We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£41.99
Packt Publishing Mastering Metasploit: Write and Implement Sophisticated Attack Vectors in Metasploit Using a Completely Hands-on Approach
Price data checked 6 days ago
Price History & Forecast
Last 85 days • 85 data points (No recent data available)
Price Distribution
Price distribution over 85 days • 1 price levels
Price Analysis
Most common price: £42 (85 days, 100.0%)
Price range: £42 - £42
Price levels: 1 different prices over 85 days
Description
Product Specifications
- Brand
- Packt Publishing
- Format
- paperback
- ASIN
- 1782162224
- Category
- Books > Subjects > Computing & Internet > Networking & Security > Introduction to Network & Security
- Domain
- Amazon UK
- Publication Date
- 26 May 2014
- Listed Since
- 20 December 2013
Barcode
No barcode data available
Similar Products You Might Like
Defensive Security Handbook: Best Practices for Securing Infrastructure
O'Reilly
Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7
Packt Publishing
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Apress
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Syngress
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
De Gruyter Mouton
Malware Analysis Techniques: Tricks for the triage of adversarial software
Packt Publishing
Cybersecurity Essentials: Practical Tools for Today's Digital Defenders
Apress
Conducting Network Penetration and Espionage in a Global Environment
CRC Press
Zseano's methodology
Web Penetration Testing with Kali Linux
Packt Publishing
The Security Leader’s Communication Playbook: Bridging the Gap between Security and the Business (Security, Audit and Leadership Series)
CRC Press
Security on the Web: 83 (Advances in Computers): Volume 83
Academic Press
Proceedings of the International Conference on Applied CyberSecurity (ACS) 2021: 378 (Lecture Notes in Networks and Systems, 378)
Springer
Building an Effective Security Program
De Gruyter
Hacked: The Secrets Behind Cyber Attacks
Kogan Page
National Cyber Summit (NCS) Research Track: 1055 (Advances in Intelligent Systems and Computing, 1055)
Springer
Machine Intelligence and Big Data Analytics for Cybersecurity Applications: 919 (Studies in Computational Intelligence, 919)
Springer
Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities: 972 (Studies in Computational Intelligence, 972)
Springer
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Information Science Reference
iOS Penetration Testing: A Definitive Guide to iOS Security
Apress
Computer Insecurity: Risking the System
Springer
Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System: 334 (Studies in Computational Intelligence, 334)
Springer
OSINT 101: The Ultimate Open Source intelligence Handbook
Auf der Spur der Hacker: Wie man die Täter hinter der Computer-Spionage enttarnt
Springer