#1 internationally bestselling author Thomas Erikson shows readers how to identify and avoid the psychopaths around them. Charming, charismatic, and …
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most …
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to …
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or …
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary …
This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one …
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in …
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug …
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug …
Written by all-star security experts, Practical IoT Hacking is a quick-start conceptual guide to testing and exploiting IoT systems and …
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking …
One of the greatest political novels in any language, Nostromo reenacts the establishment of modern capitalism in a remote South …
The best guide to the Metasploit Framework. —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and …
The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase …