Books

5 results found
Title Authors Description OpenBook ID
Penetration tester's open source toolkit Penetration tester's open source toolkit Jeremy Faircloth "Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing p… OL15981093W
Metasploit Metasploit David Kennedy "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is… OL15991444W
Computer and information security handbook Computer and information security handbook John R. Vacca This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threa… OL16971523W
CEH Certified Ethical Hacker practice exams CEH Certified Ethical Hacker practice exams Matthew Walker Annotation OL24844196W
The Ethical Hack The Ethical Hack James S. Tiller There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Unt… OL8636287W