Ethical hacking : hacking applications / Chad Russell.

By: Contributor(s): Publisher: [Place of publication not identified] : Stone River eLearning, 2017Description: 1 online resource (1 streaming video file (1 hr., 14 min., 12 sec.)) : digital, sound, colorContent type:
  • two-dimensional moving image
Media type:
  • computer
  • video
Carrier type:
  • online resource
Other title:
  • Hacking applications
Subject(s): Genre/Form: LOC classification:
  • QA76.9.A25
Online resources: Presenter, Chad Russell.Summary: "This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX."--Resource description page.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Presenter, Chad Russell.

Title from resource description page (Safari, viewed November 28, 2017).

"This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX."--Resource description page.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu