From several years of programming and problem solving experience, along with the invaluable level of specialized training that Abertay delivers to their students, security has become an integral part of his life. Thank you guys, keep it going!Ībout the Reviewers Gregory Douglas Hill is an ethical hacking student from Abertay University, Scotland, who also works for an independent web application developer focusing on security. Your talent and passion inspire me to do things like this and to always look for new challenges. Love you Mi Reina! To my team: Daniel, Vanessa, Rafael, Fernando, Carlos, Karen, Juan Carlos, Uriel, Iván, and Aldo. To Leticia, thanks for your love, support and encouragement this wouldn't have been possible without you. He has been working as a Penetration Tester since 2013 and has been a security enthusiast since high school he has successfully conducted penetration tests on networks and applications of some of the biggest corporations in Mexico, such as government agencies and financial institutions. He is also an Offensive Security Certified Professional (OSCP), an EC-Council Certified Security Administrator (ECSA), and holds a master's degree in computer science with specialization in artificial intelligence. Production Coordinator Manu Joseph Cover WorkĪbout the Author Gilberto Nájera-Gutiérrez leads the Security Testing Team (STT) at Sm4rt Security Services, one of the top security firms in Mexico. Usha Iyer Content Development Editor Arun Nadar Livery Place 35 Livery Street Birmingham B3 2PB, UK. However, Packt Publishing cannot guarantee the accuracy of this information. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. However, the information contained in this book is sold without warranty, either express or implied. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Kali Linux Web Penetration Testing Cookbook Copyright © 2016 Packt PublishingĪll rights reserved. Kali Linux Web Penetration Testing Cookbook Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |