Is war ever a just way to resolve conflict? Diana Francis argues that it is not. With passion and eloquence, …
Find and fix security vulnerabilities in your web applications with Burp SuiteKey FeaturesSet up and optimize Burp Suite to maximize …
With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to …
Microservices Security in Action teaches readers how to secure their microservices applications code and infrastructure. After a straightforward introduction to …
This book covers the topic of ethically hacking 802.11 wireless networks (WLANs). It explores the process of performing penetration tests …
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This …
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. …
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high …
Dive into security testing and web app scanning with ZAP, a powerful OWASP security toolPurchase of the print or Kindle …
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field guide to finding …
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would …
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category …
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most …
Following the success of Linux Basics for Hackers, OccupytheWeb does what he did for Linux to Networks. Networks of all …
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years …
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, …
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and …
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test …
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics …
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce …
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to …
This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer …
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or …
WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless …
Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the …
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one …
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on …
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, …
Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a …