EUR 34,79
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Kali Linux – Assuring Security by Penetration Testing (Anglais) Broché – 7 avril 2014

4,2 étoiles sur 5
5 étoiles
6
4 étoiles
4
3 étoiles
2
2 étoiles
1
1 étoile
0
4,2 étoiles sur 5 13 commentaires provenant des USA

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 34,79
EUR 34,79 EUR 58,68
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Prime bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations

rentrée scolaire 2017 rentrée scolaire 2017

click to open popover

Offres spéciales et liens associés


Description du produit

Présentation de l'éditeur

Master the art of penetration testing with Kali Linux

About This Book

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits

Who This Book Is For

If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, this book is for you.

What You Will Learn

  • Develop the Kali Linux environment in your test lab by installing, configuring, running, and updating its core system components
  • Perform a formal Kali Linux testing methodology
  • Scope your target with definitive test requirements, limitations, business objectives, and schedule the test plan
  • Exercise a number of security tools from Kali Linux, logically divided into subcategories of testing methodology
  • Practice the processes of reconnaissance, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, and maintaining access to target for evaluation purposes
  • Document, report, and present your verified test results to the relevant authorities in a formal reporting structure

In Detail

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.

Kali Linux– Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.

Biographie de l'auteur

Lee Allen

Lee Allen is currently working as a security architect at a prominent university. Throughout the years, he has continued his attempts to remain up to date with the latest and greatest developments in the security industry and the security community. He has several industry certifications including the OSWP and has been working in the IT industry for over 15 years. Lee Allen is the author of Advanced Penetration Testing for HighlySecured Environments: The Ultimate Security Guide, Packt Publishing.



Tedi Heriyanto

Tedi Heriyanto currently works as a principal consultant in an Indonesian information security company. In his current role, he has been engaged with various penetration testing assignments in Indonesia and other countries. In his previous role, he was engaged with several wellknown business institutions across Indonesia and overseas. Tedi has an excellent track record in designing secure network architecture, deploying and managing enterprisewide security systems, developing information security policies and procedures, performing information security audits and assessments, and providing information security awareness training. In his spare time, he manages to research, learn, and participate in the Indonesian Security Community activities and has a blog http://theriyanto.wordpress.com. He shares his knowledge in the security fi eld by writing several information security books.



Shakeel Ali

Shakeel Ali is a Security and Risk Management consultant at Fortune 500. Previously, he was the key founder of Cipher Storm Ltd., UK. His expertise in the security industry markedly exceeds the standard number of security assessments, audits, compliance, governance, and forensic projects that he carries out in daytoday operations. He has also served as a Chief Security Officer at CSS Providers SAL. As a senior security evangelist and having spent endless nights without taking a nap, he provides constant security support to various businesses, educational organizations, and government institutions globally. He is an active, independent researcher who writes various articles and whitepapers and manages a blog at EthicalHacker.net. Also, he regularly participates in BugCon Security Conferences held in Mexico, to highlight the bestofbreed cyber security threats and their solutions from practically driven countermeasures.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta) (Peut contenir des commentaires issus du programme Early Reviewer Rewards)

Amazon.com: 4.2 étoiles sur 5 13 commentaires
2 internautes sur 2 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Nice intro and provides some basics on installation 7 juillet 2014
Par Kindle Customer - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Nice intro and provides some basics on installation. Fairly okay in terms of very general information. You could stand to learn more on the Kali.org website. The manual provides decent information on downloading, installation by means of USB, disk or by using a virtual machine. Other than that, it earns a 3 star rating for what is well provided. Beyond that, it spends way too much time on explaining the writers and their backgrounds!
5.0 étoiles sur 5 Great Read 19 juillet 2016
Par Drake! - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Great book and is an easy read with a lot of references and diagrams. I recommend it to anyone in the InfoSec world that is focusing on the Penetration Testing..
3.0 étoiles sur 5 Rafay Baloch's book is much better. 9 juillet 2016
Par subgen - Publié sur Amazon.com
Format: Broché Achat vérifié
just basic pentesting info. Rafay Baloch's book is much better.
5.0 étoiles sur 5 Five Stars 7 janvier 2015
Par Osier W Tanner II - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
outstanding server as well as the material inside.
3 internautes sur 5 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Five Stars 5 août 2014
Par Amazon Customer - Publié sur Amazon.com
Format: Format Kindle Achat vérifié
Great source of information
Ces commentaires ont-ils été utiles ? Dites-le-nous