Network vulnerability assessment : identify security loopholes in your network's infrastructure /

Exercises; Chapter 2: Setting Up the Assessment Environment; Setting up a Kali virtual machine; Basics of Kali Linux; Environment configuration and setup; Web server; Secure Shell (SSH); File Transfer Protocol (FTP); Software management; List of tools to be used during assessment; Summary; Chapter 3...

Full description

Saved in:
Bibliographic Details
Main Author: Rahalkar, Sagar (Author)
Format: Electronic eBook
Language:English
Published: Birmingham, UK : Packt Publishing, 2018.
Subjects:
Online Access:CONNECT
CONNECT