Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, …
Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a …
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering …
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side …
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals …
Over 70 recipes to help you master Kali Linux for effective penetration security testing Overview Recipes designed to educate you …
A quick guide to learn the most widely-used operating system by network security professionals Overview Learn something new in an …
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks …
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux …
A practical guide to testing your networks security with Kali Linux - the preferred choice of penetration testers and hackers …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large …
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a …
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration …
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers …
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the …
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug …
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug …
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting …
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and …
VX Underground Black Mass Volume 1
VX Underground Black Mass: Volume 2.
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides …
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, …
Delve into the world of offensive cybersecurity as you master Bash, a fundamental language for expert penetration testers. Unleash its …
Social engineering is an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a …
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's …
The Hash Crack: Password Cracking Manual v2.0 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking …
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …