Poznań

 

 
 

TWÓJ KOSZYK

Koszyk jest pusty
 
ksiazka tytuł: Linux for Hackers autor: Vance William
DOSTAWA WYŁĄCZNIE NA TERYTORIUM POLSKI

FORMY I KOSZTY DOSTAWY
  • 0,00 zł
  • 0,00 zł
  • 9,50 zł
  • 12,50 zł
  • 0,00 zł
  • Od 9,90 zł
  • Od 11,00 zł
  • 0,00 zł
  • Od 6,90
  • Od 9,90

Linux for Hackers

Tips and Tricks of Using Linux Theories for Hacking
Wersja papierowa
Wydawnictwo: Joiningthedotstv Limited
ISBN: 978-19-13-84205-5
Format: 15.2x22.9cm
Liczba stron: 156
Oprawa: Miękka
Wydanie: 2020 r.
Język: angielski

Dostępność: dostępny
78,90 zł

<p class="ql-align-justify"><span style="color: black;">Whether you are a Kali Linux beginner or a professional, this book is for you. This book provides a thorough explanation of what Linux is. The explanation in the book starts with the emergence of Linux and how it was developed until the present day. The differences between Linux as it was then and Linux today are explained in detail.&nbsp;</span></p><p class="ql-align-justify"><span style="color: black;">The book progresses to how to use Kali Linux; the advanced aspects of Linux. Kali is loaded with advanced tools for penetration testing. </span></p><p class="ql-align-justify"><span style="color: black;">Added to these tools are commands that help to make the penetration testing process very easy. Some of these commands include: pwd, whoami, cd, ls, help, locate, find, whereis, grep, cat, mkdir, cp, rm, rmdir, set, and echo.&nbsp;</span></p><p class="ql-align-justify"><span style="color: black;">This book explains each of the tools listed above and many others. It also examines some basic processes that can help a hacker excel at his or her skills. Using Kali Linux is not only different from using other operating systems but also more advanced than most operating systems like Windows and Mac OS. This book examines the complexities of Kali Linux and provides shortcuts to some of the complexities.&nbsp;</span></p><p class="ql-align-justify"><span style="color: black;">In this book, you will learn how to install Kali on your system and how to run Kali through a virtual machine. The knowledge of the virtual machine is such that running Kali Linux on the system poses no threat to running other operating systems.</span></p><p class="ql-align-justify"><span style="color: black;">In addition, advanced hacking knowledge, like how to use the host file to direct traffic on your LAN and how you can use the SUID bit to gain access to malicious information like passwords at the </span><strong style="color: black;">etc/shadows, </strong><span style="color: black;">are also provided. With this book, you will learn how to cover your tracks using the </span><strong style="color: black;">rsyslog</strong><span style="color: black;"> utility and how to connect and listen to wireless networks. You would also learn how to build your hacking devices, like cameras, for spying and password crackers. All of the provided information and instructions in the book are simple, thorough, and flexible.&nbsp;</span></p><p class="ql-align-justify"><span style="color: black;">If you're interested in ethical hacking with Linux and are looking for tips and tricks to help you advance your skills, then this book is for you!&nbsp;Click the Buy Now button to get started.</span></p><p class="ql-align-justify"><br></p><p><br></p><p class="ql-align-justify"><span style="color: black;"> </span></p><p class="ql-align-justify"><br></p>

 

Newsletter

Newsletter
Zapisz Wypisz

Klikając "Zapisz" zgadzasz się na przesyłanie na udostępniony adres e-mail informacji handlowych, tj. zwłaszcza o ofertach, promocjach w formie dedykowanego newslettera.

Płatności

Kanały płatności

Księgarnia PWN Poznań akceptuje płatności:

  • płatność elektroniczna eCard (karta płatnicza, ePrzelew)
  • za pobraniem - przy odbiorze przesyłki należność pobiera listonosz lub kurier