Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Basic Security Testing with Kali Linux

Buy

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.

In “Basic Security Testing with Kali Linux”, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.

This hands-on, step by step learning book covers topics like:

  • Kali Linux Introduction and Overview
  • Metasploit & Metasploitable 2 Tutorials
  • Information Gathering
  • A section on Shodan (the “Hacker’s Google”)
  • Exploiting Windows and Linux Systems
  • Escalating Privileges in Windows
  • Wireless (WiFi) Attacks
  • Social Engineering Attacks
  • Password Attacks
  • Kali on a Raspberry Pi
  • Securing your Network

Though no network can be completely “Hacker Proof”, knowing how an attacker works will help put you on the right track of better securing your network.

(HTML tags aren't allowed.)

Beginning Programming (Wrox Beginning Guides)
Beginning Programming (Wrox Beginning Guides)
A common misconception about programming is that it can only be done on a professional level by someone with years of experience. This book proves exactly the opposite and provides nonprogrammers with assistance in learning the programming basics that will enable them to eventually become professional developers or programming hobbyists.

...

Formal Models of Operating System Kernels
Formal Models of Operating System Kernels
The work that this book represents is something I have wanted to do since 1979. While in Ireland, probably in 2001, I sketched some parts of a small operating system specification in Z but left it because of other duties. In 2002, I worked on the sketches again but was interrupted. Finally, in April, 2005, I decided to devote some time to it and...
Mastering Virtual Machine Manager 2008 R2
Mastering Virtual Machine Manager 2008 R2

One-of-a-kind guide from Microsoft insiders on Virtual Machine Manager 2008 R2!

What better way to learn VMM 2008 R2 than from the high-powered Microsoft program managers themselves? This stellar author team takes you under the hood of VMM 2008 R2, providing intermediate and advanced coverage of all features.


Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
"The author, who specialises in digital and interactive media, sets out the arguments with a view to readers being able to make informed decisions on the issues before them." -Book Shelf

Digital rights management (DRM) is a type of server software developed to enable secure distribution - and perhaps more
...
Kinematic Analysis of Robot Manipulators
Kinematic Analysis of Robot Manipulators

This text provides a first-level understanding of the structure, mobility, and analysis of serial manipulators. A serial manipulator is an unclosed or open movable polygon consisting of a series of links and joints. One end is fixed to ground, and attached to the open end is a hand or end effector that can move freely in space.

The...

Formal Verification: An Essential Toolkit for Modern VLSI Design
Formal Verification: An Essential Toolkit for Modern VLSI Design

Formal Verification: An Essential Toolkit for Modern VLSI Design presents practical approaches for design and validation, with hands-on advice to help working engineers integrate these techniques into their work. Formal Verification (FV) enables a designer to directly analyze and mathematically explore the quality or other aspects of a...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy