Delve into the world of offensive cybersecurity as you master Bash, a fundamental language for expert penetration testers. Unleash its …
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category …
VMware ESXi is the easiest way to get started with virtualization -- and it's free. It allows administrators to consolidate …
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's …
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking …
""Unlock the Power of Ceph: A Comprehensive Guide for Administrators and Architects!\n\nGet ready to master Ceph, the leading open-source, distributed …
The primary goal of Black Hat Ruby book is to provide you with a vast angle of using Ruby as …
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command"Linux Essentials for Hackers & Pentesters" is …
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration …
Tiller, a security services expert, is a "white hacker" who gets paid to hack into computers to show companies how …
With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to …
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals …
Social engineering is an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a …
The International Foundation for Protection Officers (IFPO) has for many years provided materials to support its certification programs. The current …
Enhance your skill set to pentest against real-world Microsoft infrastructure with hands-on exercises and by following attack/detect guidelines with OpSec …
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing …
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of …
Over 70 recipes to help you master Kali Linux for effective penetration security testing Overview Recipes designed to educate you …
👉 Are you looking for a way to quickly get better at Excel? 👈🔥🔥🔥 This book includes FREE BONUSES. Discover …
Geared to intermediate- to advanced-level DBAs and IT professionals looking to enhance their MySQL skills, this guide provides a comprehensive …
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.This book …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking …
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles …
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting …
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and …
Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security …
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, …
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, …
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat …