Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама



Название: Linux: 2 Books in 1: Linux for Beginners + Kali Linux Hacking: The Comprehensive Step-by-Step Guide to Learn the Fundamentals of Cyber Security, Penetration Testing, Networking and Computer Hacking. Include Exercises and Self-Evaluation Tests
Автор: Ethem Mining
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 442
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

If you have picked up this book, you are inevitably interested in Linux, at least to some degree. You may be interested in understanding the software, or debating whether it is right for you. However, especially as a beginner, it is easy to feel lost in a sea of information. How do you know what version of Linux to download? Or how to even go about downloading it, to begin with? Is Linux even right for you to begin with? All of those are valid questions, and luckily for you, "Linux: 2 Books in 1" is here to guide you through all of it.

THIS BOOK INCLUDES 2 MANUSCRIPTS:

Book 1: Linux for Beginners - A Practical and Comprehensive Guide to Learn Linux Operating System and Master Linux Command Line. Contains Self-Evaluation Tests to Verify Your Learning Level
Book 2: Kali Linux Hacking - A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts

Some of the versions of Linux, known as Linux distributions, or more commonly shortened to “Linux distros,” will be easy enough to hop right in to using, while others could be your worst nightmare immediately upon installing it, such as Gentoo, which requires all programs, including the kernel, to be built from source.

Nmap stands for network mapper—it is an incredibly popular tool that is used to discover that is available to you. As with all of the tools provided to you within the Kali Linux distribution, this is free to use and secure. When you use Nmap, you are able to map out networks, allowing yourself to see inventories and find open ports as well. It is quite simple to use—it brings up a terminal that you are able to enter your commands and scripts within, allowing you to do whatever you would like within the system once you have gotten in.

This tool is able to work through firewalls and routers, it can bypass an IP filter, and it is able to navigate into systems. While it was designed to be capable of getting through massive networks, it can also be used on smaller scales as well. It is primarily used for port scanning, version detection, operating system detection, and using ping sweeps.

Скачать Linux: 2 Books in 1:The Comprehensive Step-by-Step Guide to Learn the Fundamentals of Cyber Security, Penetration Testing, Networking and Computer Hacking. ... Include Exercises and Self-Evaluation Tests









НЕ РАБОТАЕТ TURBOBIT.NET? ЕСТЬ РЕШЕНИЕ, ЖМИ СЮДА!





Автор: Ingvar16 6-04-2020, 05:35 | Напечатать | СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.





С этой публикацией часто скачивают:
    {related-news}

Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.


 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности