1. Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /: over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning. (2014) Other Names: Hutchens, Justin Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Penetration testing with BackBox : an introductory guide to performing crucial penetration testing operations using BackBox /: an introductory guide to performing crucial penetration testing operations using BackBox. (2014) Other Names: Uygur, Stefan Umit Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /: write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach. (2014) Other Names: Jaswal, Nipun Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Learning Metasploit exploitation and development. (2013) Other Names: Balapure, Aditya Record Type: Book Extent: 1 online resource (iii, 278 pages :), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Instant Metasploit starter. (2013) Other Names: Ranganath, Karthik Record Type: Book Extent: 1 online resource (37 pages :), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /: make the most of the Bash shell and Kali Linux's command-line-based security assessment tools. (2014) Other Names: Makan, Keith Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Kali Linux cookbook. (2013) Other Names: Pritchett, Willie L; De Smet, David Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Instant penetration testing : setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes /: setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes. (2013) Other Names: Fadyushin, Vyacheslav Record Type: Book Extent: 1 online resource (138 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linux /: Master the Art of Penetration Testing with Kali Linux. (2014) Other Names: Allen, Lee; Heriyanto, Tedi; Ali, Shakeel Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework /: over 70 recipes to master the most widely used penetration testing framework. (2012) Other Names: Singh, Abhinav Record Type: Book Extent: 1 online resource (iii, 250 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