This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer …
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering …
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding …
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, …
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would …
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or …
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations …
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all …
Why do nations break into one anothers most important computer networks? There is an obvious answer: to steal valuable information …
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level implementations, whether to discover …
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot …
A guide to using the Ghidra software reverse engineering tool suite. The result of more than a decade of research …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the …
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, …
Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers …
A quick guide to learn the most widely-used operating system by network security professionals Overview Learn something new in an …
The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
VX Underground Black Mass: Volume 2.
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks …
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce …
Best-selling guide to the inner workings of the Linux operating system with over 50,000 copies sold since its original release …
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides …
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a …
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network …
The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the …
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and …
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most …
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid …
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on …
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away …