• Complain

Corey P. Schultz - Kali Linux Cookbook

Here you can read online Corey P. Schultz - Kali Linux Cookbook full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: Packt Publishing, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Kali Linux Cookbook: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Kali Linux Cookbook" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Corey P. Schultz is a technologist focusing on security research, Internet of Things, and the impact of technology on education and learning. He has over 20 years of experience in the security industry doing security architecture, penetration testing, incident response, and forensic analysis.

Corey is currently a technical solutions architect for Cisco Systems Global Security Sales Organization. He works on a daily basis with large environments on designing and architecting secure enterprise networks.

You can also find Corey active on Twitter @cschultz0000, where you can also see his schedule of speaking engagements and appearances.

Bob Perciaccante is seasoned information security practitioner who has been in the security field for almost 20 years. Currently, he is a consulting systems engineer for Cisco Systems in Pennsylvania where he has worked for the last 10 years focusing on network and data security, network access control, and secure network architectures. His primary day-to-day responsibilities focus on designing secure network solutions for his customers and working to train customers and partners on security solution implementations and daily operations to get the most out of their infrastructure.

When not involved in security activities, Bob enjoys eclectic hobbies such as working on cars, 3D printing, and camping.

Collaborating with his Cisco peer, Corey P. Schultz, this book is his first security publication.

Corey P. Schultz: author's other books


Who wrote Kali Linux Cookbook? Find out the surname, the name of the author of the book and a list of all author's works by series.

Kali Linux Cookbook — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Kali Linux Cookbook" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Kali Linux Cookbook
Second Edition
Effective penetration testing solutions
Corey P. Schultz
Bob Perciaccante
BIRMINGHAM - MUMBAI Kali Linux Cookbook Second Edition Copyright 2017 Packt - photo 1

BIRMINGHAM - MUMBAI

Kali Linux Cookbook
Second Edition

Copyright 2017 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

First published: October 2013

Second edition: September 2017

Production reference: 1080917

Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.

ISBN 978-1-78439-030-3

www.packtpub.com

Credits

Authors

Corey P. Schultz

Bob Perciaccante

Copy Editors

Juliana Nair

Yesha Gangani

Reviewers

Bhargav Tandel

Nishant Kumar Das Pattanaik

Project Coordinator

Judie Jose

Commissioning Editor

Vijin Boricha

Proofreader

Safis Editing

Acquisition Editor

Rahul Nair

Indexer

Aishwarya Gangawane

Content Development Editor

Devika Battike

Graphics

Kirk D'Penha

Technical Editor

Prachi Sawant

Production Coordinator

Aparna Bhagat

About the Authors

Corey P. Schultz is a technologist focusing on security research, Internet of Things, and the impact of technology on education and learning. He has over 20 years of experience in the security industry doing security architecture, penetration testing, incident response, and forensic analysis.

Corey is currently a technical solutions architect for Cisco Systems Global Security Sales Organization. He works on a daily basis with large environments on designing and architecting secure enterprise networks.

You can also find Corey active on Twitter @cschultz0000 or at his blog darkderby.com, where you can also see his schedule of speaking engagements and appearances.

I would like to thank my wife Melanie and our two sons, Nate and Kyle, for all their love and support, especially during the long nights and weekends while I was writing this book. I would also like to thank my mom and dad (Rest in Peace I miss you dad!) for teaching me the value of hard work and all their love and support.
I would also like to thank Colby Kordas and Kyle Schultz for their efforts in testing some of the content in the book.
Lastly, I would like to thank the numerous people throughout my career that have supported me and mentored me over the last 20 years. For without their help, I would not be where I am todaythank you all!

Bob Perciaccante is seasoned information security practitioner who has been in the security field for almost 20 years. Currently, he is a consulting systems engineer for Cisco Systems in Pennsylvania where he has worked for the last 10 years focusing on network and data security, network access control, and secure network architectures. His primary day-to-day responsibilities focus on designing secure network solutions for his customers and working to train customers and partners on security solution implementations and daily operations to get the most out of their infrastructure.

When not involved in security activities, Bob enjoys eclectic hobbies such as working on cars, 3D printing, and camping.

Collaborating with his Cisco peer, Corey P. Schultz, this book is his first security publication.

I would like to thank my wife, Amy, for her unending, unwavering support, without whom this book, and a large part of my career, would not be possible. You make a difference, every day dont ever forget that!
I would also like to thank the many professionals who have helped me to become what I am today, whether they realize it or not. To Cliff Alligood, for my first shot in IT security and the mentorship and strong work ethics, I learned under your tutelage that has allowed me to be as successful as I am today. To John Ciesla, who gave me the opportunity to grow and the chance to see how a real security team should work. To Tom Bowe, who taught with care, support, and guidance to encourage others to do more than they believed they could. To my Cisco peers, with whom I have shared so much of my career as well as creating an extended family. I hope to be able to pass on some of the experience gained through the support and comradery of those who have shaped me into the individual I have become.
About the Reviewers

Bhargav Tandel has over 5+ years of experience in information security with companies such as Reliance jio, Vodafone, and Wipro. His core expertise and passions are vulnerability assessment, penetration testing, ethical hacking, information security, and system administration. He is currently pursuing the OSCP certification. He has the ability to solve complex problems involving a wide variety of information systems, work independently on large-scale projects, and thrive under pressure in fast-paced environments while directing multiple projects from concept to implementation.

I would like to dedicate this book to my family and friends, who have always stood by me. I would like to thank Jigar Tank (www.hupp.in) and Utkarsh Bhatt, my friends, who have always been there for me. I would also like to thank my Sir, Rakesh Dwivedi, who gave me the reason to continue learning and growing. My extended family made of friends, new and old, makes life more exciting, and there are far too many to list.
Above all, I'd like to thank my parent and my love, Urvashi, for always being there and inspiring me to never back down.

Nishant Kumar Das Pattanaik is an experienced application security and DevSecOps engineer. He is currently working as an application security engineer at eBay, Bangalore. In the past, he has worked as an application security researcher at InMobi and as a senior paranoid at Yahoo!. He loves to share his work with the InfoSec and developer community through public speaking and open source projects. And, hence, he has been a presenter at Black Hat Europe 2016, Black Hat USA 2016, Black Hat USA 2013, and Nullcon 2012. He loves to code in Python, Node.js, and PHP. He has authored Software Hacking, published by Vikas Publishing, and is also the technical reviewer of the book Kali Linux Intrusion and Exploitation Cookbook, published by Packt Publishing, and

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Kali Linux Cookbook»

Look at similar books to Kali Linux Cookbook. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Kali Linux Cookbook»

Discussion, reviews of the book Kali Linux Cookbook and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.