Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Birmingham, England :
Packt Publishing Ltd,
2014.
|
| Series: | Community experience distilled.
|
| Subjects: | |
| Online Access: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
No Tags, Be the first to tag this record!
|
Similar Items: Mastering metasploit :
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Intrusion prevention and active response deploying network and host IPS /
- Deployment guide series IBM Tivoli Security Compliance Manager /
- Role-based access control
- Security intelligence : a practitioner's guide to solving enterprise security challenges /
- Penetration tester's open source toolkit