Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycl
This paper deals with the problem of ethical hacking and security of computer systems. When we talk ...
We discuss the security threats to computer networks and systems, and one of the ways to protect - p...
The Cloud is the latest trend and every organization is rushing to shift its infrastructure to it. H...
Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples...
This slide deck provides a deep dive into penetration testing with a focus on the capabilities of Ka...
If you are a security professional, pentester, or anyone interested in getting to grips with wireles...
With the current rate of hacking, it is very important to pentest your environment in order to ensur...
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and ra...
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps requir...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
The massive development of technology especially in computers, mobile devices, and networking has br...
The massive development of technology especially in computers, mobile devices, and networking has br...
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-st...
Téma je zaměřeno na problematiku etického hackingu a penetračních testů. Úkolem je vypracovat metodi...
This book is targeted at information security professionals, penetration testers and network/system ...
This paper deals with the problem of ethical hacking and security of computer systems. When we talk ...
We discuss the security threats to computer networks and systems, and one of the ways to protect - p...
The Cloud is the latest trend and every organization is rushing to shift its infrastructure to it. H...
Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples...
This slide deck provides a deep dive into penetration testing with a focus on the capabilities of Ka...
If you are a security professional, pentester, or anyone interested in getting to grips with wireles...
With the current rate of hacking, it is very important to pentest your environment in order to ensur...
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and ra...
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps requir...
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, a...
The massive development of technology especially in computers, mobile devices, and networking has br...
The massive development of technology especially in computers, mobile devices, and networking has br...
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-st...
Téma je zaměřeno na problematiku etického hackingu a penetračních testů. Úkolem je vypracovat metodi...
This book is targeted at information security professionals, penetration testers and network/system ...
This paper deals with the problem of ethical hacking and security of computer systems. When we talk ...
We discuss the security threats to computer networks and systems, and one of the ways to protect - p...
The Cloud is the latest trend and every organization is rushing to shift its infrastructure to it. H...