ISBN 10: 1516945867 / ISBN 13: 9781516945863
Usado / Cantidad: 0
Disponible en otras librerías
Ver todos  los ejemplares de este libro

Sobre el libro

Lamentablemente este ejemplar en específico ya no está disponible. A continuación, le mostramos una lista de copias similares.

Descripción:

Brand New, Unread Copy in Perfect Condition. A+ Customer Service!. N° de ref. de la librería

Sobre este título:

Valoración del libro brindada por Goodreads:
3,77 valoración promedio
(13 valoraciones)

Sinopsis:

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux 2”, you will learn how hackers find out information about your systems, locate weaknesses in your security and how they gain access to your devices.

This hands-on, step by step learning book doesn’t dwell on the theory of security, but instead walks you through implementing and using the latest security tools that are included in the most popular computer security testing platform, Kali Linux 2.

This book takes off were my first Basic book ends, showing you what has changed in the latest version of Kali Linux. We then cover putting together a penetration testing lab using Windows and Linux based systems.

Next we cover in-depth ways to use Metasploit, by seeing the latest techniques to create backdoor shells and bypassing anti-virus. We also cover automating Metasploit, including scripting based attacks using both Railgun and PowerShell.

In the web application section we cover many of the tools and techniques used against websites. Over 30 tools are covered ranging from scanning to exploiting, including the ever popular BurpSuite.

In the Attacking Smart Devices section we will see how to create virtual phones or tablets, getting remote shells on Android devices and how Wi-Fi and Man-in-The Middle attacks work against smart devices.

Lastly, the book has an entire section of using computer security tools for forensics, an Internet of Things section and an entire chapter devoted to defending your systems.

About the Author: Daniel W. Dieterle has worked in the IT field for over 20 years. During this time he worked for a computer support company where he provided system and network support for hundreds of companies across Upstate New York and throughout Northern Pennsylvania. He also worked in a Fortune 500 corporate data center, briefly worked at an Ivy League school’s computer support department and served as an executive at an electrical engineering company. For about the last 6 years Daniel has been completely focused on security as a computer security researcher and author. His articles have been published in international security magazines, and referenced by both technical entities and the media. Daniel has assisted with numerous security training classes and technical training books mainly based on Backtrack and Kali Linux.

"Sobre este título" puede pertenecer a otra edición de este libro.

Detalles bibliográficos

Condición del libro: New

Los mejores resultados en AbeBooks

1.

Dieterle, Daniel W.
ISBN 10: 1516945867 ISBN 13: 9781516945863
Nuevos Cantidad: > 20
Impresión bajo demanda
Librería
Pbshop
(Wood Dale, IL, Estados Unidos de America)
Valoración
[?]

Descripción 2015. PAP. Estado de conservación: New. New Book. Shipped from US within 10 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. de la librería IQ-9781516945863

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 27,81
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 3,37
A Estados Unidos de America
Destinos, gastos y plazos de envío

2.

Dieterle, Daniel W.
ISBN 10: 1516945867 ISBN 13: 9781516945863
Nuevos Cantidad: > 20
Impresión bajo demanda
Librería
Books2Anywhere
(Fairford, GLOS, Reino Unido)
Valoración
[?]

Descripción 2015. PAP. Estado de conservación: New. New Book. Delivered from our UK warehouse in 3 to 5 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Nº de ref. de la librería IQ-9781516945863

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 29,18
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 10,24
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

3.

Daniel W Dieterle
Editorial: Createspace Independent Publishing Platform, United States (2015)
ISBN 10: 1516945867 ISBN 13: 9781516945863
Nuevos Paperback Cantidad: 10
Impresión bajo demanda
Librería
The Book Depository
(London, Reino Unido)
Valoración
[?]

Descripción Createspace Independent Publishing Platform, United States, 2015. Paperback. Estado de conservación: New. Language: English . Brand New Book ***** Print on Demand *****.With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In Intermediate Security Testing with Kali Linux 2, you will learn how hackers find out information about your systems, locate weaknesses in your security and how they gain access to your devices. This hands-on, step by step learning book doesn t dwell on the theory of security, but instead walks you through implementing and using the latest security tools that are included in the most popular computer security testing platform, Kali Linux 2. This book takes off were my first Basic book ends, showing you what has changed in the latest version of Kali Linux. We then cover putting together a penetration testing lab using Windows and Linux based systems. Next we cover in-depth ways to use Metasploit, by seeing the latest techniques to create backdoor shells and bypassing anti-virus. We also cover automating Metasploit, including scripting based attacks using both Railgun and PowerShell. In the web application section we cover many of the tools and techniques used against websites. Over 30 tools are covered ranging from scanning to exploiting, including the ever popular BurpSuite. In the Attacking Smart Devices section we will see how to create virtual phones or tablets, getting remote shells on Android devices and how Wi-Fi and Man-in-The Middle attacks work against smart devices. Lastly, the book has an entire section of using computer security tools for forensics, an Internet of Things section and an entire chapter devoted to defending your systems. Nº de ref. de la librería APC9781516945863

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 32,44
Convertir moneda

Añadir al carrito

Gastos de envío: GRATIS
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

4.

Daniel W Dieterle
Editorial: Createspace Independent Publishing Platform, United States (2015)
ISBN 10: 1516945867 ISBN 13: 9781516945863
Nuevos Paperback Cantidad: 10
Impresión bajo demanda
Librería
The Book Depository US
(London, Reino Unido)
Valoración
[?]

Descripción Createspace Independent Publishing Platform, United States, 2015. Paperback. Estado de conservación: New. Language: English . Brand New Book ***** Print on Demand *****. With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In Intermediate Security Testing with Kali Linux 2, you will learn how hackers find out information about your systems, locate weaknesses in your security and how they gain access to your devices. This hands-on, step by step learning book doesn t dwell on the theory of security, but instead walks you through implementing and using the latest security tools that are included in the most popular computer security testing platform, Kali Linux 2. This book takes off were my first Basic book ends, showing you what has changed in the latest version of Kali Linux. We then cover putting together a penetration testing lab using Windows and Linux based systems. Next we cover in-depth ways to use Metasploit, by seeing the latest techniques to create backdoor shells and bypassing anti-virus. We also cover automating Metasploit, including scripting based attacks using both Railgun and PowerShell. In the web application section we cover many of the tools and techniques used against websites. Over 30 tools are covered ranging from scanning to exploiting, including the ever popular BurpSuite. In the Attacking Smart Devices section we will see how to create virtual phones or tablets, getting remote shells on Android devices and how Wi-Fi and Man-in-The Middle attacks work against smart devices. Lastly, the book has an entire section of using computer security tools for forensics, an Internet of Things section and an entire chapter devoted to defending your systems. Nº de ref. de la librería APC9781516945863

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 33,64
Convertir moneda

Añadir al carrito

Gastos de envío: GRATIS
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

5.

Dieterle, Daniel W
Editorial: CreateSpace Independent Publishing Platform
ISBN 10: 1516945867 ISBN 13: 9781516945863
Nuevos PAPERBACK Cantidad: > 20
Librería
Russell Books
(Victoria, BC, Canada)
Valoración
[?]

Descripción CreateSpace Independent Publishing Platform. PAPERBACK. Estado de conservación: New. 1516945867 Special order direct from the distributor. Nº de ref. de la librería ING9781516945863

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 34,21
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 5,90
De Canada a Estados Unidos de America
Destinos, gastos y plazos de envío

6.

Daniel W Dieterle
Editorial: CreateSpace Independent Publishing Platform (2015)
ISBN 10: 1516945867 ISBN 13: 9781516945863
Nuevos Paperback Cantidad: 1
Impresión bajo demanda
Librería
Revaluation Books
(Exeter, Reino Unido)
Valoración
[?]

Descripción CreateSpace Independent Publishing Platform, 2015. Paperback. Estado de conservación: Brand New. 494 pages. 9.25x7.50x1.12 inches. In Stock. This item is printed on demand. Nº de ref. de la librería __1516945867

Más información sobre esta librería | Hacer una pregunta a la librería

Comprar nuevo
EUR 61,64
Convertir moneda

Añadir al carrito

Gastos de envío: EUR 6,82
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío