Back to Results
First PageMeta Content
Security / Computer network security / Crime prevention / National security / Penetration test / Security testing / Metasploit Project / Vulnerability / Linux kernel / Computer security / Software testing / Cyberwarfare


Kali Linux – Assuring Security by Penetration Testing Lee Allen Tedi Heriyanto Shakeel Ali
Add to Reading List

Open Document

File Size: 2,19 MB

Share Result on Facebook

Company

Google / Packt Publishing / Cisco / Cipher Storm Ltd. / MySQL / /

Country

Mexico / Indonesia / United Kingdom / /

Event

Natural Disaster / /

IndustryTerm

hacker tools / social networking sites / collect network / network tunneling tools / web backdoors / web application analysis tools / free search engine / target network / social engineering tools / human infrastructure / free online network utilities / important network services / enterprise-wide security systems / online technique / search engines / port scanner tool / security tools / search engine / /

OperatingSystem

Linux / /

Organization

Penetration Testing Lee Allen Tedi Heriyanto Shakeel Ali Chapter / Book Covers Chapter / /

Person

Usha Iyer / Ruth Johnson / Abhijit Suvarna / Tedi Heriyanto / George Slocum / Alex Gkiouros / Neil Jones / Kellie / Lee Allen Tedi Heriyanto Shakeel Ali / Helen Slocum / Raymond Johnson / Lee Allen / Sweny Sukumaran / Shakeel Ali / Rubal Kaur / Joel Goveya / /

Position

security architect / Chief Security Officer at CSS Providers SAL / active / independent researcher / consultant / founder / social engineer / author / Chief Security Officer / principal consultant / /

PublishedMedium

The Ultimate Security Guide / /

Technology

SNMP / virtual machine / Linux / VPN / search engine / operating system / DNS / /

URL

http /

SocialTag