This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on. Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is...
First of all, a big thanks to all fellow hackers who wrote reviews and posts about the book without me ever asking. Insightful comments from knowledgeable hackers are far more valuable to me than any other high-profile commercial review.
"Some of the tools I've used before such as metasploit, proxy chains & sqlmap but not to the extent the author uses them in his examples and it was fascinating understanding some...
"About this title" may belong to another edition of this title.
Shipping:
US$ 10.42
From United Kingdom to U.S.A.
Shipping:
US$ 13.27
From United Kingdom to U.S.A.
Seller: WeBuyBooks, Rossendale, LANCS, United Kingdom
Condition: Good. Most items will be dispatched the same or the next working day. Seller Inventory # mon0024158117
Quantity: 1 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 141 pages. 8.74x5.83x0.39 inches. In Stock. Seller Inventory # zk1520478518
Quantity: 1 available