Hacking with Kali linux ( Pdf download)
Kali Linux although it
sounds like slang for California, Kali through
the phases of the penetration testing life cycle; one major tool from each phase
is explained. The book culminates with a chapter on reporting that will provide
examples of documents used prior to, during and after the pen test. To buy it click the image on the right and to download the pdf click the download button below.
This guide will benefit information security professionals of all
levels, hackers, systems administrators, network administrators, and beginning
and intermediate professional pen testers, as well as students majoring in
information security.
Comments
Post a Comment