31. Instant Metasploit starter. (2013) Other Names: Ranganath, Karthik Record Type: Book Extent: 1 online resource (37 pages :), color illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
32. Software test attacks to break mobile and embedded devices. (2013) Authors: Hagar, Jon Duncan Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
33. Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /: make the most of the Bash shell and Kali Linux's command-line-based security assessment tools. (2014) Other Names: Makan, Keith Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
34. Network vulnerability assessment : identify security loopholes in your network's infrastructure /: identify security loopholes in your network's infrastructure. (2018) Authors: Rahalkar, Sagar Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
35. Kali Linux web penetration testing cookbook : identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x /: identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x. (2018) Authors: Najera-Gutierrez, Gilberto Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
36. Ethical hacking and penetration testing guide. ([2017?]) Authors: Baloch, Rafay Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
37. BackTrack 4 : assuring security by penetration testing /: assuring security by penetration testing. (©2011) Other Names: Ali, Shakeel; Heriyanto, Tedi Record Type: Book Extent: 1 online resource (vii, 371 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
38. IoT penetration testing cookbook : identify vulnerabilities and secure your smart devices /: identify vulnerabilities and secure your smart devices. (2017) Authors: Guzman, Aaron Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
39. Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools /: perform data acquisition, digital investigation, and threat analysis using Kali Linux tools. (2017) Authors: Parasram, Shiva V. N Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
40. Learning penetration testing with Python : utilize Python scripting to execute effective and efficient penetration tests /: utilize Python scripting to execute effective and efficient penetration tests. (2015) Authors: Duffy, Christopher Record Type: Book Extent: 1 online resource (1 volume) View Content: Available online (eLD content is only available in our Reading Rooms) ↗