- Tapa blanda: 260 páginas
- Editor: Packt Publishing (15 de octubre de 2013)
- Idioma: Inglés
- ISBN-10: 1783289597
- ISBN-13: 978-1783289592
- Valoración media de los clientes: 1 opinión de cliente
Clasificación en los más vendidos de Amazon:
nº274.027 en Libros en idiomas extranjeros (Ver el Top 100 en Libros en idiomas extranjeros)
- n.° 770 en Libros en idiomas extranjeros > Informática, internet y medios digitales > Sistemas operativos
- n.° 830 en Libros en idiomas extranjeros > Informática, internet y medios digitales > Seguridad informática
- n.° 1782 en Libros en idiomas extranjeros > Informática, internet y medios digitales > Redes y administración de sistemas
Kali Linux Cookbook (Inglés) Tapa blanda – 15 oct 2013
|Nuevo desde||Usado desde|
"Vuelva a intentarlo"
Los clientes que compraron este producto también compraron
Descripción del producto
Reseña del editor
A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in-depth knowledge if you are a beginner.This book is ideal for anyone who wants to get up to speed with Kali Linux. It would also be an ideal book to use as a reference for seasoned penetration testers.
Biografía del autor
Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT fi eld. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management fi rm specializing in secure, data-driven, application development, and staffi ng services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifi cations and currently trains students on various topics including ethical hacking and penetration testing. David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specifi cation analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security fi eld and provides network security assessments to several companies.
No es necesario ningún dispositivo Kindle. Descárgate una de las apps de Kindle gratuitas para comenzar a leer libros Kindle en tu smartphone, tablet u ordenador.
Obtén la app gratuita:
Detalles del producto
Si eres el vendedor de este producto, ¿te gustaría sugerir ciertos cambios a través del servicio de atención al vendedor?
Opiniones de clientes
Principales opiniones de clientes
Ha surgido un problema al filtrar las opiniones justo en este momento. Vuelva a intentarlo en otro momento.
Opiniones de clientes más útiles en Amazon.com
"How it works..." sections explain nothing.
Complex commands are presented with no background or explanation of their purpose or arguments.
If I could return this book, I would.
A "cookbook" does not provide an author with license to string together a hundred incomplete ideas and call it publishable work.
As I read, I wonder "did anyone review or edit this before sending it off to press ?!"
Know the enemy.
Useful too and indeed is the explanation of VirtualBox. Made by Oracle no less. So if you are somewhat dubious about random packages trolled on the web, its parentage should be reassuring. It provides a secure [hopefully !] sandbox in which to test various virtual operating systems. Indeed, the book can be read in part as a nice guide to installing and running VirtualBox.
Chapters 4 onwards in the text are where you focus on actually scoping out an unknown network. The narrative delves into using existing tools like nmap to scrutinise that network. There is also a program called maltego written external to Kali and similarly used for threat assessment. Kali apparently bundles a version of it. So via Kali you effectively have a superset of maltego. If you come from prior experience with maltego, that might be a useful way to understand Kali.
The book takes us into the use of Nessus, another renowned network prober. And then ditto for Metasploit.
This de facto survey of the penetration field is a virtue of Kali.