{
"item_title" : "Linux Commands for Hacking",
"item_author" : [" Issa Ngoie "],
"item_description" : "Linux is an extremely popular operating system for hackers. ... Malicious actors use Linux hacking tools to exploit vulnerabilities in Linux applications, software, and networks. This type of Linux hacking is done in order to gain unauthorized access to systems and steal data.",
"item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/79/846/996/9798469968382_b.jpg",
"price_data" : {
"retail_price" : "25.00", "online_price" : "25.00", "our_price" : "25.00", "club_price" : "25.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : ""
}
}
Overview
Linux is an extremely popular operating system for hackers. ... Malicious actors use Linux hacking tools to exploit vulnerabilities in Linux applications, software, and networks. This type of Linux hacking is done in order to gain unauthorized access to systems and steal data.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9798469968382
- ISBN-10: 9798469968382
- Publisher: Independently Published
- Publish Date: September 2021
- Dimensions: 11 x 8.5 x 0.17 inches
- Shipping Weight: 0.46 pounds
- Page Count: 80
Related Categories
