Processing ......
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Kali Linux Revealed: Mastering the Penetration Testing Distribution
🌠 Top Free Mathematics Books - 100% Free or Open Source!
  • Title: Kali Linux Revealed: Mastering the Penetration Testing Distribution
  • Author(s) Raphael Hertzog, Jim O'Gorman, Mati Aharoni
  • Publisher: Offsec Press (January 1, 2017); eBook (Creative Commons Licensed)
  • License(s): Creative Commons License (CC)
  • Paperback: 342 pages
  • eBook: PDF
  • Language: English
  • ISBN-10/ASIN: 0997615605
  • ISBN-13: 978-0997615609
  • Share This:  

Book Description

Kali Linux has not only become the information security professional's platform of choice, but evolved into an industrial-grade, and world-class operating system distribution--mature, secure, and enterprise-ready.

About the Authors
  • N/A
Reviews, Ratings, and Recommendations: Related Book Categories: Read and Download Links: Similar Books:
  • Kali Linux: Assuring Security by Penetration Testing

    This book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing to detailed coverage.

  • UNIX System Security: A Guide for Users & System Administrators

    This book begins by examining four high-profile breaches of UNIX security as illustrations of how a UNIX system can be attacked. It then provides the information necessary to protect against these forms of attack, and offers the tools.

  • The SELinux Notebook, 4th Edition (Richard Haines)

    If you want an effective means of securing your Linux system (and who doesn't?), this book provides the means. The 4th edition covers the integration of SELinux within Android.

  • Securing & Optimizing Linux: A Hands on Guide

    This book shows you how to build a secure, reliable and clean network from the ground up, with optimizations and security, using RedHat Linux as a base OS. It presents everyhting you need to know clearly, concisely, and extreemly well organized.

  • O'Reilly® Network Security Tools (Justin Clarke, et al)

    This concise, high-end free book discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment.

  • Learn Ethical Hacking from Scratch (Zaid Sabih)

    You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices.

  • Next-Generation Firewalls For Dummies (Palo Alto Networks)

    This book will show you how to rethink your security strategy to counter and block even the most sophisticated attacks, help you understand what firewalls are, how they operate on different types of networks, what they can and can't do, and how to pick a good one.

  • Security Concepts (Subspacefield)

    This is a book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting and entertaining examples. It is not intended to be an introductory text, although a beginner could gain something from it.

  • Security+ Essentials (Neil Smyth)

    This book is designed to provide the knowledge needed by IT professionals to pass the CompTIA Security+ examination. It is also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.

  • Open Source Security Tools: A Practical Guide to Security Apps

    This book is a practical, hands-on introduction to open source security tools. It reviewed the overwhelming assortment of these free and low-cost solutions to provide you with the "best of breed" for all major areas of information security.

  • Security Engineering: Building Dependable Distributed Systems

    It makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice, offers a lot of thoughts on how information can be made more secure by both technologies and strategies.

Book Categories
:
Other Categories
Resources and Links