Condition: New.
Condition: New.
Condition: New.
Condition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 40.30
Quantity: Over 20 available
Add to basketCondition: New. In.
Published by Packt Publishing 2018-02, 2018
ISBN 10: 1788624483 ISBN 13: 9781788624480
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
PF. Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Condition: New. This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices , modern operating.
Published by Packt Publishing, Limited, 2018
ISBN 10: 1788624483 ISBN 13: 9781788624480
Language: English
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 396.
Published by Packt Publishing Limited, 2018
ISBN 10: 1788624483 ISBN 13: 9781788624480
Language: English
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
£ 47.36
Quantity: Over 20 available
Add to basketPaperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 781.
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Advanced Infrastructure Penetration Testing | Chiheb Chebbi | Taschenbuch | Kartoniert / Broschiert | Englisch | 2018 | Packt Publishing | EAN 9781788624480 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices, modern operating systems and help you secure high security environments.