Reconnaissance for Ethical Hackers : Focus on the starting point of data breaches and explore essential steps for successful pentesting
Enregistré dans:
Auteur principal: | Singh, Glen D.. (Auteur) |
---|---|
Support: | E-Book |
Langue: | Anglais |
Publié: |
Birmingham :
Packt Publishing.
|
Autres localisations: | Voir dans le Sudoc |
Accès en ligne: | Accès à l'E-book |
Documents similaires
-
Penetration Testing Azure for Ethical Hackers : Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
par: Okeyode, David.
Publié: 2021 -
Malware Development for Ethical Hackers : Learn how to develop various types of malware to strengthen cybersecurity
par: Zhussupov, Zhassulan. -
Kali Linux - an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
par: Sharma, Himanshu.
Publié: 2019 -
CEH v11 Certified Ethical Hacker Study Guide
par: Messier, Ric. -
Ethical Hacker's Penetration Testing Guide : Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (English Edition)
par: Kumar Rakshit, Samir.
Publié: 2022