The TNF and TNF receptor gene superfamilies control a variety of distinct physiological functions such as cell proliferation, differentiation, and …
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command"Linux Essentials for Hackers & Pentesters" is …
Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author …
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android …
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that …
""Master the inner workings of Git, the popular version control system, with 'Git Internals - Source Code Control and Beyond' …
Delve into the world of offensive cybersecurity as you master Bash, a fundamental language for expert penetration testers. Unleash its …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It …
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchKey FeaturesLearn to compromise enterprise networks with …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking …
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years …
Uncover hidden patterns of data and respond with countermeasuresSecurity professionals need all the tools at their disposal to increase their …
If you're responsible for securing a Git server where lots of developers work with lots of repositories, you have a …
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing …
VX Underground Black Mass Volume 1
Get step-by-step instructions for making Linux installation simple and painless; Familiarize yourself with the Linux shell, file system, and text …
The primary goal of Black Hat Ruby book is to provide you with a vast angle of using Ruby as …
A practical guide to testing your networks security with Kali Linux - the preferred choice of penetration testers and hackers …
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high …
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …
VMware ESXi 5.1 is written in a Cookbook style, learn through practical real world recipes and examples. VMware ESXi 5.1 …
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing …
The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current …
From the reviews: "This book crystallizes what may become a defining moment in the electronics industry - the shift to …
Do you often hear about "trading", "automatic investments", "make money online", "forex" and similar topics?Are you new to the game …
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's …
Investigate, analyze, and report iOS, Android, and Windows devices Key Features • Get hands-on experience in performing simple to complex …
"Get ready to accelerate your online experience with Web Content Caching and Distribution [8th Intl Wkshp] by Yuli Vasiliev! This …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide …
Inside Cisco IOS Software Architecture offers crucial and hard-to-find information on Cisco's Internetwork Operating System (IOS) Software. IOS Software provides …
""Unlock the Power of Ceph: A Comprehensive Guide for Administrators and Architects!\n\nGet ready to master Ceph, the leading open-source, distributed …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. …