logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Hacking With Kali 1st Edition James Broad Auth

  • SKU: BELL-4628196
Hacking With Kali 1st Edition James Broad Auth
$ 31.00 $ 45.00 (-31%)

5.0

108 reviews

Hacking With Kali 1st Edition James Broad Auth instant download after payment.

Publisher: Syngress
File Extension: PDF
File size: 23.3 MB
Pages: 227
Author: James Broad (Auth.)
ISBN: 9780124077492, 0124077498
Language: English
Year: 2013
Edition: 1

Product desciption

Hacking With Kali 1st Edition James Broad Auth by James Broad (auth.) 9780124077492, 0124077498 instant download after payment.

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services.

Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test.

This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.

  • Provides detailed explanations of the complete penetration testing lifecycle
  • Complete linkage of the Kali information, resources and distribution downloads
  • Hands-on exercises reinforce topics

Related Products