Chapter 1. Cybersecurity, Career Path, and Prospects -- Chapter 2. Introduction to Penetration Testing -- Chapter 3. Setting Up Your Lab for Penetration Testing -- Chapter 4. Web Application and API Penetration Testing -- Chapter 5. The Art of Secure Source Code Review -- Chapter 6. Penetration Testing Android Mobile Applications -- Chapter 7. Network Penetration Testing -- Chapter 8. Wireless Penetration Testing -- Chapter 9. Report Preparation and Documentation -- Chapter 10. A Day in the Life of a PenTester -- Index.
Access restricted to authorized users and institutions.
This book instructs readers on how to operationalize the creation of systems, software applications, and business information using the best practices of DevOps, DataOps, and MLOps, among other things. From software unit packaging code and its dependencies to automating the software development lifecycle and deployment, the book provides a learning roadmap that begins with the basics and progresses to advanced topics. This book teaches you how to create a culture of cooperation, affinity, and tooling at scale using DevOps, Docker, Kubernetes, Data Engineering, and Machine Learning. Microservices design, setting up clusters and maintaining them, processing data pipelines, and automating operations with machine learning are all topics that will aid you in your career. When you use each of the xOps methods described in the book, you will notice a clear shift in your understanding of system development. Throughout the book, you will see how every stage of software development is modernized with the most up-to-date technologies and the most effective project management approaches.
Mode of access: World Wide Web.
ISBN: 9789355511973Subjects--Topical Terms:
1483837
COMPUTERS / Security / Cryptography & Encryption.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
LDR
:03008nam a2200289 i 4500
001
1157301
006
m eo d
007
cr cn |||m|||a
008
250717s2022 ob 000 0 eng d
020
$a
9789355511973
020
$a
9789355511980
035
$a
BPB0000340
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Mandal, Debasish.
$3
1483884
245
1 0
$a
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
$h
[electronic resource] /
$c
Debasish Mandal.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2022.
264
4
$c
©2022
300
$a
1 online resource (340 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite -- About the Author -- About the Reviewers -- Acknowledgement -- Preface -- Disclaimer -- Table of Contents -- Chapter 1. Cybersecurity, Career Path, and Prospects -- Chapter 2. Introduction to Penetration Testing -- Chapter 3. Setting Up Your Lab for Penetration Testing -- Chapter 4. Web Application and API Penetration Testing -- Chapter 5. The Art of Secure Source Code Review -- Chapter 6. Penetration Testing Android Mobile Applications -- Chapter 7. Network Penetration Testing -- Chapter 8. Wireless Penetration Testing -- Chapter 9. Report Preparation and Documentation -- Chapter 10. A Day in the Life of a PenTester -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book instructs readers on how to operationalize the creation of systems, software applications, and business information using the best practices of DevOps, DataOps, and MLOps, among other things. From software unit packaging code and its dependencies to automating the software development lifecycle and deployment, the book provides a learning roadmap that begins with the basics and progresses to advanced topics. This book teaches you how to create a culture of cooperation, affinity, and tooling at scale using DevOps, Docker, Kubernetes, Data Engineering, and Machine Learning. Microservices design, setting up clusters and maintaining them, processing data pipelines, and automating operations with machine learning are all topics that will aid you in your career. When you use each of the xOps methods described in the book, you will notice a clear shift in your understanding of system development. Throughout the book, you will see how every stage of software development is modernized with the most up-to-date technologies and the most effective project management approaches.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Cryptography & Encryption.
$2
bisacsh
$3
1483837
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000340.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入