語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advanced penetration testing with Kali Linux = unlocking industry-oriented VAPT tactics /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Advanced penetration testing with Kali Linux / Ummed Meel.
其他題名:
unlocking industry-oriented VAPT tactics /
作者:
Meel, Ummed.
面頁冊數:
1 online resource (386 pages)
標題:
COMPUTERS / Security / Cryptography & Encryption. -
電子資源:
https://portal.igpublish.com/iglibrary/search/BPB0000503.html
ISBN:
9789355519511
Advanced penetration testing with Kali Linux = unlocking industry-oriented VAPT tactics /
Meel, Ummed.
Advanced penetration testing with Kali Linux
unlocking industry-oriented VAPT tactics /[electronic resource] :Ummed Meel. - 1 online resource (386 pages)
Includes bibliographical references and index.
Advanced penetration testing with Kali Linux : unlocking industry-oriented VAPT tactics -- Dedicated -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Coloured Images -- Table of Contents -- Chapter 1: Beginning with Advanced Pen Testing -- Chapter 2: Setting up the VAPT Lab -- Chapter 3: Active and Passive Reconnaissance Tactics -- Chapter 4: Vulnerability Assessment and Management -- Chapter 5: Exploiting Computer Network -- Chapter 6: Exploiting Web Application -- Chapter 7: Exploiting Wireless Network -- Chapter 8: Hash Cracking and Post Exploitation -- Chapter 9: Bypass Security Controls -- Chapter 10: Revolutionary Approaches to Report Writing -- Index.
Access restricted to authorized users and institutions.
This book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds. Whether you are a beginner or an experienced IT professional, this book will give you the knowledge and practical skills you need to navigate the ever-changing cybersecurity landscape effectively. With a focused yet comprehensive scope, this book covers all aspects of VAPT, from the basics to the advanced techniques. It also discusses project planning, governance, and the critical PPT (People, Process, and Technology) framework, providing a holistic understanding of this essential practice. Additionally, the book emphasizes on the pre-engagement strategies and the importance of choosing the right security assessments. The book's hands-on approach teaches you how to set up a VAPT test lab and master key techniques such as reconnaissance, vulnerability assessment, network pentesting, web application exploitation, wireless network testing, privilege escalation, and bypassing security controls. This will help you to improve your cybersecurity skills and become better at protecting digital assets. Lastly, the book aims to ignite your curiosity, foster practical abilities, and prepare you to safeguard digital assets effectively, bridging the gap between theory and practice in the field of cybersecurity.
Mode of access: World Wide Web.
ISBN: 9789355519511Subjects--Topical Terms:
1483837
COMPUTERS / Security / Cryptography & Encryption.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9
Dewey Class. No.: 004.6
Advanced penetration testing with Kali Linux = unlocking industry-oriented VAPT tactics /
LDR
:03080nam a2200289 i 4500
001
1157314
006
m eo d
007
cr cn |||m|||a
008
250717s2023 ob 000 0 eng d
020
$a
9789355519511
020
$a
9789355519887
035
$a
BPB0000503
041
0
$a
eng
050
0 0
$a
QA76.9
082
0 0
$a
004.6
100
1
$a
Meel, Ummed.
$3
1483912
245
1 0
$a
Advanced penetration testing with Kali Linux
$h
[electronic resource] :
$b
unlocking industry-oriented VAPT tactics /
$c
Ummed Meel.
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2023.
264
4
$c
©2024
300
$a
1 online resource (386 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0
$a
Advanced penetration testing with Kali Linux : unlocking industry-oriented VAPT tactics -- Dedicated -- About the Author -- About the Reviewer -- Acknowledgement -- Preface -- Coloured Images -- Table of Contents -- Chapter 1: Beginning with Advanced Pen Testing -- Chapter 2: Setting up the VAPT Lab -- Chapter 3: Active and Passive Reconnaissance Tactics -- Chapter 4: Vulnerability Assessment and Management -- Chapter 5: Exploiting Computer Network -- Chapter 6: Exploiting Web Application -- Chapter 7: Exploiting Wireless Network -- Chapter 8: Hash Cracking and Post Exploitation -- Chapter 9: Bypass Security Controls -- Chapter 10: Revolutionary Approaches to Report Writing -- Index.
506
$a
Access restricted to authorized users and institutions.
520
3
$a
This book is a comprehensive guide to Vulnerability Assessment and Penetration Testing (VAPT), designed to teach and empower readers of all cybersecurity backgrounds. Whether you are a beginner or an experienced IT professional, this book will give you the knowledge and practical skills you need to navigate the ever-changing cybersecurity landscape effectively. With a focused yet comprehensive scope, this book covers all aspects of VAPT, from the basics to the advanced techniques. It also discusses project planning, governance, and the critical PPT (People, Process, and Technology) framework, providing a holistic understanding of this essential practice. Additionally, the book emphasizes on the pre-engagement strategies and the importance of choosing the right security assessments. The book's hands-on approach teaches you how to set up a VAPT test lab and master key techniques such as reconnaissance, vulnerability assessment, network pentesting, web application exploitation, wireless network testing, privilege escalation, and bypassing security controls. This will help you to improve your cybersecurity skills and become better at protecting digital assets. Lastly, the book aims to ignite your curiosity, foster practical abilities, and prepare you to safeguard digital assets effectively, bridging the gap between theory and practice in the field of cybersecurity.
538
$a
Mode of access: World Wide Web.
650
7
$a
COMPUTERS / Security / Cryptography & Encryption.
$2
bisacsh
$3
1483837
650
7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
650
7
$a
COMPUTERS / Networking / Network Protocols.
$2
bisacsh
$3
1483839
650
7
$a
COMPUTERS / Computer Science.
$2
bisacsh
$3
1483847
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000503.html
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入