Six appendixes taken from the author's website
The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to …
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide …
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC ServicesThis completely new, vendor-neutral guide brings together all the …
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security …
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with …
Beginning
Do you wish to protect your company or your family from cybersecurity threats?Have you been seeking for a book that …
Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have …
The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets …
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security …
Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, …
This book is the culmination of years of experience in the information technology and cybersecurity field. Components of this book …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to …
Congratulations! By purchasing this eBook, you have taken your first step in the exciting process of becoming a Master Hacker. …
A revolutionary approach to digital security as a tool for protecting information assets and building customer loyalty, operational efficiency, and …
The conversion to the Kindle addition was done poorly. Some words are concatenated together and others are split mid-word. I …
This book is a compilation of selected papers from the 3rd International Symposium on Software Reliability, Industrial Safety, Cyber Security …
This book is divided into three sections: Core Security Concepts, which covers security basics and sets the stage for the …
EDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft …
The only Official CISSP Study Guide - fully updated for the 2021 CISSP Body of Knowledge(ISC)2 Certified Information Systems Security …
From the back cover When it comes to creating powerful and effective hacking tools, Python is the language of choice …
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. …
Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of …
Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold. When it comes to creating powerful and effective …
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and …
The Metasploit framework has been around for a number of years and is one of the most widely used tools …
Key Features• A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days• Carry out penetration …
Master the Metasploit Framework and become an expert in penetration testing. Key Features • Gain a thorough understanding of the …
Issues (Editions)YearIssue2025Volume: 150???2024Volume: 146???Volume: 144???Volume: 139???Volume: 137???2023Volume: 132???103352Volume: 130???2022Volume: 113???2021Volume: 110???Volume: 105???Volume: 102???Volume: 101???Volume: 100???Volume: ??????2020Volume: 99???Volume: 98???Volume: 97???Volume: 96???Volume: …
With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. …
Key Features• Carry out penetration testing in highly-secured environments with Metasploit• Learn to bypass different defenses to gain access into …