Listing 1 - 1 of 1 |
Sort by
|
Choose an application
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
Penetration testing (Computer security) --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Ethical hacking (Computer security) --- Computer security --- Examinations. --- Design. --- Kali Linux. --- UNIX Shells. --- UNIX Shells (Computer programs) --- Shell (Computer file) --- Shells (Computer file) --- UNIX Shell
Listing 1 - 1 of 1 |
Sort by
|