Testy penetracyjne
Dzięki książkom tu zawartym poznasz od podstaw kolejne fazy przeprowadzania testów bezpieczeństwa, począwszy od zbierania podstawowych informacji o środowisku celu. Dowiesz się, jak przełamywać zabezpieczenia urządzeń sieciowych, systemów i aplikacji oraz szacować, jakich szkód mógłby narobić złośliwy napastnik, któremu udałoby się dostać do tego miejsca.
Książki, ebooki, audiobooki, kursy video z kategorii: Testy penetracyjne dostępne w księgarni Ebookpoint
-
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
-
Kali Linux i testy penetracyjne. Biblia
-
Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
Metasploit. Receptury pentestera. Wydanie II
-
Metasploit. Przewodnik po testach penetracyjnych
-
Testy penetracyjne dla zaawansowanych. Hakowanie najlepiej zabezpieczonych sieci na świecie
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Skanowanie sieci z Kali Linux. Receptury
-
Testowanie w Angularze. Kurs video. Karma i Jasmine
-
Black Hat Python. Język Python dla hakerów i pentesterów
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Penetration Testing with Kali NetHunter
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Kali Linux. Testy penetracyjne
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
-
ISC2 Certified Cloud Security Professional (CCSP) Exam Guide
-
Mastering Network Forensics
-
Cracking the Cybersecurity Interview
-
AWS Certified Security - Specialty Certification Guide (SCS-C01)
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests
-
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
-
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort