Asia Pacific University Library catalogue


Ethical hacking and penetration testing guide / Rafay Baloch.

By: Baloch, RafayMaterial type: TextTextPublication details: Broken Sound Parkway, N.W. : CRC Press, c2015Edition: 1st edDescription: xxvii, 503 p. : ill. ; 26 cmISBN: 9781482231618 (pbk.); 1482231611 (pbk.)Subject(s): Penetration testing (Computer security) | COMPUTERS / Security / General | COMPUTERS / Networking / General | LAW / Forensic ScienceDDC classification: 005.8 LOC classification: QA76.9.A25 | B35 2015Online resources: Cover image Summary: "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "--
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
Staff Circulation Staff Circulation APU Library
Open Shelf
Book QA76.9.A25 B35 2015 c.1 (Browse shelf (Opens below)) c.1 Available (No use restrictions) 00033864
General Circulation General Circulation APU Library
Open Shelf
Book QA76.9.A25 B35 2015 c.2 (Browse shelf (Opens below)) c.2 Available (No use restrictions) 00033865
General Circulation General Circulation APU Library
Open Shelf
Book QA76.9.A25 B35 2015 c.3 (Browse shelf (Opens below)) c.3 Available (No use restrictions) 00033866
General Circulation General Circulation APU Library
Open Shelf
Book QA76.9.A25 B35 2015 c.4 (Browse shelf (Opens below)) c.4 Available 00012804
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 A68 2008 c.2 Malware forensics : QA76.9.A25 B34 2002 c.1 Privacy defended : QA76.9.A25 B35 2015 c.1 Ethical hacking and penetration testing guide / QA76.9.A25 B35 2015 c.2 Ethical hacking and penetration testing guide / QA76.9.A25 B35 2015 c.3 Ethical hacking and penetration testing guide / QA76.9.A25 B35 2015 c.4 Ethical hacking and penetration testing guide / QA76.9.A25 B37 2011 c.1 Applied information security :

Includes bibliographical references and index.

"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "--

There are no comments on this title.

to post a comment.