Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite/ Debasish Mandal.
Author:
Mandal, Debasish.
Description:
1 online resource (340 pages)
Subject:
COMPUTERS / Security / Network Security. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000340.html
ISBN:
9789355511973
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
Mandal, Debasish.
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
[electronic resource] /Debasish Mandal. - 1 online resource (340 pages)
Includes bibliographical references and index.
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite -- About the Author -- About the Reviewers -- Acknowledgement -- Preface -- Disclaimer -- Table of Contents -- Chapter 1. Cybersecurity, Career Path, and Prospects -- Chapter 2. Introduction to Penetration Testing -- Chapter 3. Setting Up Your Lab for Penetration Testing -- Chapter 4. Web Application and API Penetration Testing -- Chapter 5. The Art of Secure Source Code Review -- Chapter 6. Penetration Testing Android Mobile Applications -- Chapter 7. Network Penetration Testing -- Chapter 8. Wireless Penetration Testing -- Chapter 9. Report Preparation and Documentation -- Chapter 10. A Day in the Life of a PenTester -- Index.
Access restricted to authorized users and institutions.
This book instructs readers on how to operationalize the creation of systems, software applications, and business information using the best practices of DevOps, DataOps, and MLOps, among other things. From software unit packaging code and its dependencies to automating the software development lifecycle and deployment, the book provides a learning roadmap that begins with the basics and progresses to advanced topics. This book teaches you how to create a culture of cooperation, affinity, and tooling at scale using DevOps, Docker, Kubernetes, Data Engineering, and Machine Learning. Microservices design, setting up clusters and maintaining them, processing data pipelines, and automating operations with machine learning are all topics that will aid you in your career. When you use each of the xOps methods described in the book, you will notice a clear shift in your understanding of system development. Throughout the book, you will see how every stage of software development is modernized with the most up-to-date technologies and the most effective project management approaches.
Mode of access: World Wide Web.
ISBN: 9789355511973Subjects--Topical Terms:
1483836
COMPUTERS / Security / Network Security.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
LDR
:03008nam a2200289 i 4500
001
1157301
006
m eo d
007
cr cn |||m|||a
008
250717s2022 ob 000 0 eng d
020
$a
9789355511973
020
$a
9789355511980
035
$a
BPB0000340
041
0
$a
eng
050
0 0
$a
QA76.9.A25
082
0 0
$a
005.8
100
1
$a
Mandal, Debasish.
$3
1483884
245
1 0
$a
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite
$h
[electronic resource] /
$c
Debasish Mandal.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2022.
264
4
$c
©2022
300
$a
1 online resource (340 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Penetration testing for jobseekers perform ethical hacking across web apps, networks, mobile devices and wifi using kali linux, burp suite, mobsf, metasploit and aircrack-suite -- About the Author -- About the Reviewers -- Acknowledgement -- Preface -- Disclaimer -- Table of Contents -- Chapter 1. Cybersecurity, Career Path, and Prospects -- Chapter 2. Introduction to Penetration Testing -- Chapter 3. Setting Up Your Lab for Penetration Testing -- Chapter 4. Web Application and API Penetration Testing -- Chapter 5. The Art of Secure Source Code Review -- Chapter 6. Penetration Testing Android Mobile Applications -- Chapter 7. Network Penetration Testing -- Chapter 8. Wireless Penetration Testing -- Chapter 9. Report Preparation and Documentation -- Chapter 10. A Day in the Life of a PenTester -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book instructs readers on how to operationalize the creation of systems, software applications, and business information using the best practices of DevOps, DataOps, and MLOps, among other things. From software unit packaging code and its dependencies to automating the software development lifecycle and deployment, the book provides a learning roadmap that begins with the basics and progresses to advanced topics. This book teaches you how to create a culture of cooperation, affinity, and tooling at scale using DevOps, Docker, Kubernetes, Data Engineering, and Machine Learning. Microservices design, setting up clusters and maintaining them, processing data pipelines, and automating operations with machine learning are all topics that will aid you in your career. When you use each of the xOps methods described in the book, you will notice a clear shift in your understanding of system development. Throughout the book, you will see how every stage of software development is modernized with the most up-to-date technologies and the most effective project management approaches.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Security / Cryptography & Encryption.
$2
bisacsh
$3
1483837
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000340.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login