Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
Gorde:
| Egile nagusia: | |
|---|---|
| Beste egile batzuk: | |
| Formatua: | Baliabide elektronikoa eBook |
| Hizkuntza: | ingelesa |
| Argitaratua: |
Birmingham, England :
Packt Publishing Ltd,
2014.
|
| Saila: | Community experience distilled.
|
| Gaiak: | |
| Sarrera elektronikoa: | An electronic book accessible through the World Wide Web; click to view |
| Etiketak: |
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!
|
Antzeko izenburuak: Mastering metasploit :
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Intrusion prevention and active response deploying network and host IPS /
- Deployment guide series IBM Tivoli Security Compliance Manager /
- Role-based access control
- Security intelligence : a practitioner's guide to solving enterprise security challenges /
- Penetration tester's open source toolkit