logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

일간
|
주간
|
월간

실시간 검색어

검색가능 서점

도서목록 제공

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues (Paperback)

Sanjib Sinha (지은이)
Apress
128,220원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
105,140원 -18% 0원
5,260원
99,880원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
eBook 미리보기

책 정보

· 제목 : Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9781484238905
· 쪽수 : 417쪽
· 출판일 : 2018-11-30

목차

Chapter 01: Security Trends - The Nature and Perspective - The OSI Security Architecture - The Security Attacks, Services and Mechanisms Chapter 02: Virtual Box Chapter 03: Common Linux Commands Chapter 04: Common Networking Terminology Chapter 05: Building a Web Server - Downloading Kali Linux - Relation between Kali and Python - Installing Wing IDE Editor Chapter 06: Kali Linux - What is Kali Linux - Exploring the Kali-Inside - How to Update Chapter 07: Kali and Python - First Penetration using Python - TCP Client in Python and Services - Raw Binary Packets - Port Scanning using NMAP Chapter 08: Information Gathering - Further Penetration Testing - Tools we need - Dmitry/DNSenum/Maltego and Others - Five phases of Penetration Testing Chapter 09: SQL Mapping - Sniffing (in TWO parts) - SQL Injection (in FOUR parts) - Brute Force (in TWO parts) Chapter 10: Vulnerability Analysis - Tools - Spike/Open VAS/Vega and others Chapter 11: Information Assurance Model - What is IAM - How it Works - Why it is Important Chapter 12: Metaspoilt in Kali Linux - Architecture - Mixims and Plug-ins in Ruby - MstCLI/Msf Console (in detail, how it works) - Exploit in Metaspoilt - Important Commands in Metaspoilt - Payload Basics/Different Payloads - Database and its Vulnerability Chapter 13: Hashes and Passwords - Password Testing - Command-line Tools - John the Ripper - Rainbow - Pass the Hash Chapter 14: Classical encryption technique - Nature and Perspective - Model of Conventional Cryptosystem - Introduction to Cryptography, and types of Attacks on Encrypted Messages - Symmetric Cyphers Chapter 15: Exploiting Targets - Tools we use - Exploiting Linux with Metaspoilt - Exploiting Windows with Armitage - Persistent Access

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책