Find and fix security vulnerabilities in your web applications with Burp SuiteKey FeaturesSet up and optimize Burp Suite to maximize …
This book covers the topic of ethically hacking 802.11 wireless networks (WLANs). It explores the process of performing penetration tests …
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This …
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. …
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high …
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding …
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category …
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years …
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, …
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce …
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to …
This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer …
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTERThe Pentester BluePrint: Your Guide to Being a Pentester offers readers …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless …
Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the …
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one …
Tiller, a security services expert, is a "white hacker" who gets paid to hack into computers to show companies how …
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on …
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, …
Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a …
Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide …
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering …
Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks …
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals …
Over 70 recipes to help you master Kali Linux for effective penetration security testing Overview Recipes designed to educate you …
A quick guide to learn the most widely-used operating system by network security professionals Overview Learn something new in an …
Master the art of penetration testing with Kali Linux Overview Learn penetration testing techniques with an in-depth coverage of Kali …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take …
Key FeaturesFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of …