The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering …
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding …
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced …
This book serves as a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards -- and …
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, …
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would …
Integrate Elasticsearch into Hadoop to effectively visualize and analyze your dataAbout This BookBuild production-ready analytics applications by integrating the Hadoop …
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or …
Practical Malware Analysis – книга для тех, кто хочет быть на шаг впереди последних вредоносных программ. Она дает практический анализ …
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations …
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all …
Why do nations break into one anothers most important computer networks? There is an obvious answer: to steal valuable information …
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level implementations, whether to discover …
Key Features Get to grips with the basics of Elasticsearch concepts and its APIs, and use them to create efficient …
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot …
A guide to using the Ghidra software reverse engineering tool suite. The result of more than a decade of research …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the …
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, …
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers …
A quick guide to learn the most widely-used operating system by network security professionals Overview Learn something new in an …
The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
VX Underground Black Mass: Volume 2.
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks …
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce …
Best-selling guide to the inner workings of the Linux operating system with over 50,000 copies sold since its original release …
Over 130 advanced recipes to search, analyze, deploy, manage, and monitor data effectively with ElasticSearch About This BookDeploy and manage …
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides …
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a …
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network …
The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the …
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and …