Its a Book ?
Brief Description:
Part I: Building the Foundation for Ethical Hacking
Part II: Putting Ethical Hacking in Motion
Part III: Hacking Network Hosts
Part IV: Hacking Operating Systems
Part V: Hacking Applications
Part VI: Ethical Hacking Aftermath
Part VII: The Part of Tens
Appendix: Tools and Resources
Brief Description:
Part I: Building the Foundation for Ethical Hacking
Part II: Putting Ethical Hacking in Motion
Part III: Hacking Network Hosts
Part IV: Hacking Operating Systems
Part V: Hacking Applications
Part VI: Ethical Hacking Aftermath
Part VII: The Part of Tens
Appendix: Tools and Resources