Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Prix Kindle : EUR 14,02

Économisez
EUR 19,73 (58%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Repliez vers l'arrière Repliez vers l'avant
Narration Audible Lecture en cours... Interrompu   Vous écoutez un extrait de la narration Audible pour ce livre Kindle.
En savoir plus

Kali Linux Cookbook Format Kindle


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Format Kindle, 15 octobre 2013
EUR 14,02

Longueur : 262 pages Optimisé pour de plus grands écrans Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger

Ponts de mai 2016 Promo Ponts de mai 2016


Descriptions du produit

Présentation de l'éditeur

In Detail

In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to break into your system or network helps you plug the loopholes before it's too late and can save you countless hours and money. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution.

Discover a variety of popular tools of penetration testing, such as information gathering, vulnerability identification, exploitation, privilege escalation, and covering your tracks.

Packed with practical recipes, this useful guide begins by covering the installation of Kali Linux and setting up a virtual environment to perform your tests. You will then learn how to eavesdrop and intercept traffic on wireless networks, bypass intrusion detection systems, and attack web applications, as well as checking for open ports, performing data forensics, and much more. The book follows the logical approach of a penetration test from start to finish with many screenshots and illustrations that help to explain each tool in detail. The Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike!

Approach

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.

Who this book is for

This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.

Biographie de l'auteur

Willie L. Pritchett

Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT fi eld. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management fi rm specializing in secure, data-driven, application development, and staffi ng services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifi cations and currently trains students on various topics including ethical hacking and penetration testing.



David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specifi cation analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.


Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 31761 KB
  • Nombre de pages de l'édition imprimée : 262 pages
  • Pagination - ISBN de l'édition imprimée de référence : 1783289597
  • Editeur : Packt Publishing (15 octobre 2013)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B00FXJCWYU
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°247.000 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x9637c9f0) étoiles sur 5 6 commentaires
5 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x96eb0570) étoiles sur 5 Kali LInux Cookbooks 20 février 2014
Par Jurandir - Publié sur Amazon.com
Format: Broché Achat vérifié
The examples do not match, there are many mistakes... wrote to the author, no reply... disappointed !

I really expected more...
4 internautes sur 4 ont trouvé ce commentaire utile 
HASH(0x96eb090c) étoiles sur 5 There are better options with better writing 9 février 2014
Par Amazon Customer - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Nothing is explained, horrible writing with plenty of errors. Save your money and look at some other similar books on Kali.
5 internautes sur 6 ont trouvé ce commentaire utile 
HASH(0x96eb087c) étoiles sur 5 Move along, this is not the Kali Linux book you are looking for. 24 janvier 2014
Par Amazon Customer - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Poorly written !!!

"How it works..." sections explain nothing.

Complex commands are presented with no background or explanation of their purpose or arguments.

If I could return this book, I would.

A "cookbook" does not provide an author with license to string together a hundred incomplete ideas and call it publishable work.

As I read, I wonder "did anyone review or edit this before sending it off to press ?!"
HASH(0x96eb0d38) étoiles sur 5 surveys the field 8 décembre 2013
Par W Boudville - Publié sur Amazon.com
Format: Broché
The back cover sounds like a not so covert inducement to train as a subversive attacker. Sections of the first chapter might also be construed that way. But the authors are correct in explaining that you, as a defensive sysadmin, need to understand the methods that an attacker can use against your network.

Know the enemy.

Useful too and indeed is the explanation of VirtualBox. Made by Oracle no less. So if you are somewhat dubious about random packages trolled on the web, its parentage should be reassuring. It provides a secure [hopefully !] sandbox in which to test various virtual operating systems. Indeed, the book can be read in part as a nice guide to installing and running VirtualBox.

Chapters 4 onwards in the text are where you focus on actually scoping out an unknown network. The narrative delves into using existing tools like nmap to scrutinise that network. There is also a program called maltego written external to Kali and similarly used for threat assessment. Kali apparently bundles a version of it. So via Kali you effectively have a superset of maltego. If you come from prior experience with maltego, that might be a useful way to understand Kali.

The book takes us into the use of Nessus, another renowned network prober. And then ditto for Metasploit.

This de facto survey of the penetration field is a virtue of Kali.
1 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x96b67ed0) étoiles sur 5 Kali Linux 29 mars 2014
Par Torrez - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
This particular book does not detail the recipes enough with explanation to what's going on it seems to skim over a lot of details...Still searching for something superior to this ...
Ces commentaires ont-ils été utiles ? Dites-le-nous

Discussions entre clients