Pritchett et al., 2013 - Google Patents

Kali Linux Cookbook

Pritchett et al., 2013

View PDF
Document ID
10800706601107260757
Author
Pritchett W
De Smet D
Publication year

External Links

Snippet

A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in …
Continue reading at www.elib.ictu.edu.vn (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Faircloth Penetration tester's open source toolkit
Najera-Gutierrez et al. Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux
Weidman Penetration testing: a hands-on introduction to hacking
Pritchett et al. Kali Linux Cookbook
Allen et al. Kali Linux–Assuring security by penetration testing
Velu Mobile Application Penetration Testing
Broad et al. Hacking with Kali: practical penetration testing techniques
Jaswal Mastering Metasploit: Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
Shaaban et al. Practical windows forensics
Pritchett et al. BackTrack 5 Cookbook
Cardwell Building Virtual Pentesting Labs for Advanced Penetration Testing
Gregg The network security test lab: A step-by-step guide
Retzkin Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Handa et al. Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Kotipalli et al. Hacking Android
Parasram Digital Forensics with Kali Linux: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019. x
Rahalkar Metasploit for beginners
Anderson et al. Seven deadliest USB attacks
Cardwell Building virtual pentesting labs for advanced penetration testing
Singh Instant Kali Linux
Schultz et al. Kali Linux Cookbook
Parasram et al. Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools
Pogue et al. Unix and Linux forensic analysis DVD toolkit
Manson Remote Desktop Software as a forensic resource
Rahalkar Metasploit 5.0 for Beginners: Perform penetration testing to secure your IT environment against threats and vulnerabilities