Advanced penetration testing for highly-secured environments the ultimate security guide : learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide /
I tiakina i:
Kaituhi matua: | Allen, Lee |
---|---|
Kaituhi rangatōpū: | ebrary, Inc |
Hōputu: | Tāhiko īPukapuka |
Reo: | Ingarihi |
I whakaputaina: |
Birmingham, U.K. :
Packt Pub.,
2012.
|
Rangatū: | Community experience distilled.
|
Ngā marau: | |
Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite
Handbook on securing cyber-physical critical infrastructure
I whakaputaina: (2012)
I whakaputaina: (2012)
Syngress IT security project management handbook
mā: Snedaker, Susan
I whakaputaina: (2006)
mā: Snedaker, Susan
I whakaputaina: (2006)
Cyber warfare : techniques, tactics and tools for security practitioners /
mā: Andress, Jason
I whakaputaina: (2014)
mā: Andress, Jason
I whakaputaina: (2014)
Professional penetration testing creating and learning in a hacking lab /
mā: Wilhelm, Thomas
I whakaputaina: (2013)
mā: Wilhelm, Thomas
I whakaputaina: (2013)
Writing security tools and exploits
mā: Foster, James C.
I whakaputaina: (2006)
mā: Foster, James C.
I whakaputaina: (2006)
Puppet reporting and monitoring : create insightful reports for your server infrastructure using Puppet /
mā: Duffy, Michael
I whakaputaina: (2014)
mā: Duffy, Michael
I whakaputaina: (2014)
Information assurance handbook : effective computer security and risk management strategies /
mā: Schou, Corey
I whakaputaina: (2015)
mā: Schou, Corey
I whakaputaina: (2015)
Penetration testing with backbox : an introductory guide to performing crucial penetration testing operations using backbox /
mā: Uygur, Stefan Umit
I whakaputaina: (2014)
mā: Uygur, Stefan Umit
I whakaputaina: (2014)
Handbook of polymer testing short-term mechanical tests /
I whakaputaina: (2002)
I whakaputaina: (2002)
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
mā: Ramachandran, Vivek
I whakaputaina: (2011)
mā: Ramachandran, Vivek
I whakaputaina: (2011)
Hacking with Kali : practical penetration testing techniques /
mā: Broad, James
I whakaputaina: (2014)
mā: Broad, James
I whakaputaina: (2014)
Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals /
mā: Johns, A. (Aaron)
I whakaputaina: (2015)
mā: Johns, A. (Aaron)
I whakaputaina: (2015)
Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework /
mā: Singh, Abhinav
I whakaputaina: (2012)
mā: Singh, Abhinav
I whakaputaina: (2012)
How to cheat at securing a wireless network
I whakaputaina: (2006)
I whakaputaina: (2006)
WCF multi-tier services development with LINQ build SOA applications on the Microsoft platform in this hands-on guide /
mā: Liu, Ming T. (Ming-Tsan)
I whakaputaina: (2008)
mā: Liu, Ming T. (Ming-Tsan)
I whakaputaina: (2008)
Diagnostic tests toolkit
mā: Thompson, Matthew J.
I whakaputaina: (2012)
mā: Thompson, Matthew J.
I whakaputaina: (2012)
Metasploit penetration testing cookbook /
mā: Agarwal, Monika
I whakaputaina: (2013)
mā: Agarwal, Monika
I whakaputaina: (2013)
The handbook of hybrid securities : convertible bonds, coco bonds, and bail-in /
mā: Spiegeleer, Jan de, me ētahi atu.
I whakaputaina: (2014)
mā: Spiegeleer, Jan de, me ētahi atu.
I whakaputaina: (2014)
Computer and information security handbook
I whakaputaina: (2013)
I whakaputaina: (2013)
Penetration testing : a hands-on introduction to hacking /
mā: Weidman, Georgia
I whakaputaina: (2014)
mā: Weidman, Georgia
I whakaputaina: (2014)
The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
mā: Wallace, Michael, 1960-
I whakaputaina: (2004)
mā: Wallace, Michael, 1960-
I whakaputaina: (2004)
Security supervision and management the theory and practice of asset protection /
I whakaputaina: (2008)
I whakaputaina: (2008)
Skin penetration hazardous chemicals at work /
mā: Grandjean, Philippe
I whakaputaina: (1990)
mā: Grandjean, Philippe
I whakaputaina: (1990)
Steal this computer book 3 what they won't tell you about the Internet /
mā: Wang, Wally
I whakaputaina: (2003)
mā: Wang, Wally
I whakaputaina: (2003)
The extreme searcher's internet handbook : a guide for he serious searcher /
mā: Hock, Randolph
I whakaputaina: (2007)
mā: Hock, Randolph
I whakaputaina: (2007)
The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
mā: Engebretson, Pat (Patrick Henry), 1974-
I whakaputaina: (2013)
mā: Engebretson, Pat (Patrick Henry), 1974-
I whakaputaina: (2013)
Oracle 11g anti-hacker's cookbook
mā: Neagu, Adrian
I whakaputaina: (2012)
mā: Neagu, Adrian
I whakaputaina: (2012)
Handbook of psychoeducational assessment ability, achievement, and behavior in children /
I whakaputaina: (2001)
I whakaputaina: (2001)
Microelectronic failure analysis desk reference.
I whakaputaina: (2002)
I whakaputaina: (2002)
Microelectronic failure analysis desk reference : 2001 supplement /
I whakaputaina: (2001)
I whakaputaina: (2001)
Microelectronics failure analysis desk reference /
I whakaputaina: (2011)
I whakaputaina: (2011)
The reference guide to data sources /
mā: Bauder, Julia
I whakaputaina: (2014)
mā: Bauder, Julia
I whakaputaina: (2014)
Interpreting lung function tests : a step-by-step guide /
mā: Borg, Brigitte M. (Marianne), 1970-, me ētahi atu.
I whakaputaina: (2014)
mā: Borg, Brigitte M. (Marianne), 1970-, me ētahi atu.
I whakaputaina: (2014)
Macs
mā: McFedries, Paul
I whakaputaina: (2008)
mā: McFedries, Paul
I whakaputaina: (2008)
Developing government bond markets a handbook.
I whakaputaina: (2001)
I whakaputaina: (2001)
Standardized assessment and test construction without anguish the complete step-by-step guide to test design, administration, scoring, analysis, and interpretation /
mā: Shawer, Saad F. (Saad Fathy)
I whakaputaina: (2010)
mā: Shawer, Saad F. (Saad Fathy)
I whakaputaina: (2010)
Journey to the center of the Internet
mā: Hahn, Pamela Rice
I whakaputaina: (2002)
mā: Hahn, Pamela Rice
I whakaputaina: (2002)
Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /
mā: Hutchens, Justin
I whakaputaina: (2014)
mā: Hutchens, Justin
I whakaputaina: (2014)
The neuropsychology handbook
I whakaputaina: (2008)
I whakaputaina: (2008)
Clinician's handbook of adult behavioral assessment
I whakaputaina: (2006)
I whakaputaina: (2006)
Ngā tūemi rite
-
Handbook on securing cyber-physical critical infrastructure
I whakaputaina: (2012) -
Syngress IT security project management handbook
mā: Snedaker, Susan
I whakaputaina: (2006) -
Cyber warfare : techniques, tactics and tools for security practitioners /
mā: Andress, Jason
I whakaputaina: (2014) -
Professional penetration testing creating and learning in a hacking lab /
mā: Wilhelm, Thomas
I whakaputaina: (2013) -
Writing security tools and exploits
mā: Foster, James C.
I whakaputaina: (2006)