Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
Shranjeno v:
| Glavni avtor: | |
|---|---|
| Drugi avtorji: | |
| Format: | Elektronski eKnjiga |
| Jezik: | angleščina |
| Izdano: |
Birmingham, England :
Packt Publishing Ltd,
2014.
|
| Serija: | Community experience distilled.
|
| Teme: | |
| Online dostop: | An electronic book accessible through the World Wide Web; click to view |
| Oznake: |
Brez oznak, prvi označite!
|
Podobne knjige/članki: Mastering metasploit :
- Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Intrusion prevention and active response deploying network and host IPS /
- Intrusion prevention and active response deploying network and host IPS /
- Deployment guide series IBM Tivoli Security Compliance Manager /