- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 93字
- 2021-07-02 12:38:25
Disclaimer
The information within this book is intended to be used only in an ethical manner. Do not use any information from the book if you do not have written permission from the owner of the equipment. If you perform illegal actions, you are likely to be arrested and prosecuted to the full extent of the law. Packt Publishing does not take any responsibility if you misuse any of the information contained within the book. The information herein must only be used while testing environments with proper written authorizations from appropriate persons responsible.
推薦閱讀
- 黑客攻防技巧
- 計算機使用安全與防護
- 硬黑客:智能硬件生死之戰(zhàn)
- 計算機網(wǎng)絡(luò)安全技術(shù)研究
- 局域網(wǎng)交換機安全
- 情報驅(qū)動應(yīng)急響應(yīng)
- 網(wǎng)絡(luò)安全設(shè)計、配置與管理大全
- 解密數(shù)據(jù)恢復
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 黑客攻防實戰(zhàn)從入門到精通
- 網(wǎng)絡(luò)安全實戰(zhàn)詳解(企業(yè)專供版)
- 網(wǎng)絡(luò)空間安全法律問題研究
- 信息系統(tǒng)安全等級化保護原理與實踐
- 網(wǎng)絡(luò)安全監(jiān)控實戰(zhàn):深入理解事件檢測與響應(yīng)
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用