Amazon cover image
Image from Amazon.com

Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity

By: Publication details: Shroff/Rheinwerk Computing 2023 IndiaEdition: 1stDescription: 1144ISBN:
  • 9789355424181
Subject(s): DDC classification:
  • 001.64 KOF
Summary: Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, including steps for mobile, cloud, and IoT security. Use this guide to ensure your system can withstand any threat!Understand IT system vulnerabilities and identify attack vectors Learn to secure multiple infrastructures, including Linux, Microsoft Windows, cloud, and mobile Master pen testing with tools like Metaspolit, Kali Linux, hydra, Open-VAS, Empire, Pwnagotchi, and more Key Concepts and Tools Set up your environment with Metasploitable and Juice Shop, install Kali Linux, and explore hacking tools like nmap, hydra, and Armitage that will assist you with the more complex practices covered in later chapters. Penetration Testing and Security Practices From man-in-the-middle attacks to finding vulnerabilities using nmap, walk step-by-step through client-side and network penetration testing. Master key security techniques like passwords, IT forensics, and safety checks and see how to secure Windows servers, Linux, Samba file servers, and web applications. Source: https://www.amazon.in/Hacking-Security-Comprehensive-Penetration-Cybersecurity/dp/9355424183/ref=sr_1_1?crid=10ULYQL6F617I&keywords=9789355424181&qid=1703141122&sprefix=%2Caps%2C732&sr=8-1
List(s) this item appears in: New Arrivals February 2024
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Book Book Main Library Information Technology Reference book 001.64 KOF (Browse shelf(Opens below)) Available 119116

Uncover security vulnerabilities and harden your system against attacks! With this guide you’ll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then with step-by-step instructions you’ll expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, including steps for mobile, cloud, and IoT security. Use this guide to ensure your system can withstand any threat!Understand IT system vulnerabilities and identify attack vectors

Learn to secure multiple infrastructures, including Linux, Microsoft Windows, cloud, and mobile
Master pen testing with tools like Metaspolit, Kali Linux, hydra, Open-VAS, Empire, Pwnagotchi, and more
Key Concepts and Tools
Set up your environment with Metasploitable and Juice Shop, install Kali Linux, and explore hacking tools like nmap, hydra, and Armitage that will assist you with the more complex practices covered in later chapters.

Penetration Testing and Security Practices
From man-in-the-middle attacks to finding vulnerabilities using nmap, walk step-by-step through client-side and network penetration testing. Master key security techniques like passwords, IT forensics, and safety checks and see how to secure Windows servers, Linux, Samba file servers, and web applications.

Source: https://www.amazon.in/Hacking-Security-Comprehensive-Penetration-Cybersecurity/dp/9355424183/ref=sr_1_1?crid=10ULYQL6F617I&keywords=9789355424181&qid=1703141122&sprefix=%2Caps%2C732&sr=8-1

There are no comments on this title.

to post a comment.

Powered by Koha