Perspectives on Ethical Hacking and Penetration Testing

Perspectives on Ethical Hacking and Penetration Testing

  • Kaushik, Keshav
  • Bhardwaj, Akashdeep
Publisher:IGI GlobalISBN 13: 9781668482209ISBN 10: 1668482207

Paperback & Hardcover deals ―

Amazon IndiaGOFlipkart GOSnapdealGOSapnaOnlineGOJain Book AgencyGOBooks Wagon₹9,693Book ChorGOCrosswordGODC BooksGO

e-book & Audiobook deals ―

Amazon India GOGoogle Play Books ₹172Audible GO

* Price may vary from time to time.

* GO = We're not able to fetch the price (please check manually visiting the website).

Know about the book -

Perspectives on Ethical Hacking and Penetration Testing is written by Kaushik, Keshav and published by IGI Global. It's available with International Standard Book Number or ISBN identification 1668482207 (ISBN 10) and 9781668482209 (ISBN 13).

Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test’s succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians.