Illustration

Biographie et livres de Thomas Wilhelm

Découvrez tout l'univers de l'auteur en livre numérique
Thomas Wilhelm has been involved in Information Security since 1990, where he served in the U.S. Army for 8 years as a Signals Intelligence Analyst, Russian Linguist, and a Cryptanalyst. His expertise in the field of Information Security has led him to speak at prominent security conferences across the United States, including DefCon, HOPE, and CSI.
Thomas has contributed significantly to the field of professional penetration testing and information security. In his capacity as both a
Découvrez tous ses livres

Dernière parution

Téléchargez le livre :  Professional Penetration Testing
Professional Penetration Testing

Thomas Wilhelm


Syngress

2025-01-21

epub sans DRM

Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security...

98,10

En savoir plus
Télécharger le livre :  Professional Penetration Testing
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability...

Editeur : Syngress
Parution : 2015-08-31
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Professional Penetration Testing
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of...

Editeur : Syngress
Parution : 2013-06-27
epub sans DRM

63,25

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Ninja Hacking
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present...

Editeur : Syngress
Parution : 2010-11-02
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande