Listing 1 - 2 of 2 |
Sort by
|
Choose an application
An easy-to-understand, step-by-step practical guide that shows you how to use the Linux Bash terminal tools to solve information security problems. If you are a penetration tester, system administrator, or developer who would like an enriching and practical introduction to the Bash shell and Kali Linux command-line-based tools, this is the book for you.
Penetration testing (Computer security) --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Ethical hacking (Computer security) --- Computer security --- Examinations. --- Design. --- Kali Linux. --- UNIX Shells. --- UNIX Shells (Computer programs) --- Shell (Computer file) --- Shells (Computer file) --- UNIX Shell
Choose an application
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from
Operating systems (Computers) --- Smartphones --- Smart cell phones --- Smart phones --- Cell phones --- Pocket computers --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Security measures. --- Operating systems --- Android (Electronic resource) --- Android operating system (Electronic resource) --- Android OS (Electronic resource) --- Google Android (Electronic resource) --- Android mobile operating system (Electronic resource)
Listing 1 - 2 of 2 |
Sort by
|