£49.60

Apress Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Price data last checked 9 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 82 days • 82 data points (No recent data available)

Historical
Generating forecast...
£49.91 £48.94 £49.15 £49.36 £49.58 £49.79 £50.00 23 January 2026 12 February 2026 04 March 2026 24 March 2026 14 April 2026

Price Distribution

Price distribution over 82 days • 2 price levels

Days at Price
Current Price
70 days · current 12 days · current 0 18 35 53 70 £49 £50 Days at Price

Price Analysis

Most common price: £49 (70 days, 85.4%)

Price range: £49 - £50

Price levels: 2 different prices over 82 days

Description

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll move on to an introduction to VirtualBox, networking, and common Linux commands, followed by the step-by-step procedure to build your own web server and acquire the skill to be anonymous . When you have finished the examples in the first part of your book, you will have all you need to carry out safe and ethical hacking experiments. After an introduction to Kali Linux, you will carry out your first penetration tests with Python and code raw binary packets for use in those tests. You will learn how to find secret directories on a target system, use a TCP client in Python, and scan ports using NMAP. Along the way you will discover effective ways to collect important information, track email, and use important tools such as DMITRY and Maltego, as well as take a look at the five phases of penetration testing. The coverage of vulnerability analysis includes sniffing and spoofing, why ARP poisoning is a threat, how SniffJoke prevents poisoning, how to analyze protocols with Wireshark, and using sniffing packets with Scapy. The next part of the book shows you detecting SQL injection vulnerabilities, using sqlmap, and applying brute force or password attacks. Besides learning these tools, you will see how to use OpenVas, Nikto, Vega, and Burp Suite. The book will explain the information assurance model and the hacking framework Metasploit, taking you through important commands, exploit and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic and modern encryptiontechniques where you will learn the conventional cryptosystem. In the final chapter you will acquire the skill of exploiting remote Windows and Linux systems and you will learn how to own a target completely. What You Will Learn Master common Linux commands and networking techniques Build your own Kali web server and learn to be anonymous Carry out penetration testing using Python Detect sniffing attacks and SQL injection vulnerabilities Learn tools such as SniffJoke, Wireshark, Scapy, sqlmap, OpenVas, Nikto, and Burp Suite Use Metasploit with Kali Linux Exploit remote Windows and Linux systems Who This Book Is For Developers new to ethical hacking with a basic understanding of Linux programming.

Product Specifications

Brand
Apress
Format
paperback
Domain
Amazon UK
Release Date
30 November 2018
Listed Since
05 July 2018

Barcode

No barcode data available

Similar Products You Might Like

Kali Linux: 2 books in 1: The Complete Beginner's Guide About Kali Linux For Beginners & Hacking With Kali Linux, Full of Practical Examples Of Wireless Networking & Penetration Testing
98% match

Kali Linux: 2 books in 1: The Complete Beginner's Guide About Kali Linux For Beginners & Hacking With Kali Linux, Full of Practical Examples Of Wireless Networking & Penetration Testing

Independently Published

£44.69 14 Apr 2026
Web Penetration Testing with Kali Linux
98% match

Web Penetration Testing with Kali Linux

Packt Publishing

£41.99 15 Apr 2026
Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7
98% match

Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Packt Publishing

£41.99 11 Apr 2026
Kali Linux 2: Windows Penetration Testing: Windows Penetration Testing: Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
98% match

Kali Linux 2: Windows Penetration Testing: Windows Penetration Testing: Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Packt Publishing

£39.99 19 Apr 2026
Defensive Security Handbook: Best Practices for Securing Infrastructure
98% match

Defensive Security Handbook: Best Practices for Securing Infrastructure

O'Reilly

£37.76 13 Apr 2026
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
98% match

Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Packt Publishing

£41.50 13 Apr 2026
Cybersecurity Essentials: Practical Tools for Today's Digital Defenders
98% match

Cybersecurity Essentials: Practical Tools for Today's Digital Defenders

Apress

£38.87 19 Apr 2026
Malware Analysis Techniques: Tricks for the triage of adversarial software
98% match

Malware Analysis Techniques: Tricks for the triage of adversarial software

Packt Publishing

£39.99 09 Apr 2026
Conducting Network Penetration and Espionage in a Global Environment
98% match

Conducting Network Penetration and Espionage in a Global Environment

CRC Press

£57.56 05 Apr 2026
El libro del Hacker. Edición 2022 (TÍTULOS ESPECIALES)
98% match

El libro del Hacker. Edición 2022 (TÍTULOS ESPECIALES)

Anaya Multimedia

£41.89 09 Apr 2026
Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)
97% match

Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)

Springer

£147.91 04 Apr 2026
Building an Effective Security Program
97% match

Building an Effective Security Program

De Gruyter

£41.50 01 Apr 2026
National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)
97% match

National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)

Springer

£77.73 18 Apr 2026
Hacked: The Secrets Behind Cyber Attacks
97% match

Hacked: The Secrets Behind Cyber Attacks

Kogan Page

£33.90 09 Apr 2026
Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System: 334 (Studies in Computational Intelligence, 334)
97% match

Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System: 334 (Studies in Computational Intelligence, 334)

Springer

£76.14 12 Apr 2026
GFI Network Security and PCI Compliance Power Tools
97% match

GFI Network Security and PCI Compliance Power Tools

Syngress

£40.99 13 Apr 2026
Security on the Web: 83 (Advances in Computers): Volume 83
97% match

Security on the Web: 83 (Advances in Computers): Volume 83

Academic Press

£102.12 11 Apr 2026
OSINT 101: The Ultimate Open Source intelligence Handbook
97% match

OSINT 101: The Ultimate Open Source intelligence Handbook

£40.14 12 Mar 2026
Mastering Metasploit: Write and Implement Sophisticated Attack Vectors in Metasploit Using a Completely Hands-on Approach
97% match

Mastering Metasploit: Write and Implement Sophisticated Attack Vectors in Metasploit Using a Completely Hands-on Approach

Packt Publishing

£41.99 17 Apr 2026
The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)
97% match

The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)

CRC Press

£45.85 11 Apr 2026
Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)
97% match

Cyber Security: Critical Infrastructure Protection: 56 (Computational Methods in Applied Sciences, 56)

Springer

£120.83 14 Apr 2026
Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt
97% match

Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt

Springer

£46.83 05 Apr 2026
Risk Assessment and Countermeasures for Cybersecurity
97% match

Risk Assessment and Countermeasures for Cybersecurity

£330.44 11 Apr 2026
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021: 378 (Lecture Notes in Networks and Systems, 378)
97% match

Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021: 378 (Lecture Notes in Networks and Systems, 378)

Springer

£111.36 01 Apr 2026