Lee Allen, Shakeel Ali, Tedi Heriyanto - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Czytaj Promocja 2za1
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Czytaj Promocja 2za1
Testy penetracyjne dla zaawansowanych. Hakowanie najlepiej zabezpieczonych sieci na świecie
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
Czytaj Promocja 2za1
Metasploit. Receptury pentestera. Wydanie II
-
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals