Condizione: acceptable. This copy has clearly been enjoyedâ"expect noticeable shelf wear and some minor creases to the cover. Binding is strong, and all pages are legible. May contain previous library markings or stamps.
Condizione: good. Fast Free Shipping â" Good condition. It may show normal signs of use, such as light writing, highlighting, or library markings, but all pages are intact and the book is fully readable. A solid, complete copy that's ready to enjoy.
paperback. Condizione: Good.
Lingua: Inglese
Editore: No Starch Press, Incorporated, 2011
ISBN 10: 159327288X ISBN 13: 9781593272883
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Fine. Used book that is in almost brand-new condition. May contain a remainder mark. Better World Books: Buy Books. Do Good.
Lingua: Inglese
Editore: No Starch Press, Incorporated, 2011
ISBN 10: 159327288X ISBN 13: 9781593272883
Da: Better World Books: West, Reno, NV, U.S.A.
Condizione: Very Good. Former library copy. Pages intact with possible writing/highlighting. Binding strong with minor wear. Dust jackets/supplements may not be included. Includes library markings. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Lingua: Inglese
Editore: No Starch Press, Incorporated, 2011
ISBN 10: 159327288X ISBN 13: 9781593272883
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Pages intact with minimal writing/highlighting. The binding may be loose and creased. Dust jackets/supplements are not included. Stock photo provided. Product includes identifying sticker. Better World Books: Buy Books. Do Good.
Condizione: Good. Good condition. A copy that has been read but remains intact. May contain markings such as bookplates, stamps, limited notes and highlighting, or a few light stains.
Lingua: Inglese
Editore: No Starch Press (edition 1), 2011
ISBN 10: 159327288X ISBN 13: 9781593272883
Da: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condizione: Good. 1. It's a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear, such as markings, highlighting, slight damage to the cover, minimal wear to the binding, etc., but they will not affect the overall reading experience.
Paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Paperback. Condizione: Acceptable. Connecting readers with great books since 1972. Used textbooks may not include companion materials such as access codes, etc. May have condition issues including wear and notes/highlighting. We ship orders daily and Customer Service is our top priority!
Condizione: acceptable. Books may exhibit damage including dents, creases, and folded pages. Some volumes may contain annotations or highlighted sections. PLEASE NOTE that extras or accessories may not be included. Additionally, digital codes and CDs have not been verified for functionality and may be inoperative.
Paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
EUR 11,22
Quantità: Più di 20 disponibili
Aggiungi al carrellopaperback. Condizione: Fine. LIKE NEW!!! Has a red or black remainder mark on bottom/exterior edge of pages.
Paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Paperback. Condizione: Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority!
Condizione: New.
EUR 43,05
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Fully revised to include all new chapters on attacking cloud applications, industrial control systems, and recent vulnerabilities, you'll learn Metasploit's module system, conventions, and interfaces as you launch simulated attacks. The Metasploit Framework makes discovering, exploiting, and sharing systemic vulnerabilities quick and painless. But, this popular pentesting tool can be hard to grasp for first-time users. Written by some of the world's top hackers and security experts, Metasploit fills the gap by teaching you how to best harness the Framework and interact with its vibrant community of Metasploit open-source contributors. This indispensable guide's updated second edition introduces modules and commands recently added to the Metasploit Framework, along with new chapters on the Cloud Lookup (and Bypass) module and attacking IoT or SCADA (industrial) systems using the Mobius client module. You'll learn: modern pentesting techniques, including network reconnaissance and enumeration, the Metasploit Framework's conventions, interfaces, and module system, client-side attacks, wireless exploits, targeted social-engineering attacks. In a digital ecosystem increasingly driven by cloud-based and industrial attacks, the modern hacking techniques covered in Metasploit, 2nd Edition are essential for today's penetration testers.
Condizione: As New. Unread book in perfect condition.
Condizione: New. 2nd edition NO-PA16APR2015-KAP.
EUR 40,44
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 1st edition. 500 pages. 9.25x7.00x1.29 inches. In Stock.
Paperback. Condizione: New.
EUR 5,47
Quantità: 1 disponibili
Aggiungi al carrellopaperback. Condizione: Good.
EUR 42,51
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 44,51
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Very good.
EUR 45,98
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 58,59
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 54,61
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 53,00
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 2nd edition. 352 pages. 9.25x7.00x9.31 inches. In Stock.
EUR 36,86
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: New. Idioma/Language: Español. Durante más de una década, Metasploit: Análisis de vulnerabilidades y detección de intrusiones ha sido la referencia definitiva en evaluación de seguridad. El framework Metasploit permite detectar, explotar y compartir vulnerabilidades con eficacia, aunque su dominio inicial puede resultar desafiante para quienes comienzan. Esta segunda edición, completamente revisada y actualizada por reconocidos hackers éticos y expertos en seguridad, incorpora: o Funciones avanzadas para Active Directory y pruebas de intrusión en la nube o Técnicas modernas de evasión y codificación de cargas útiles o Creación de documentos maliciosos para explotación del lado del cliente o Revisión a fondo de los nuevos módulos y comandos añadidos Desde los fundamentos del framework (vulnerabilidades, cargas útiles, Meterpreter y módulos auxiliares) hasta metodologías complejas alineadas con el estándar de ejecución de pruebas de intrusión (PTES), este libro recorre cada fase del proceso. Con ejemplos prácticos y escenarios de pruebas de intrusión realistas, aprenderá a: o Realizar reconocimiento de red y análisis de vulnerabilidades o Llevar a cabo ataques a redes inalámbricas y campañas de ingeniería social o Aplicar técnicas de postexplotación, incluyendo la escalada de privilegios o Desarrollar módulos personalizados en Ruby y aprovechar exploits ya existentes o Utilizar MSFvenom para esquivar defensas o Integrar Metasploit con Nmap, Nessus y el Social-Engineer Toolkit Tanto si es profesional de la ciberseguridad como hacker ético o administrador de sistemas, esta segunda edición de Metasploit: Análisis de vulnerabilidades y detección de intrusiones es la clave para mantenerse a la vanguardia en un panorama de amenazas en constante evolución. Sobre los autores David Kennedy, fundador de Binary Defense y TrustedSec, es líder en ciberseguridad y asesor de la galardonada serie Mr. Robot. Mati Aharoni, fundador de OffSec, ha identificado importantes vulnerabilidades a nivel global. Devon Kearns es cofundador de Exploit Database y Kali Linux. Jim O'Gorman dirige el proyecto Kali Linux en OffSec. Daniel G. Graham es profesor de informática en la Universidad de Virginia y exdirector de programa en Microsoft. *** Nota: Los envíos a España peninsular, Baleares y Canarias se realizan a través de mensajería urgente. No aceptamos pedidos con destino a Ceuta y Melilla.
EUR 52,69
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. In.