Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
|New from||Used from|
Lee Allen is currently working as a security architect at a prominent university. Throughout the years, he has continued his attempts to remain up to date with the latest and greatest developments in the security industry and the security community. He has several industry certifications including the OSWP and has been working in the IT industry for over 15 years. Lee Allen is the author of Advanced Penetration Testing for HighlySecured Environments: The Ultimate Security Guide, Packt Publishing.
Tedi Heriyanto currently works as a principal consultant in an Indonesian information security company. In his current role, he has been engaged with various penetration testing assignments in Indonesia and other countries. In his previous role, he was engaged with several wellknown business institutions across Indonesia and overseas. Tedi has an excellent track record in designing secure network architecture, deploying and managing enterprisewide security systems, developing information security policies and procedures, performing information security audits and assessments, and providing information security awareness training. In his spare time, he manages to research, learn, and participate in the Indonesian Security Community activities and has a blog http://theriyanto.wordpress.com. He shares his knowledge in the security fi eld by writing several information security books.
Shakeel Ali is a Security and Risk Management consultant at Fortune 500. Previously, he was the key founder of Cipher Storm Ltd., UK. His expertise in the security industry markedly exceeds the standard number of security assessments, audits, compliance, governance, and forensic projects that he carries out in daytoday operations. He has also served as a Chief Security Officer at CSS Providers SAL. As a senior security evangelist and having spent endless nights without taking a nap, he provides constant security support to various businesses, educational organizations, and government institutions globally. He is an active, independent researcher who writes various articles and whitepapers and manages a blog at EthicalHacker.net. Also, he regularly participates in BugCon Security Conferences held in Mexico, to highlight the bestofbreed cyber security threats and their solutions from practically driven countermeasures.
Great resource for the penetration testers with up to date tools and techniques. Quite helpful for the experts to keep themselves up to the speed of understanding and learning the... Read morePublished 13 months ago by Joey Rocket
Hello, Amazon? Might want to tighten things up a bit. I found out this morning that "my" review had gone live, even though I've never seen this product before in my life. Read morePublished 13 months ago by Amazon Customer
From it's description I expected more details in how to use the specific features of Kali Linux and not just references to external websites.Published 15 months ago by Gary Rackers