The basics of hacking and penetration testing ethical hacking and penetration testing made easy /
Furkejuvvon:
| Váldodahkki: | |
|---|---|
| Searvvušdahkki: | |
| Eará dahkkit: | |
| Materiálatiipa: | Elektrovnnalaš E-girji |
| Giella: | eaŋgalasgiella |
| Almmustuhtton: |
Amsterdam :
Syngress, an imprint of Elsevier,
2013.
|
| Preanttus: | 2nd ed. |
| Fáttát: | |
| Liŋkkat: | An electronic book accessible through the World Wide Web; click to view |
| Fáddágilkorat: |
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
Sisdoallologahallan:
- What is Penetration Testing?
- Reconnaissance
- Scanning
- Exploitation
- Web Based Exploitation
- Maintaining Access with Backdoors and Rootkits
- Wrapping Up the Penetration Test.