Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
Guardat en:
| Autor principal: | |
|---|---|
| Altres autors: | |
| Format: | Electrònic eBook |
| Idioma: | anglès |
| Publicat: |
Birmingham, England :
Packt Publishing Ltd,
2014.
|
| Col·lecció: | Community experience distilled.
|
| Matèries: | |
| Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
| Etiquetes: |
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars: Mastering metasploit :
- Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Intrusion prevention and active response deploying network and host IPS /
- Intrusion prevention and active response deploying network and host IPS /
- Deployment guide series IBM Tivoli Security Compliance Manager /