Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
I tiakina i:
| Kaituhi matua: | |
|---|---|
| Ētahi atu kaituhi: | |
| Hōputu: | Tāhiko īPukapuka |
| Reo: | Ingarihi |
| I whakaputaina: |
Birmingham, England :
Packt Publishing Ltd,
2014.
|
| Rangatū: | Community experience distilled.
|
| Ngā marau: | |
| Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
| Ngā Tūtohu: |
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite: Mastering metasploit :
- Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Intrusion prevention and active response deploying network and host IPS /
- Intrusion prevention and active response deploying network and host IPS /
- Deployment guide series IBM Tivoli Security Compliance Manager /