Reconnaissance for Ethical Hackers
Singh, Glen D. Use real-world reconnaissance techniques to efficiently gather sensitive information on systems and networks
Purchase of the print or Kindle book includes a free PDF eBook
Key Features:Learn how adversaries use reconnaissance techniques to discover security vulnerabilities on systems
Develop advanced open source intelligence capabilities to find sensitive information
Explore automated reconnaissance and vulnerability assessment tools to prof...