Ethical hacking and penetration testing guide / Rafay Baloch.

By: Baloch, RafayMaterial type: TextTextPublisher: Boca Raton : CRC Press, Taylor & Francis Group, [2015]Copyright date: ©2015Description: xxvii, 503 pages : illustrations ; 26 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781482231618 (paperback); 1482231611 (paperback)Subject(s): Penetration testing (Computer security) | COMPUTERS / Security / General | COMPUTERS / Networking / General | LAW / Forensic ScienceDDC classification: 005.8 BAL LOC classification: QA76.9.A25 | B356 2015Other classification: COM053000 | COM043000 | LAW041000 Online resources: Cover image Summary: "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Collection Shelving location Call number Status Date due Barcode Item holds
Book Book Central Library (CL)
Central Library (CL)
NFIC First Floor - Artificial Intelligence/Data Mining 005.8 BAL (Browse shelf) Available SEECS013687
Total holds: 0

Includes bibliographical references and index.

"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- Provided by publisher.

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.