by Georgia Weidman
528 Pages
·
2014
·
12.5 MB
·
2,670 Downloads
·
New!
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.