Advanced penetration testing : hacking the world's most secure networks / Wil Allsopp.
Material type:
- 9781119367680
- QA 76.9 .A45 2017

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Computer Science | GC QA 76.9 .A45 2017 (Browse shelf(Opens below)) | c.1 | Available | NULIB000013824 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Computer Science Close shelf browser (Hides shelf browser)
![]() |
No cover image available |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.8.I2594 .N67 1991 Inside the IBM PC and PS/2 / | GC QA 76.8.M3 .D55 1991 Reference guide to your Macintosh / | GC QA 76.9 .A45 2010 Visual Basic and Access : visual guide / | GC QA 76.9 .A45 2017 Advanced penetration testing : hacking the world's most secure networks / | GC QA 76.9 .A76 2015 Analysis and design of algorithms / | GC QA 76.9 .B46 2014 A guide to algorithm design : paradigms, methods, and complexity analysis / | GC QA 76.9 .C66 2010 Database systems : a practical approach to design, implementation, and management / |
Includes bibliographical references at chapter ends, and index.
Medical Records (In)security -- Stealing Research -- Twenty-First Century Heist -- Pharma Karma -- Guns and Ammo -- Criminal Intelligence -- War Games -- Hack Journalists -- Northern Exposure.
Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. -- Edited summary from book.
There are no comments on this title.