Penetration testing (Computer security)
Resource Information
The concept Penetration testing (Computer security) represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
The Resource
Penetration testing (Computer security)
Resource Information
The concept Penetration testing (Computer security) represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
- Label
- Penetration testing (Computer security)
98 Items that share the Concept Penetration testing (Computer security)
Context
Context of Penetration testing (Computer security)Subject of
No resources found
No enriched resources found
- Advanced infrastructure penetration testing : defend your systems from methodized and proficient attackers
- BackTrack 4 : assuring security by penetration testing
- BackTrack 5 wireless penetration testing : beginner's guide
- Beginning ethical hacking with Kali Linux : computational techniques for resolving security issues
- Beginning ethical hacking with Python
- Bug bounty hunting essentials : quick-paced guide to help white-hat hackers get through bug bounty programs
- Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually
- Burp Suite cookbook : practical recipes to help you master web penetration testing with Burp Suite
- Burp Suite essentials : discover the secrets of web application pentesting using Burp Suite, the best tool for the job
- CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits
- Certified ethical hacker (CEH) cert guide
- Coding for penetration testers : building better tools
- Coding for penetration testers : building better tools
- Computer and information security handbook
- Conducting network penetration and espionage in a global environment
- Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
- Ethical hacking and penetration testing guide
- Hacking with Kali : practical penetration testing techniques
- Hands-on bug hunting for penetration testers : a practical guide to help ethical hackers discover web application security flaws
- Hands-on ethical hacking and network defense
- Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
- Instant Metasploit starter : the art of ethical hacking made easy with Metasploit
- Instant penetration testing : setting up a test lab how-to
- IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices
- Kali LInux CTF blueprints : build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux
- Kali Linux - assuring security by penetration testing : master the art of penetration testing with Kali Linux
- Kali Linux 2018 : Windows penetration testing : conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018
- Kali Linux 2018 : assuring security by penetration testing : unleash the full potential of Kali Linux 2018, now with updated tools
- Kali Linux cookbook
- Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
- Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
- Kali Linux social engineering : effectively perform efficient and organized social engineering tests and penetration testing using Kali Linux
- Kali Linux web penetration testing cookbook : identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x
- Kali Linux web penetration testing cookbook : over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
- Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
- Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution
- Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
- Learn ethical hacking from scratch : your stepping stone to penetration testing
- Learn social engineering : learn the art of human hacking with an internationally renowned expert
- Learning Metasploit exploitation and development
- Learning Nessus for penetration testing : master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment
- Learning Python web penetration testing : automate web penetration testing activities using Python
- Learning iOS penetration testing : secure your iOS applications and uncover hidden vunerabilities by conducting penetration tests
- Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests
- Learning zANTI2 for Android pentesting : dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
- Linux basics for hackers : getting started with networking, scripting, and security in Kali
- Mastering Kali Linux for Web penetration testing : test and evaluate all aspects of the design and implementation
- Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers
- Mastering Kali Linux for advanced penetration testing : secure your network with Kali Linux, the ultimate hackers' arsenal
- Mastering Kali Linux wireless pentesting : test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
- Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
- Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
- Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach
- Mastering machine learning for penetration testing : develop an extensive skill set to break self-learning systems using Python
- Mastering modern web penetration testing : master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
- Mastering wireless penetration testing for highly secured enviroments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals
- Metasploit : the penetration tester's guide
- Metasploit bootcamp : a fast-paced guide to enhance your pentesting skills
- Metasploit for beginners : create a threat-free environment with the best-in-class tool
- Metasploit penetration testing cookbook
- Metasploit penetration testing cookbook
- Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
- Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules
- Network scanning cookbook : practical network security using Nmap and Nessus 7
- Ninja hacking : unconventional penetration testing tactics and techniques
- Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators
- Penetration tester's open source toolkit
- Penetration tester's open source toolkit
- Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules
- Penetration testing : a hands-on introduction to hacking
- Penetration testing : protecting networks and systems
- Penetration testing bootcamp : quickly get up and running with pentesting techniques
- Penetration testing fundamentals
- Penetration testing services procurement guide, Version 1,
- Penetration testing with BackBox : an introductory guide to performing crucial penetration testing operations using BackBox
- Penetration testing with Raspberry Pi : construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
- Penetration testing with Raspberry Pi : learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2
- Penetration testing with Shellcode : detect, exploit, and secure network-level and operating system vulnerabilities
- Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools
- Pentesting Azure applications : the definitive guide to testing and securing deployments
- Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
- Practical web penetration testing : secure web applications using Burp Suite, Nmap, Metasploit, and more
- Procuring penetration testing services
- Professional penetration testing : creating and learning in a hacking lab
- Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules
- Python for offensive PenTest : a practical guide to ethical hacking and penetration testing using Python
- Python penetration testing cookbook : practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
- Python penetration testing essentials : employ the power of Python to get the best out of pentesting
- Python penetration testing essentials : techniques for ethical hacking with Python
- Quick start guide to penetration testing : with NMAP, OpenVAS and Metasploit
- Real-world bug hunting : a field guide to web hacking
- Software test attacks to break mobile and embedded devices
- The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
- The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
- The basics of web hacking : tools and techniques to attack the web
- Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linux 2.0
- Web penetration testing with Kali Linux : explore the methods and tools of ethical hacking with Kali Linux
- Wireless reconnaissance in penetration testing
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/DBV2d1asI-E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/DBV2d1asI-E/">Penetration testing (Computer security)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Penetration testing (Computer security)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/DBV2d1asI-E/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/DBV2d1asI-E/">Penetration testing (Computer security)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>