- Kali Linux 2018:Assuring Security by Penetration Testing
- Shiva V. N Parasram Alex Samm Damian Boodoo Gerard Johansen Lee Allen Tedi Heriyanto Shakeel Ali
- 26字
- 2021-06-24 18:18:57
Configuring the virtual machine
Once installed, there are several configuration steps necessary for the Kali Linux virtual machine. These steps allow for greater functionality and usability.
推薦閱讀
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 開(kāi)發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- Penetration Testing with Perl
- .NET安全攻防指南(上冊(cè))
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計(jì)技術(shù)揭秘
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- 信息安全導(dǎo)論(第2版)
- CTF快速上手:PicoCTF真題解析(Web篇)
- Mastering Python for Networking and Security
- 交換機(jī)·路由器·防火墻(第2版)
- 網(wǎng)絡(luò)空間安全法律問(wèn)題研究
- 信息組織
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)