|
|
Books > Health, Home & Family > Self-help & practical interests > Consumer guides & advice
Get up to speed with various penetration testing techniques and
resolve security threats of varying complexity Key Features Enhance
your penetration testing skills to tackle security threats Learn to
gather information, find vulnerabilities, and exploit enterprise
defenses Navigate secured systems with the most up-to-date version
of Kali Linux (2019.1) and Metasploit (5.0.0) Book
DescriptionSending information via the internet is not entirely
private, as evidenced by the rise in hacking, malware attacks, and
security threats. With the help of this book, you'll learn crucial
penetration testing techniques to help you evaluate enterprise
defenses. You'll start by understanding each stage of pentesting
and deploying target virtual machines, including Linux and Windows.
Next, the book will guide you through performing intermediate
penetration testing in a controlled environment. With the help of
practical use cases, you'll also be able to implement your learning
in real-world scenarios. By studying everything from setting up
your lab, information gathering and password attacks, through to
social engineering and post exploitation, you'll be able to
successfully overcome security threats. The book will even help you
leverage the best tools, such as Kali Linux, Metasploit, Burp
Suite, and other open source pentesting tools to perform these
techniques. Toward the later chapters, you'll focus on best
practices to quickly resolve security threats. By the end of this
book, you'll be well versed with various penetration testing
techniques so as to be able to tackle security threats effectively
What you will learn Perform entry-level penetration tests by
learning various concepts and techniques Understand both common and
not-so-common vulnerabilities from an attacker's perspective Get
familiar with intermediate attack methods that can be used in
real-world scenarios Understand how vulnerabilities are created by
developers and how to fix some of them at source code level Become
well versed with basic tools for ethical hacking purposes Exploit
known vulnerable services with tools such as Metasploit Who this
book is forIf you're just getting started with penetration testing
and want to explore various security domains, this book is for you.
Security professionals, network engineers, and amateur ethical
hackers will also find this book useful. Prior knowledge of
penetration testing and ethical hacking is not necessary.
 |
A Newbies Guide to iPhone 8
- The Unofficial Handbook to iPhone and iOS 10 (Includes iPhone 5, 5s, 5c, iPhone 6, 6 Plus, 6s, 6s Plus, iPhone SE, iPhone 7,7 Plus, iPhone 8, and iPhone 8 Plus)
(Paperback)
Minute Help Guides
|
R419
Discovery Miles 4 190
|
Ships in 18 - 22 working days
|
|
|
This book is an essential tourist guide to gemstones in Great
Britain. It is a 'how to' manual for hobbyists, frequent travellers
and those already in the jewellery trade with little knowledge
about British gemstones. I have written it to help you feel more
confident about the buying process. The gem trade is rather a
secretive industry and this is as true in Britain as anywhere else
in the world. There's a vast array of myths, inaccuracies and very
deliberate deceptions out there, but don't let that put you off -
my clear and jargon-free guidance will allow you to navigate your
gemstone buying journey with ease. Whether you are hoping to treat
yourself to an extra-special souvenir of your latest adventure,
buying supplies for your jewellery-making venture or travelling to
learn more about the gemstone industry, what could be more exciting
than buying your gemstone in the very country whose earth formed
it? This book will give you the vital information you need before
making your purchase. In it, I disclose what websites don't tell
you. I'll reveal: Who to trust What to look for When to walk away
|
|