Pritchett et al., 2013 - Google Patents
Kali Linux CookbookPritchett et al., 2013
View PDF- Document ID
- 10800706601107260757
- Author
- Pritchett W
- De Smet D
- Publication year
External Links
Snippet
A practical, cookbook style with numerous chapters and recipes explaining the penetration testing. The cookbook-style recipes allow you to go directly to your topic of interest if you are an expert using this book as a reference, or to follow topics throughout a chapter to gain in …
- 241001397173 Kali <angiosperm> 0 title abstract description 67
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Faircloth | Penetration tester's open source toolkit | |
Najera-Gutierrez et al. | Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux | |
Weidman | Penetration testing: a hands-on introduction to hacking | |
Pritchett et al. | Kali Linux Cookbook | |
Allen et al. | Kali Linux–Assuring security by penetration testing | |
Velu | Mobile Application Penetration Testing | |
Broad et al. | Hacking with Kali: practical penetration testing techniques | |
Jaswal | Mastering Metasploit: Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit | |
Shaaban et al. | Practical windows forensics | |
Pritchett et al. | BackTrack 5 Cookbook | |
Cardwell | Building Virtual Pentesting Labs for Advanced Penetration Testing | |
Gregg | The network security test lab: A step-by-step guide | |
Retzkin | Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it | |
Handa et al. | Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II | |
Kotipalli et al. | Hacking Android | |
Parasram | Digital Forensics with Kali Linux: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019. x | |
Rahalkar | Metasploit for beginners | |
Anderson et al. | Seven deadliest USB attacks | |
Cardwell | Building virtual pentesting labs for advanced penetration testing | |
Singh | Instant Kali Linux | |
Schultz et al. | Kali Linux Cookbook | |
Parasram et al. | Kali Linux 2018: Assuring Security by Penetration Testing: Unleash the full potential of Kali Linux 2018, now with updated tools | |
Pogue et al. | Unix and Linux forensic analysis DVD toolkit | |
Manson | Remote Desktop Software as a forensic resource | |
Rahalkar | Metasploit 5.0 for Beginners: Perform penetration testing to secure your IT environment against threats and vulnerabilities |