The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large …
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …
A no-holds-barred examination of the National Security Agency packed with startling secrets about its past, newsbreaking revelations about its present-day …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers …
If you're responsible for securing a Git server where lots of developers work with lots of repositories, you have a …
""Immerse yourself in the world of distributed storage systems with "Mastering Ceph". Written by an expert in the field, this …
Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products …
Get step-by-step instructions for making Linux installation simple and painless; Familiarize yourself with the Linux shell, file system, and text …
VMware ESXi 5.1 is written in a Cookbook style, learn through practical real world recipes and examples. VMware ESXi 5.1 …
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years …
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug …
Uncover hidden patterns of data and respond with countermeasuresSecurity professionals need all the tools at their disposal to increase their …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing …
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the …
Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide …
Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec …
VX Underground Black Mass Volume 1
Over 70 recipes to help you master Kali Linux for effective penetration security testing Overview Recipes designed to educate you …
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking …
Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It …
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting …
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, …
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, …
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat …
This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer …
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering …
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding …
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, …
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one …
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would …