#1 internationally bestselling author Thomas Erikson shows readers how to identify and avoid the psychopaths around them. Charming, charismatic, and …
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most …
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to …
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one …
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug …
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug …
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and …
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking …
One of the greatest political novels in any language, Nostromo reenacts the establishment of modern capitalism in a remote South …
The best guide to the Metasploit Framework. —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and …
The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase …
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides …
Test, fuzz, and break web applications and services using Burp Suite’s powerful capabilitiesKey Features Master the skills to perform various …
This book captures the human face of the frontlines, revealing both the visible and the hidden realities of contemporary war, …
The Metasploit framework has been around for a number of years and is one of the most widely used tools …
With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. …
Discover the next level of network defense and penetration testing with the Metasploit 5.0 frameworkKey FeaturesMake your network robust and …
Costume, Clothes & Fashion.;Combining industry insider interviews with a fascinating historical narrative, Stitched Up delves into the alluring world of …
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content …