Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers …
A quick guide to learn the most widely-used operating system by network security professionals Overview Learn something new in an …
The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
VX Underground Black Mass: Volume 2.
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks …
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce …
Best-selling guide to the inner workings of the Linux operating system with over 50,000 copies sold since its original release …
Over 130 advanced recipes to search, analyze, deploy, manage, and monitor data effectively with ElasticSearch About This BookDeploy and manage …
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides …
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a …
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network …
The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the …
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and …
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most …
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid …
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory …
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on …
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away …
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and …
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of …
The Hash Crack: Password Cracking Manual v2.0 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. …
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, …
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. …
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to …
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, …
WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless …
Foreword by Daniel E. Geer Jr., Stuart McClure A ground shaking exposé on the failure of popular cyber risk management …
Dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guideAbout This Book Clear and …
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
Unleash the power of CompTIA's newest certification! Linux+ is the next hot certification to come from CompTIA, the company behind …
Key FeaturesFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of …