Description
About This BookWrite your own custom information security tools using Perl and object-oriented Perl modulesApply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniquesDevelop a clear understanding of how common attacking tools can function during a penetration testWho This Book Is For
Reviews
There are no reviews yet.