menu
{ "item_title" : "Linux Commands for Hacking", "item_author" : [" Issa Ngoie "], "item_description" : "Linux is an extremely popular operating system for hackers. ... Malicious actors use Linux hacking tools to exploit vulnerabilities in Linux applications, software, and networks. This type of Linux hacking is done in order to gain unauthorized access to systems and steal data.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/79/846/996/9798469968382_b.jpg", "price_data" : { "retail_price" : "25.00", "online_price" : "25.00", "our_price" : "25.00", "club_price" : "25.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Linux Commands for Hacking|Issa Ngoie

Linux Commands for Hacking

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview


Linux is an extremely popular operating system for hackers. ... Malicious actors use Linux hacking tools to exploit vulnerabilities in Linux applications, software, and networks. This type of Linux hacking is done in order to gain unauthorized access to systems and steal data.

This item is Non-Returnable

Details

  • ISBN-13: 9798469968382
  • ISBN-10: 9798469968382
  • Publisher: Independently Published
  • Publish Date: September 2021
  • Dimensions: 11 x 8.5 x 0.17 inches
  • Shipping Weight: 0.46 pounds
  • Page Count: 80

Related Categories

You May Also Like...

    1

BAM Customer Reviews