Foreword by Daniel E. Geer Jr., Stuart McClure A ground shaking exposé on the failure of popular cyber risk management …
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, …
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all …
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years …
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to …
This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer …
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTERThe Pentester BluePrint: Your Guide to Being a Pentester offers readers …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the …
Tiller, a security services expert, is a "white hacker" who gets paid to hack into computers to show companies how …
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, …
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals …
Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux Overview Learn about various attacks …
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux …
Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a …
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration …
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers …
Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the …
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting …
VX Underground Black Mass Volume 1
Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, …
A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no …
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking …
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.This book …
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's …
A guide to using the Ghidra software reverse engineering tool suite. The result of more than a decade of research …
Cybersecurity for Beginners is an engaging introduction to the field of cybersecurity. You'll learn how attackers operate, as well as …
There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several …