Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Kali Linux Penetration Testing Bible, Khawaja Gus


Варианты приобретения
Цена: 33790.00T
Кол-во:
Наличие: Ожидается поступление. Заказывайте скорее, чем раньше закажете, тем раньше получите заказ.
Ожидаемая дата поспупления на склад: 2025-07-15

Добавить в корзину
в Мои желания

Автор: Khawaja Gus   (Гус Хаваджа)
Название:  Kali Linux Penetration Testing Bible
Перевод названия: Гус Хаваджа: Справочник для тестирования Kali Linux
ISBN: 9781119719083
Издательство: Wiley
Классификация:
ISBN-10: 1119719089
Обложка/Формат: Paperback
Страницы: 512
Вес: 0.84 кг.
Дата издания: 02.06.2021
Язык: English
Размер: 23.11 x 18.80 x 3.05 cm
Читательская аудитория: Professional & vocational
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание:

Your ultimate guide to pentesting with Kali Linux

Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world. Penetration testers must master Kalis varied library of tools to be effective at their work. The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali.

Youll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets. Whether youre new to the field or an established pentester, youll find what you need in this comprehensive guide.

  • Build a modern dockerized environment
  • Discover the fundamentals of the bash language in Linux
  • Use a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more)
  • Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalation
  • Apply practical and efficient pentesting workflows
  • Learn about Modern Web Application Security Secure SDLC
  • Automate your penetration testing with Python



The Hacker Playbook 3: Practical Guide to Penetration Testing

Автор: Kim Peter
Название: The Hacker Playbook 3: Practical Guide to Penetration Testing
ISBN: 1980901759 ISBN-13(EAN): 9781980901754
Издательство: Неизвестно
Цена: 34430.00 T
Наличие на складе: Ожидается поступление.

Hacking with Kali Linux: Penetration Testing Hacking Bible

Автор: Wagner Alex
Название: Hacking with Kali Linux: Penetration Testing Hacking Bible
ISBN: 1839381132 ISBN-13(EAN): 9781839381133
Издательство: Неизвестно
Рейтинг:
Цена: 36750.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book will focus on some of the most dangerous hacker tools that are favourite of both, White Hat and Black Hat hackers.

Kali Linux Hacking: A Complete Guide to Learni the Fundamentals of Hacking, Cyber Security, and Penetration Testing.

Автор: Treu Peter
Название: Kali Linux Hacking: A Complete Guide to Learni the Fundamentals of Hacking, Cyber Security, and Penetration Testing.
ISBN: 1801259518 ISBN-13(EAN): 9781801259514
Издательство: Неизвестно
Рейтинг:
Цена: 18380.00 T
Наличие на складе: Нет в наличии.
Описание:

Do you want to become a proficient specialist in cybersecurity and you want to learn the fundamentals of ethical hacking? Do you want to have a detailed overview of all the basic tools provided by the best Linux distribution for ethical hacking? THEN KEEP READING...


Hacking is becoming more complex and sophisticated, and companies are scrambling to protect their digital assets against threats by setting up cybersecurity systems. These systems need to be routinely checked to ensure that these systems do the jobs they're designed to do.

The people who can do these checks are penetration testers and ethical hackers, programmers who are trained to find and exploit vulnerabilities in networks and proffer ways to cover them up.

Now more than ever, companies are looking for penetration testers and cybersecurity professionals who have practical, hands-on experience with Kali Linux and other open-source hacking tools.

In this powerful book, you're going to learn how to master the industry-standard platform for hacking, penetration and security testing-Kali Linux.

This book assumes you know nothing about Kali Linux and hacking and will start from scratch and build up your practical knowledge on how to use Kali Linux and other open-source tools to become a hacker as well as understand the processes behind a successful penetration test.


In This Book you will Learn:


  • Definition of Hacking andiTypes of Hacker
  • Cybersecurity and Types of Cyber Attacks
  • Types of Malware and How the Hacking Process Works
  • Why Hackers Use Linux
  • Scanning (nmap, imassscan, ihping3) and Managing Networks (Wireshark)
  • Kali Linux on Portable Devices
  • Bypassing a Hidden SSH and Bypassing a Mac Address Authentication
  • Secure and Anonymous Using Tor, Proxy Chains, and VPN
  • IP Spoofing
  • Penetration Testing with Metasploit


Would you like to know more? Download the Book, Kali Linux Hacking


Scroll to the top of the page and click the "Buy now" button to get your copy now.



Kali Linux Cookbook - Second Edition: Effective penetration testing solutions

Автор: Schultz Corey P., Perciaccante Bob
Название: Kali Linux Cookbook - Second Edition: Effective penetration testing solutions
ISBN: 1784390305 ISBN-13(EAN): 9781784390303
Издательство: Неизвестно
Рейтинг:
Цена: 60070.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world`s most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for mi..

Hacking with Kali Linux: Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing.

Автор: Hack Anthony
Название: Hacking with Kali Linux: Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing.
ISBN: 1671818725 ISBN-13(EAN): 9781671818729
Издательство: Неизвестно
Цена: 18830.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Have you always been interested in the world of hacking?

Do you want to discover the skills, tactics, and methods behind ethical hacking? One of the most important and sought-after IT security capabilities?

If you want to learn the art of hacking then keep reading...


Hacking is a very complicated series of processes that take a lot of effort and there are many things that you will need to learn.

Hopefully, this book will give you the most basic information so that you will be able to do this properly. If you can follow these tips and use the information that we have given you in this book, you should be able to perform the tasks that you need to with ease and learn how to understand the Linux system without any difficulty.

Linux works as a multi-front operating system and can serve different purposes according to the customization. Unlike other operating systems, Linux comes only as a foundation on which one builds their operating system. The OS is booted to let the users add what they need as they customize it to fit needs.

The first step into learning how to hack using Linux is to understand the Linux operating.

Once you can understand the basics you can move on to the more complicated aspects of this subject such as networking.

This book gives a comprehensive guide on the following:

  • Hacking with Kali Linux
  • Back Door Attacks
  • Cybersecurity
  • Wireless Networking
  • How to Initiate A Hack Using Kali Linux?
  • Your First Hack
  • Ethical Hacking and Penetration Testing
  • Solving Level Problems
  • Exploitation of Computer Systems
  • How to Spoof Addresses
  • FAQs... AND MORE

This book will also be able to give you the information on text manipulation and understand why it is important. If you can use this to your benefit, you will be able to perform the tasks that you need to with ease and set the words up the way you need to.

This book will offer aspiring moral hackers a brief overview of the Hacking with Kali Linux.

Cybersecurity specialist Malcolm Shore explains how to set up a virtual testing environment, customize Kali Linux, and download information gathering software, vulnerability analysis, key and hash cracking, and aim manipulation.

SCROLL UP AND CLICK THE BUY NOW BUTTON


Kali Linux Wireless Penetration Testing Cookbook

Автор: Oriyano Sean-Philip
Название: Kali Linux Wireless Penetration Testing Cookbook
ISBN: 1783554088 ISBN-13(EAN): 9781783554089
Издательство: Неизвестно
Рейтинг:
Цена: 53940.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.

Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes

Автор: Mining Ethem
Название: Kali Linux Hacking: A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes
ISBN: 1914028120 ISBN-13(EAN): 9781914028120
Издательство: Неизвестно
Рейтинг:
Цена: 20740.00 T
Наличие на складе: Нет в наличии.

Hacking with Kali Linux: The Ultimate Beginner`s Guide for Learning Kali Linux to Understand Wireless Network & Penetration Testing. Including

Автор: Sutherland Andrew
Название: Hacking with Kali Linux: The Ultimate Beginner`s Guide for Learning Kali Linux to Understand Wireless Network & Penetration Testing. Including
ISBN: 1914154088 ISBN-13(EAN): 9781914154089
Издательство: Неизвестно
Рейтинг:
Цена: 20210.00 T
Наличие на складе: Нет в наличии.
Описание:

Are you interested in learning how to become a hacker?


If your answer is yes, then look no further. This book will take you down that road


This book is going to teach you how hackers reason. Besides understanding the reasons why a hacker would target your computer, you will also get to know how they are able to do it and even how you can safeguard your systems, equipment, and network against hacking attacks.


Keen readers will, by the end of this book understand how their systems work, how to scan, and how to gain access to your computer.


The book has been structured into 11 chapters that will each teach you something new in matters hacking with Kali Linux.


The formatting of the book is designed in a fashion that makes it simple to read and easy to understand. Concepts have been simplified to limit misunderstanding and enhance possibilities.


By the time you come to the end of this book, you will have mastered the basics of computer hacking alongside a number of advanced concepts in social engineering attack mechanisms.


The book is truly a template for everyone who intends to understand hacking.


