|
Penetration tester's open source toolkit
|
Jeremy Faircloth |
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing p… |
OL15981093W |
|
Metasploit
|
David Kennedy |
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is… |
OL15991444W |
|
Computer and information security handbook
|
John R. Vacca |
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threa… |
OL16971523W |
|
CEH Certified Ethical Hacker practice exams
|
Matthew Walker |
Annotation |
OL24844196W |
|
The Ethical Hack
|
James S. Tiller |
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Unt… |
OL8636287W |