This book covers the topic of ethically hacking 802.11 wireless networks (WLANs). It explores the process of performing penetration tests …
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This …
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. …
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high …
Dive into security testing and web app scanning with ZAP, a powerful OWASP security toolPurchase of the print or Kindle …
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, …
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding …
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would …
Kali Linux Basics for Wireless Hacking, Penetration Testing, VPNs, Proxy Servers and Networking Command"Linux Essentials for Hackers & Pentesters" is …
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category …
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most …
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all …
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years …
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, …
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and …
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce …
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to …
This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer …
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or …
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTERThe Pentester BluePrint: Your Guide to Being a Pentester offers readers …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the …
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one …
Tiller, a security services expert, is a "white hacker" who gets paid to hack into computers to show companies how …
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on …