Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide …
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering …
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …
Written in Packt's Beginner's Guide format, you can easily grasp the concepts and understand the techniques to perform wireless attacks …
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side …
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular …
Master the art of penetration testing with Kali Linux Overview Learn penetration testing techniques with an in-depth coverage of Kali …
A practical guide to testing your networks security with Kali Linux - the preferred choice of penetration testers and hackers …
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take …
Key FeaturesFamiliarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of …
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of …
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers …
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug …
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug …
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting …
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and …
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides …
Delve into the world of offensive cybersecurity as you master Bash, a fundamental language for expert penetration testers. Unleash its …
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking …
Social engineering is an attack technique that leverages psychology, deception, and publicly available information to breach the defenses of a …
Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot …
A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.This book …
Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level implementations, whether to discover …
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away …
The Hash Crack: Password Cracking Manual v2.0 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
The Hash Crack: Password Cracking Manual v3 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis …
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to …
A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, …
VMware ESXi is the easiest way to get started with virtualization -- and it's free. It allows administrators to consolidate …
Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products …
Configuring and Troubleshooting Windows XP Professional is a comprehensive guide for systems administrators and network responsible for deploying Windows XP …
Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. …
PHP is experiencing a renaissance, though it may be difficult to tell with all of the outdated PHP tutorials online. …