Additionally, you can expect the following from this book:


  • Introduction to Kali Linux
  • The Basics of Hacking and Using Kali Linux
  • Kali Tools
  • Penetration Testing
  • The process of ethical hacking
  • How to scanning devices in a network
  • What are cyber-attacks?
  • The basics of cybersecurity
  • Vulnerability assessments
  • Wireless network hacking
  • Analyzing and managing networks
  • Penetration Testing
  • Web Security
  • Text Manipulation
  • Bash Scripting
  • Cracking Encryptions
  • Attacking with Frame Networks
  • File systems
  • Storage Device Management
  • Becoming Secure and Anonymous
  • Advanced Social Engineering
  • Python scripting basics for hackers
  • ..and Much More


Plenty of books about Hacking with Kali Linux do not cover crucial concepts in a satisfactory fashion. Let me say again that nothing has been left out of this book.


Grab yourself a copy of this book NOW, and you will get to discover interesting stuff about hacking using Kali Linux. The book will provide you a platform to be better a student, security administrator, or penetration tester.


You will also find out how you can protect your computer from all the hacker's attacks



AWS Penetration Testing: Beginner`s guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap

Автор: Helmus Jonathan
Название: AWS Penetration Testing: Beginner`s guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
ISBN: 1839216921 ISBN-13(EAN): 9781839216923
Издательство: Неизвестно
Рейтинг:
Цена: 53940.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:

Get to grips with security assessment, vulnerability exploitation, workload security, and encryption with this guide to ethical hacking and learn to secure your AWS environment


Key Features


  • Perform cybersecurity events such as red or blue team activities and functional testing
  • Gain an overview and understanding of AWS penetration testing and security
  • Make the most of your AWS cloud infrastructure by learning about AWS fundamentals and exploring pentesting best practices


Book Description

Cloud security has always been treated as the highest priority by AWS while designing a robust cloud infrastructure. AWS has now extended its support to allow users and security experts to perform penetration tests on its environment. This has not only revealed a number of loopholes and brought vulnerable points in their existing system to the fore, but has also opened up opportunities for organizations to build a secure cloud environment. This book teaches you how to perform penetration tests in a controlled AWS environment.


You'll begin by performing security assessments of major AWS resources such as Amazon EC2 instances, Amazon S3, Amazon API Gateway, and AWS Lambda. Throughout the course of this book, you'll also learn about specific tests such as exploiting applications, testing permissions flaws, and discovering weak policies. Moving on, you'll discover how to establish private-cloud access through backdoor Lambda functions. As you advance, you'll explore the no-go areas where users can't make changes due to vendor restrictions and find out how you can avoid being flagged to AWS in these cases. Finally, this book will take you through tips and tricks for securing your cloud environment in a professional way.


By the end of this penetration testing book, you'll have become well-versed in a variety of ethical hacking techniques for securing your AWS environment against modern cyber threats.


What You Will Learn


  • Set up your AWS account and get well-versed in various pentesting services
  • Delve into a variety of cloud pentesting tools and methodologies
  • Discover how to exploit vulnerabilities in both AWS and applications
  • Understand the legality of pentesting and learn how to stay in scope
  • Explore cloud pentesting best practices, tips, and tricks
  • Become competent at using tools such as Kali Linux, Metasploit, and Nmap
  • Get to grips with post-exploitation procedures and find out how to write pentesting reports


Who this book is for

If you are a network engineer, system administrator, or system operator looking to secure your AWS environment against external cyberattacks, then this book is for you. Ethical hackers, penetration testers, and security consultants who want to enhance their cloud security skills will also find this book useful. No prior experience in penetration testing is required; however, some understanding of cloud computing or AWS cloud is recommended.


Hacking With Kali Linux: The Complete Beginner`s Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing to F

Автор: In Deep Learn Computer Hacking
Название: Hacking With Kali Linux: The Complete Beginner`s Guide with Detailed Practical Examples of Wireless Networks Hacking & Penetration Testing to F
ISBN: 1801201226 ISBN-13(EAN): 9781801201223
Издательство: Неизвестно
Рейтинг:
Цена: 42290.00 T
Наличие на складе: Нет в наличии.
Описание: If You Are Very Much Worried About The Security Structure Of Your Network Or Server And Want To Prevent All Forms Of Attacks Along With Vulnerabilities On Your System, Then Keep Reading
You might come across several problems at the time of installing Kali Linux on your system (and it is not funny). Also, if you are unable to install the same properly, you will fail in getting access this awesome softwere and you will be irritated. But just like existing problems, there is also a wide range of troubleshooters which yuo can learn through this book helping in getting rid of all forms of problems that come in the way of installation.


But why is kali linux so imprortantant to have?


You need to know that Kali Linux is much more than just hacking. It comes with some advanced forms of features which can help in making your tasks of programming along with hacking lot more easier. But this software does not only provide help at the time of hacking but it also comes along with various tools which helps the users in testing out their networks for finding out the vulnerabilities in their network or system.


