Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200493 i 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    190326s2019    enka    ob    000 0 eng d 
020    9781789340617 
020    1789340616 
035    (OCoLC)1090680976 
037    CL0501000036|bSafari Books Online 
040    UMI|beng|erda|epn|cUMI|dOCLCF|dOCLCQ|dOCLCO|dOCLCQ|dQGK
       |dOCLCO|dOCLCL 
049    INap 
082 04 005.8 
082 04 005.8|qOCoLC|223/eng/20230216 
099    eBook O'Reilly for Public Libraries 
100 1  Velu, Vijay Kumar,|eauthor. 
245 10 Mastering Kali Linux for advanced penetration testing :
       |bsecure your network with Kali Linux 2019.1, the ultimate
       white hat hackers' toolkit /|cVijay Kumar Velu, Robert 
       Beggs.|h[O'Reilly electronic resource] 
250    Third edition. 
264  1 Birmingham, UK :|bPackt Publishing,|c2019. 
300    1 online resource (1 volume) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
500    Previous edition published: 2017. 
504    Includes bibliographical references. 
520    A practical guide to testing your infrastructure security 
       with Kali Linux, the preferred choice of pentesters and 
       hackers Key Features Employ advanced pentesting techniques
       with Kali Linux to build highly secured systems Discover 
       various stealth techniques to remain undetected and defeat
       modern infrastructures Explore red teaming techniques to 
       exploit secured environment Book Description This book 
       takes you, as a tester or security practitioner, through 
       the reconnaissance, vulnerability assessment, exploitation,
       privilege escalation, and post-exploitation activities 
       used by pentesters. To start with, you'll use a laboratory
       environment to validate tools and techniques, along with 
       an application that supports a collaborative approach for 
       pentesting. You'll then progress to passive reconnaissance
       with open source intelligence and active reconnaissance of
       the external and internal infrastructure. You'll also 
       focus on how to select, use, customize, and interpret the 
       results from different vulnerability scanners, followed by
       examining specific routes to the target, which include 
       bypassing physical security and the exfiltration of data 
       using a variety of techniques. You'll discover concepts 
       such as social engineering, attacking wireless networks, 
       web services, and embedded devices. Once you are confident
       with these topics, you'll learn the practical aspects of 
       attacking user client systems by backdooring with fileless
       techniques, followed by focusing on the most vulnerable 
       part of the network ? directly attacking the end user. By 
       the end of this book, you'll have explored approaches for 
       carrying out advanced pentesting in tightly secured 
       environments, understood pentesting and hacking techniques
       employed on embedded peripheral devices. What you will 
       learn Configure the most effective Kali Linux tools to 
       test infrastructure security Employ stealth to avoid 
       detection in the infrastructure being tested Recognize 
       when stealth attacks are being used against your 
       infrastructure Exploit networks and data systems using 
       wired and wireless networks as well as web services 
       Identify and download valuable data from target systems 
       Maintain access to compromised systems Use social 
       engineering to compromise the weakest part of the network 
       - the end users Who this book is for This third edition of
       Mastering Kali Linux for Advanced Penetration Testing is 
       for you if you are a security analyst, pentester, ethical 
       hacker, IT professional, or security consultant wanting 
       ... 
588 0  Online resource; title from title page (Safari, viewed 
       March 25, 2019). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
630 00 Kali Linux. 
630 07 Kali Linux|2fast 
650  0 Penetration testing (Computer security) 
650  0 Computer networks|xSecurity measures. 
650  6 Tests d'intrusion. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  7 Computer networks|xSecurity measures|2fast 
650  7 Penetration testing (Computer security)|2fast 
700 1  Beggs, Robert,|eauthor. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781789340563/?ar
       |zAvailalbe on O'Reilly for Public Libraries 
994    92|bJFN