41. Kali Linux wireless penetration testing essentials : plan and execute penetration tests on wireless networks with the Kali Linux distribution /: plan and execute penetration tests on wireless networks with the Kali Linux distribution. (2015) Authors: Alamanni, Marco Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
42. Kali Linux cookbook. (2013) Other Names: Pritchett, Willie L; De Smet, David Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
43. Instant penetration testing : setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes /: setting up a test lab how-to : set up your own penetration testing lab using practical and precise recipes. (2013) Other Names: Fadyushin, Vyacheslav Record Type: Book Extent: 1 online resource (138 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
44. Conducting network penetration and espionage in a global environment. (©2014) Authors: Middleton, Bruce, 1953- Record Type: Book Extent: 1 online resource (xiii, 585 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
45. Kali Linux - Assuring Security by Penetration Testing : Master the Art of Penetration Testing with Kali Linux /: Master the Art of Penetration Testing with Kali Linux. (2014) Other Names: Allen, Lee; Heriyanto, Tedi; Ali, Shakeel Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
46. Metasploit penetration testing cookbook : over 70 recipes to master the most widely used penetration testing framework /: over 70 recipes to master the most widely used penetration testing framework. (2012) Other Names: Singh, Abhinav Record Type: Book Extent: 1 online resource (iii, 250 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
47. Python ethical hacking from scratch : think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware /: think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware. (2021) Authors: Sarwar, Fahad Ali Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
48. Hands on hacking. (2020) Authors: Hickey, Matthew; McAlonan, James; Arcuri, Jennifer Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
49. Mastering metasploit : exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework /: exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework. (2020) Authors: Jaswal, Nipun Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
50. Penetration testing Azure for ethical hackers : develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments /: develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments. (2021) Authors: Okeyode, David; Fosaaen, Karl Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