Ethical hacking and penetration testing guide / Rafay Baloch.
Material type: TextPublication details: Broken Sound Parkway, N.W. : CRC Press, c2015Edition: 1st edDescription: xxvii, 503 p. : ill. ; 26 cmISBN: 9781482231618 (pbk.); 1482231611 (pbk.)Subject(s): Penetration testing (Computer security) | COMPUTERS / Security / General | COMPUTERS / Networking / General | LAW / Forensic ScienceDDC classification: 005.8 LOC classification: QA76.9.A25 | B35 2015Online resources: Cover image Summary: "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "--Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Staff Circulation | APU Library Open Shelf | Book | QA76.9.A25 B35 2015 c.1 (Browse shelf (Opens below)) | c.1 | Available (No use restrictions) | 00033864 | |
General Circulation | APU Library Open Shelf | Book | QA76.9.A25 B35 2015 c.2 (Browse shelf (Opens below)) | c.2 | Available (No use restrictions) | 00033865 | |
General Circulation | APU Library Open Shelf | Book | QA76.9.A25 B35 2015 c.3 (Browse shelf (Opens below)) | c.3 | Available (No use restrictions) | 00033866 | |
General Circulation | APU Library Open Shelf | Book | QA76.9.A25 B35 2015 c.4 (Browse shelf (Opens below)) | c.4 | Available | 00012804 |
Includes bibliographical references and index.
"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "--
There are no comments on this title.