| Item type | Current library | Call number | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|
Reference
|
Anna Centenary Library 3RD FLOOR, A WING | 005.8 VIJ (Browse shelf(Opens below)) | Not for loan | 687744 | ||
Reference
|
Anna Centenary Library 3RD FLOOR, A WING | 005.8 VIJ;1 (Browse shelf(Opens below)) | 1 | Not for loan | 687745 |
First published 2014
Includes index
This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting.
There are no comments on this title.