- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 288字
- 2021-07-16 11:33:16
Customer support
Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.
Errata
Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from http://www.packtpub.com/support.
Piracy
Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.
Please contact us at <copyright@packtpub.com>
with a link to the suspected pirated material.
We appreciate your help in protecting our authors, and our ability to bring you valuable content.
Questions
You can contact us at <questions@packtpub.com>
if you are having a problem with any aspect of the book, and we will do our best to address it.
- 白話網絡安全2:網安戰略篇
- SASE原理、架構與實踐
- 硬黑客:智能硬件生死之戰
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- Mastering Reverse Engineering
- 網絡用戶行為的安全可信分析與控制
- 黑客攻防實戰從入門到精通
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 隱私計算:推進數據“可用不可見”的關鍵技術
- 信息安全工程與實踐
- 華為Anti-DDoS技術漫談
- 交換機·路由器·防火墻(第2版)
- 功能型密碼算法設計與分析
- 網絡空間安全體系
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter