December 2015
Intermediate to advanced
262 pages
5h 58m
English
Now that we have seen how to secure our message broker, we also need to test that our setup is indeed in place and really prevents attackers from bringing down the message broker or stealing messages. For this reason, you can build your own custom tool for penetration testing of the message broker, which performs the following functions:
Read now
Unlock full access