005 |
|
20180622135141.0 |
020 |
|
|a9781979881104|cUS18.25 (pbk.)
|
020 |
|
|a1979881103 (pbk.)
|
040 |
|
|aKZS|cKZS|dKZS|dOCLCA|dOCLCF|dNOU
|
050 |
|
|aHV6773|b.W58 2014
|
095 |
|
|aLB|bLBF|cE019128|dHV6773|eW582|y2017|ffish|pBook
|
100 |
1
|
|aWhite, Abraham K,|eauthor.
|
245 |
10
|
|aHacking :|bthe underground guide to computer hacking, including wireless networks, basic security, Windows, Kali Linux and penetration testing /|c[Abraham K. White].
|
246 |
30
|
|aUnderground guide to computer hacking, including wireless networks, basic security, Windows, Kali Linux and penetration testing
|
260 |
|
|a[S.l.] :|b[s.n.],|cc2017.
|
300 |
|
|a229 p. ;|c23 cm.
|
505 |
0
|
|aIntroduction to hacking -- Introduction to wireless network hacking -- Implementation of wireless testing methodology -- Ten best tools for hacking wireless networks -- Cracking incryption -- Flaws in websites and web applications -- Attacking with frameworks -- Penetration testing as a proactive security measure and web security measures -- Linux.
|
520 |
|
|aThis book presents detailed information on hacking and how to protect computer systems from hackers. Hacking tools are discussed along with the pros and cons of various types of security.
|
630 |
00
|
|aLinux.
|
650 |
0
|
|aHacking.
|
650 |
0
|
|aComputer security.
|
650 |
0
|
|aWireless communication systems.
|