Inicio > > Redes y comunicaciones informáticas > Seguridad de redes > Mastering Metasploit - Third Edition
Mastering Metasploit - Third Edition

Mastering Metasploit - Third Edition

Mastering Metasploit - Third Edition

Nipun Jaswal

66,89 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2018
Materia
Seguridad de redes
ISBN:
9781788990615
66,89 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Artículos relacionados

  • Security Engineering for Cloud Computing
    Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development, operation and maintenance of software. As a result, there is a need to examine and propose security solutions for cloud computing in order to improve the quality and security of all services, applications, and tools based on cloud computing. Security Engineer...
  • Theory and Practice of Cryptography Solutions for Secure Information Systems
    Elci
    Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Syste...
  • Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
    Rawat
    While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services. Security, Privacy, Trust, and Resource Management in Mobile a...
  • Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing
    Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant...
  • Security Breaches and Threat Prevention in the Internet of Things
    As the applications of the Internet of Things continue to progress, so do the security concerns for this technology. The study of threat prevention in the Internet of Things is necessary, as security breaches in this field can ruin industries and lives. Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategie...
  • Multidisciplinary Perspectives in Cryptology and Information Security
    Al Maliky
    With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applicat...

Otros libros del autor

  • Mastering Network Forensics
    Nipun Jaswal
    Learn to decode the Cyber Mysteries by Mastering Network ForensicsDESCRIPTION Network forensics is a rapidly growing field with a high demand for skilled professionals. This book provides a comprehensive guide on the subject, covering everything from the fundamentals to advanced topics such as malware analysis and cyber attack investigation.Written by a seasoned expert with ov...
    Disponible

    50,23 €

  • Mastering Metasploit, Fourth Edition
    Nipun Jaswal
    ...
    Disponible

    67,85 €

  • Hands-On Network Forensics
    Nipun Jaswal
    Gain basic skills in network forensics and learn how to apply them effectively Key Features Investigate network threats with easePractice forensics tasks such as intrusion detection, network analysis, and scanningLearn forensics investigation at the network level Book DescriptionNetwork forensics is a subset of digital forensics that deals with network attacks and their invest...
    Disponible

    58,90 €

  • Metasploit Bootcamp
    Nipun Jaswal
    ...
    Disponible

    63,99 €

  • Mastering Metasploit, Second Edition
    Nipun Jaswal
    ...
    Disponible

    72,85 €

  • Mastering Metasploit
    Nipun Jaswal
    ...
    Disponible

    72,18 €