The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several …
""Unlock the Power of Ceph: A Comprehensive Guide for Administrators and Architects!\n\nGet ready to master Ceph, the leading open-source, distributed …
Delve into the world of offensive cybersecurity as you master Bash, a fundamental language for expert penetration testers. Unleash its …
If you're responsible for securing a Git server where lots of developers work with lots of repositories, you have a …
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll …
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals …
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take …
Online Trading is a colossal scam! How many times have you heard this sentence from people who often have never …
Get step-by-step instructions for making Linux installation simple and painless; Familiarize yourself with the Linux shell, file system, and text …
From the reviews: "This book crystallizes what may become a defining moment in the electronics industry - the shift to …
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and …
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large …
Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the …
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years …
Uncover hidden patterns of data and respond with countermeasuresSecurity professionals need all the tools at their disposal to increase their …
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTERThe Pentester BluePrint: Your Guide to Being a Pentester offers readers …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug …
Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security …
Provides readers with a solid foundation in Arm assembly internals and reverse-engineering fundamentals as the basis for analyzing and securing …
Tiller, a security services expert, is a "white hacker" who gets paid to hack into computers to show companies how …
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. …
Do you often hear about "trading", "automatic investments", "make money online", "forex" and similar topics?Are you new to the game …
Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products …
Explore the latest ethical hacking tools and techniques to perform penetration testing from scratchKey FeaturesLearn to compromise enterprise networks with …
Social engineering is an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …
Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide …
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers …
VX Underground Black Mass Volume 1
""Immerse yourself in the world of distributed storage systems with "Mastering Ceph". Written by an expert in the field, this …
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to …
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command"Linux Essentials for Hackers & Pentesters" is …