Learning Kali Linux : security testing, penetration testing & ethical hacking / Ric Messier.
Material type:
TextLanguage: English Sebastopol: O'Reilly Media, 2024Edition: Second editionDescription: 518 pages. illustrations, 24cmContent type: - text
- unmediated
- volume
- 9781098154134
- QA76.774 .L46 M47 2024
| Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
MAIN | College of Computer Information Technology (CET) | QA76.774 .L46 M47 2024 (Browse shelf(Opens below)) | 1 | Available |
Browsing MAIN shelves, Collection: College of Computer Information Technology (CET) Close shelf browser (Hides shelf browser)
| QA76.73.J38 .E75 2011 Problem solving with data structures using Java: a multimedia approach / | QA76.73.P98 .B335 2024 Introduction to Python : with applications in optimization, image and video processing, and machine learning / | QA76.73 .P98 J65 2024 Hypermodern Python tooling : building reliable workflows for an evolving Python ecosystem / | QA76.774 .L46 M47 2024 Learning Kali Linux : security testing, penetration testing & ethical hacking / | QA76.9 .A25 B4833 2024 Defensive security handbook : best practices for securing infrastructure / | QA76.9.D3 C67 2022 Database Systems: Design, Implementation, & Management/ | QA76.9.D343 .J84 2025 Big Data Management and Analytics: Concepts, Tools, and Applications/ |
Includes index.
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Inside: explore the breadth of tools available on Kali Linux; understand the value of security testing and examine the testing types available; learn the basics of penetration testing through the entire attack lifecycle; install Kali Linux on multiple systems, both physical and virtual; discover how to use different security-focused tools; structure a security test around Kali Linux tools; extend Kali tools to create advanced attack techniques; and use Kali Linux to generate reports once testing is complete
There are no comments on this title.