I know programming and hacking in Linux can be tough but thanks to this excellent book you will receive the proper knowledge about the functioning of Kali Linux regarding programming and hacking, thus you will be able to program and hack without any form of problem in this software.
Furthermore Kali Linux is integrated with several functions which when carried out together, can actually do wonders. It can be regarded among the most effective software in today's world. Most of the big companies today seek the help of Kali Linux for the purpose of tracing and checking the various forms of vulnerabilities which are present within a system and thus ensures 100% security for an organization. Unless and until you are unaware of the basics, you will not be able to use this software.


In fact for carrying out an effective form of ethical hacking, you will need to learn about the various attacks along with the forms of networks. You can easily find this information in this book.


Here is some of all the main elements which you can find in this book: -Installing and Downloading Kali LinuxTroubleshooting installations-Essential and advanced Linux terminal command-Adding and removing software -Controlling file and directory permissions-Real world application for kali Linux and useful tools-Programming in Linux using: C, C++, Python, Java, Bash-Network Basics-Wireless hacking and penetration testing with Linux -How to carry out an effective attackAnd Much More


Okay, but why can this book help me?


Because this book will give you a detailed structure about the installation of Kali Linux software on your system and how you can configure the same. The chapters that you are going to find in this book are arranged with information, exercises and explanations in a very orderly manner which can easily answer all your questions and can clear all your doubts regarding hacking and Kali Linux. This book will be the perfect choice for you. It is something which you really need to have if you want to improve the security of your system or if you want to learn programming by using Kali Linux.


Even if you have never installed kali linux in your computer; Even if you do not know anything about programming and hacking, do not worry because this book has been designed for peaple like you


Click on "Buy Now" and Get Your Copy Now



Hacking with Kali Linux: A Comprehensive Guide for Beginners to Learn Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing

Автор: Mach Dylan
Название: Hacking with Kali Linux: A Comprehensive Guide for Beginners to Learn Basic Hacking, Cybersecurity, Wireless Networks, and Penetration Testing
ISBN: 1801792240 ISBN-13(EAN): 9781801792240
Издательство: Неизвестно
Рейтинг:
Цена: 31220.00 T
Наличие на складе: Нет в наличии.
Описание:

★ 55% OFF for Bookstores! ★ Discounted Retail Price ★


Buy it NOW and let your customers appreciate this book!


Kali linux: a step by step guide to learn wireless penetration techniques and basics of penetration testing, includes command line

Автор: Tools Steven
Название: Kali linux: a step by step guide to learn wireless penetration techniques and basics of penetration testing, includes command line
ISBN: 1911684116 ISBN-13(EAN): 9781911684114
Издательство: Неизвестно
Рейтинг:
Цена: 22950.00 T
Наличие на складе: Нет в наличии.
Описание: Do you want to learn how you can protect yourself from hackers in your office and home and how to carry out ethical hacking? If yes, then keep reading...


In layman's terms, hacking is the act of breaking into someone else's computer to which you have no access and stealing private information by circumventing the security measures. It is dangerous because it sabotages the entire computer system.


The origin of the word "hacking" can be traced back to the 1960's and 1970's. Some hackers, called Yippe, were anti-war protestors and members of the Youth International Party. They played pranks in the streets, and most of their prank techniques were taught within their group. It is important to note that they were involved in tapping telephone lines as well.


Gradually, what was called a prank grew to another level and became known as hacking. However, this time their tools were state-of-the-art mega core processors and multi-function plasma screens.


Hacking tactics are increasingly being used by terrorist organizations for numerous acts of evil, including obtaining illegal funding, spreading propaganda, launching missiles, threatening the government and gathering intelligence about secret military movements.


In this book, various types of hacking will be broken down and explained. Step by step instructions will be provided so that you can protect yourself from hackers in your office and home, as well as on the internet. This book gives a comprehensive guide on the following: A step by step process on installing and downloading Kali LinuxVarious tools that are available in Kali Linux, which can be used for penetrating wireless devicesBasic Linux CommandsTips and tricks on Penetration Testing and Web SecurityLinux ToolsHow exploits are classifiedThe role of firewallWhat are cryptography and digital signatureThe Threat of Malware and Cyber AttacksManagement of Linux Kernel and Loadable Kernel ModulesBash and python scripting

... AND MORE


Even if it is your first approach with hacking, by the end of this book you will be armed with all the knowledge you require to get started in ethical hacking.This book is a very and complete guide with a lot of practice and little theory.All you need to know is in this book with detailed descriptions and step by step processes.Even if you are a complete beginner, this book will act as your guide as you traverse the virtual world.


What are you waiting for?Scroll to the top of the page and select the buy now button


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия