Advanced penetration testing for highly-secured environments the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide /
Sábháilte in:
Príomhchruthaitheoir: | Allen, Lee |
---|---|
Údar corparáideach: | ebrary, Inc |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Birmingham, U.K. :
Packt Pub.,
2012.
|
Sraith: | Community experience distilled.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Handbook on securing cyber-physical critical infrastructure
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Syngress IT security project management handbook
de réir: Snedaker, Susan
Foilsithe / Cruthaithe: (2006)
de réir: Snedaker, Susan
Foilsithe / Cruthaithe: (2006)
Cyber warfare : techniques, tactics and tools for security practitioners /
de réir: Andress, Jason
Foilsithe / Cruthaithe: (2014)
de réir: Andress, Jason
Foilsithe / Cruthaithe: (2014)
Professional penetration testing creating and learning in a hacking lab /
de réir: Wilhelm, Thomas
Foilsithe / Cruthaithe: (2013)
de réir: Wilhelm, Thomas
Foilsithe / Cruthaithe: (2013)
Writing security tools and exploits
de réir: Foster, James C.
Foilsithe / Cruthaithe: (2006)
de réir: Foster, James C.
Foilsithe / Cruthaithe: (2006)
Puppet reporting and monitoring : create insightful reports for your server infrastructure using Puppet /
de réir: Duffy, Michael
Foilsithe / Cruthaithe: (2014)
de réir: Duffy, Michael
Foilsithe / Cruthaithe: (2014)
Information assurance handbook : effective computer security and risk management strategies /
de réir: Schou, Corey
Foilsithe / Cruthaithe: (2015)
de réir: Schou, Corey
Foilsithe / Cruthaithe: (2015)
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox /
de réir: Uygur, Stefan Umit
Foilsithe / Cruthaithe: (2014)
de réir: Uygur, Stefan Umit
Foilsithe / Cruthaithe: (2014)
Handbook of polymer testing short-term mechanical tests /
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
de réir: Ramachandran, Vivek
Foilsithe / Cruthaithe: (2011)
de réir: Ramachandran, Vivek
Foilsithe / Cruthaithe: (2011)
Hacking with Kali : practical penetration testing techniques /
de réir: Broad, James
Foilsithe / Cruthaithe: (2014)
de réir: Broad, James
Foilsithe / Cruthaithe: (2014)
Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals /
de réir: Johns, A. (Aaron)
Foilsithe / Cruthaithe: (2015)
de réir: Johns, A. (Aaron)
Foilsithe / Cruthaithe: (2015)
Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework /
de réir: Singh, Abhinav
Foilsithe / Cruthaithe: (2012)
de réir: Singh, Abhinav
Foilsithe / Cruthaithe: (2012)
How to cheat at securing a wireless network
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
WCF multi-tier services development with LINQ build SOA applications on the Microsoft platform in this hands-on guide /
de réir: Liu, Ming T. (Ming-Tsan)
Foilsithe / Cruthaithe: (2008)
de réir: Liu, Ming T. (Ming-Tsan)
Foilsithe / Cruthaithe: (2008)
Diagnostic tests toolkit
de réir: Thompson, Matthew J.
Foilsithe / Cruthaithe: (2012)
de réir: Thompson, Matthew J.
Foilsithe / Cruthaithe: (2012)
Metasploit penetration testing cookbook /
de réir: Agarwal, Monika
Foilsithe / Cruthaithe: (2013)
de réir: Agarwal, Monika
Foilsithe / Cruthaithe: (2013)
The handbook of hybrid securities : convertible bonds, coco bonds, and bail-in /
de réir: Spiegeleer, Jan de, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Spiegeleer, Jan de, et al.
Foilsithe / Cruthaithe: (2014)
Computer and information security handbook
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Penetration testing : a hands-on introduction to hacking /
de réir: Weidman, Georgia
Foilsithe / Cruthaithe: (2014)
de réir: Weidman, Georgia
Foilsithe / Cruthaithe: (2014)
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
de réir: Wallace, Michael, 1960-
Foilsithe / Cruthaithe: (2004)
de réir: Wallace, Michael, 1960-
Foilsithe / Cruthaithe: (2004)
Security supervision and management the theory and practice of asset protection /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Skin penetration hazardous chemicals at work /
de réir: Grandjean, Philippe
Foilsithe / Cruthaithe: (1990)
de réir: Grandjean, Philippe
Foilsithe / Cruthaithe: (1990)
Steal this computer book 3 what they won't tell you about the Internet /
de réir: Wang, Wally
Foilsithe / Cruthaithe: (2003)
de réir: Wang, Wally
Foilsithe / Cruthaithe: (2003)
The extreme searcher's internet handbook : a guide for he serious searcher /
de réir: Hock, Randolph
Foilsithe / Cruthaithe: (2007)
de réir: Hock, Randolph
Foilsithe / Cruthaithe: (2007)
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
de réir: Engebretson, Pat (Patrick Henry), 1974-
Foilsithe / Cruthaithe: (2013)
de réir: Engebretson, Pat (Patrick Henry), 1974-
Foilsithe / Cruthaithe: (2013)
Oracle 11g anti-hacker's cookbook
de réir: Neagu, Adrian
Foilsithe / Cruthaithe: (2012)
de réir: Neagu, Adrian
Foilsithe / Cruthaithe: (2012)
Handbook of psychoeducational assessment ability, achievement, and behavior in children /
Foilsithe / Cruthaithe: (2001)
Foilsithe / Cruthaithe: (2001)
Microelectronic failure analysis desk reference.
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
Microelectronic failure analysis desk reference : 2001 supplement /
Foilsithe / Cruthaithe: (2001)
Foilsithe / Cruthaithe: (2001)
Microelectronics failure analysis desk reference /
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
The reference guide to data sources /
de réir: Bauder, Julia
Foilsithe / Cruthaithe: (2014)
de réir: Bauder, Julia
Foilsithe / Cruthaithe: (2014)
Interpreting lung function tests : a step-by-step guide /
de réir: Borg, Brigitte M. (Marianne), 1970-, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Borg, Brigitte M. (Marianne), 1970-, et al.
Foilsithe / Cruthaithe: (2014)
Macs
de réir: McFedries, Paul
Foilsithe / Cruthaithe: (2008)
de réir: McFedries, Paul
Foilsithe / Cruthaithe: (2008)
Developing government bond markets a handbook.
Foilsithe / Cruthaithe: (2001)
Foilsithe / Cruthaithe: (2001)
Standardized assessment and test construction without anguish the complete step-by-step guide to test design, administration, scoring, analysis, and interpretation /
de réir: Shawer, Saad F. (Saad Fathy)
Foilsithe / Cruthaithe: (2010)
de réir: Shawer, Saad F. (Saad Fathy)
Foilsithe / Cruthaithe: (2010)
Journey to the center of the Internet
de réir: Hahn, Pamela Rice
Foilsithe / Cruthaithe: (2002)
de réir: Hahn, Pamela Rice
Foilsithe / Cruthaithe: (2002)
Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /
de réir: Hutchens, Justin
Foilsithe / Cruthaithe: (2014)
de réir: Hutchens, Justin
Foilsithe / Cruthaithe: (2014)
The neuropsychology handbook
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Clinician's handbook of adult behavioral assessment
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Míreanna comhchosúla
-
Handbook on securing cyber-physical critical infrastructure
Foilsithe / Cruthaithe: (2012) -
Syngress IT security project management handbook
de réir: Snedaker, Susan
Foilsithe / Cruthaithe: (2006) -
Cyber warfare : techniques, tactics and tools for security practitioners /
de réir: Andress, Jason
Foilsithe / Cruthaithe: (2014) -
Professional penetration testing creating and learning in a hacking lab /
de réir: Wilhelm, Thomas
Foilsithe / Cruthaithe: (2013) -
Writing security tools and exploits
de réir: Foster, James C.
Foilsithe / Cruthaithe: (2006)