Learning Resource and Development

Mastering kali Linux for advanced penetration testing : (Record no. 30456)

MARC details
000 -LEADER
fixed length control field 04434nam a2200325 i 4500
003 - CONTROL NUMBER IDENTIFIER
control field CSPC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250910143417.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250909s2022 -uka 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781801819770
040 ## - CATALOGING SOURCE
Original cataloging agency CSPC
Language of cataloging eng
Transcribing agency CSPC
Description conventions rda
050 04 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number V458 2022
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number V548m
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Velu, Vijay Kumar,
Relator term author.
245 10 - TITLE STATEMENT
Title Mastering kali Linux for advanced penetration testing :
Remainder of title become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and burp suite /
Statement of responsibility, etc. Vijay Kumar Velu.
250 ## - EDITION STATEMENT
Edition statement Fourth edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Birmingham, UK :
Name of producer, publisher, distributor, manufacturer Packt Publishing,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 548 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
490 0# - SERIES STATEMENT
Series statement Expert insight
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Goal-based penetration testing -- Open-source intelligence and passive reconnaissance -- Active reconnaissance of external and internal networks -- Vulnerability assessment -- Advanced social engineering and physical security -- Wireless and Bluetooth attacks -- Exploiting web-based applications -- Cloud security exploitation -- Bypassing security controls -- Exploitation -- Action on the objective and lateral movement -- Privilege escalations -- Command and control -- Embedded devices and RFID hacking.
520 ## - SUMMARY, ETC.
Summary, etc. "Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud environments, and applications, and become familiar with the latest hacking techniques Key Features Master advanced pentesting tactics and techniques with Kali Linux to build highly secure systems Leverage Kali Linux to penetrate modern infrastructures and avoid detection Explore red teaming and play the hackers game to proactively defend your infrastructure Book Description COVID-19 has changed the way we live and work. Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you will learn an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers. You will be introduced to laboratory integration to cloud services so that you learn another dimension of exploitation that is typically forgotten during a penetration test. Gathering all possible information on a target is pivotal for a penetration tester. This book covers the principles of passive and active reconnaissance, from obtaining user information to large-scale port scanning. Building on reconnaissance, different vulnerability assessments are explored, including threat modeling. You'll also learn about COVID-19 pandemic-specific cyber failures and understand the cyber risks involved with working from home. By the end of this Kali Linux book, you will have explored approaches for performing advanced pentesting in tightly secured infrastructure, cloud environments, and applications and hacking techniques employed on IoT, embedded peripheral devices, and radio frequencies. What you will learn Exploit networks using wired/wireless networks, cloud infrastructure, and web services Learn embedded peripheral device, radio frequency, and IoT hacking techniques Master the art of bypassing traditional antivirus and endpoint detection and response (EDR) tools Test for data system exploits using Metasploit, PowerShell Empire, and CrackMapExec Perform cloud security vulnerability assessment and exploitation of security misconfiguration Take your physical security testing to the next level with RFID/Bluetooth hacking and learn how to clone identity cards Who this book is for This fourth edition is for security analysts, pentesters, ethical hackers, red team operators, and security consultants wanting to learn and optimize infrastructure/application/cloud security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book."
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Kali Linux.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security).
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Suppress in OPAC No
Koha item type Books
Classification part 005.8
Item part V548m
Call number prefix GRD
Call number suffix 2022
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main Library Main Library Graduate School Library 09/09/2025   GRD 005.8 V548m 2022 030169 09/09/2025 2-3 09/09/2025 Books
    Dewey Decimal Classification     Main Library Main Library Graduate School Library 09/09/2025   GRD 005.8 V548m 2022 030170 09/09/2025 3-3 09/09/2025 Books
    Dewey Decimal Classification     Main Library Main Library Graduate School Library 09/10/2025   GRD 005.8 V548m 2022 030168 09/10/2025 1-3 09/10/2025 Books