Metasploit Toolkit.pdf
(
5122 KB
)
Pobierz
Visit us at
w w w. s y n g r e s s . c o m
Syngress is committed to publishing high-quality books for IT Professionals and deliv-
ering those books in media and formats that fit the demands of our customers. We are
also committed to extending the utility of the book you purchase via additional mate-
rials available from our Web site.
SOLUTIONS WEB SITE
To register your book, visit www.syngress.com/solutions. Once registered, you can access
our solutions@syngress.com Web pages. There you may find an assortment of value-
added features such as free e-books related to the topic of this book, URLs of related
Web sites, FAQs from the book, corrections, and any updates from the author(s).
ULTIMATE CDs
Our Ultimate CD product line offers our readers budget-conscious compilations of some
of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to
extend your reference library on key topics pertaining to your area of expertise,
including Cisco Engineering, Microsoft Windows System Administration, CyberCrime
Investigation, Open Source Security, and Firewall Configuration, to name a few.
DOWNLOADABLE E-BOOKS
For readers who can’t wait for hard copy, we offer most of our titles in downloadable
Adobe PDF form. These e-books are often available weeks before hard copies, and are
priced affordably.
SYNGRESS OUTLET
Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt
books at significant savings.
SITE LICENSING
Syngress has a well-established program for site licensing our e-books onto servers in
corporations, educational institutions, and large organizations. Contact us at sales@syn-
gress.com for more information.
CUSTOM PUBLISHING
Many organizations welcome the ability to combine parts of multiple Syngress books, as
well as their own content, into a single volume for their own internal use. Contact us at
sales@syngress.com for more information.
Metasploit
Toolkit
FOR PENETRATION TESTING,
EXPLOIT DEVELOPMENT, AND
VULNERABILITY RESEARCH
David Maynor
K. K. Mookhey
Plik z chomika:
musli_com
Inne pliki z tego folderu:
EN-Metasploit Toolkit.pdf
(5122 KB)
1-Metasploit 2004.pdf
(185 KB)
Metasploit-The Penetration Tester s Guide.pdf
(7090 KB)
2-Metasploit 2004.pdf
(428 KB)
3-Metasploit 2004.pdf
(201 KB)
Inne foldery tego chomika:
Access Denied The Practice and Policy of Global Internet Filtering
Attacking DDoS At The Source
Crypto
Cryptographie . Algorithmes . Steganographie
Forensic
Zgłoś jeśli
naruszono regulamin