- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 288字
- 2021-07-16 11:42:07
Customer support
Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.
Errata
Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from http://www.packtpub.com/support.
Piracy
Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.
Please contact us at <copyright@packtpub.com>
with a link to the suspected pirated material.
We appreciate your help in protecting our authors, and our ability to bring you valuable content.
Questions
You can contact us at <questions@packtpub.com>
if you are having a problem with any aspect of the book, and we will do our best to address it.
- 網(wǎng)絡(luò)安全與管理
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Metasploit Penetration Testing Cookbook(Third Edition)
- INSTANT Metasploit Starter
- 計算機使用安全與防護
- Learning Veeam? Backup & Replication for VMware vSphere
- Testing and Securing Android Studio Applications
- 黑客攻防與網(wǎng)絡(luò)安全從新手到高手(絕招篇)
- 從0到1:CTFer成長之路
- 華為防火墻實戰(zhàn)指南
- SQL Injection Strategies
- Kali Linux高級滲透測試(原書第4版)
- 信息內(nèi)容安全管理及應(yīng)用
- ATT&CK與威脅獵殺實戰(zhàn)
- CTF網(wǎng)絡(luò)安全競賽入門教程