Dzięki książkom tu zawartym poznasz od podstaw kolejne fazy przeprowadzania testów bezpieczeństwa, począwszy od zbierania podstawowych informacji o środowisku celu. Dowiesz się, jak przełamywać zabezpieczenia urządzeń sieciowych, systemów i aplikacji oraz szacować, jakich szkód mógłby narobić złośliwy napastnik, któremu udałoby się dostać do tego miejsca.
Testy penetracyjne - ebooki, książki online
To jest dział, w który najczęściej odwiedzają specjaliści w zakresie przeprowadzania testów penetracyjnych (pentester, etyczny haker czy jak tam jeszcze będziemy go chcieli nazwać). Dzięki odpowiedniemu połączeniu wiedzy o tym, jak poszczególne systemy są zaprojektowane, zbudowane i utrzymywane, z ogromnym doświadczeniem i kreatywnością pozwalającą na szybkie wyszukiwanie sposobów obejścia czy neutralizacji wdrożonych systemów zabezpieczeń dobry pentester jest niezastąpionym ogniwem, pozwalającym na rzetelne oszacowanie poziomu bezpieczeństwa środowiska informatycznego firmy.
Książki, ebooki, audiobooki, kursy video z kategorii: Testy penetracyjne dostępne w księgarni Ebookpoint
-
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
-
Kali Linux i testy penetracyjne. Biblia
-
Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
-
Metasploit. Przewodnik po testach penetracyjnych
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Skanowanie sieci z Kali Linux. Receptury
-
Black Hat Python. Język Python dla hakerów i pentesterów
-
Kali Linux. Testy penetracyjne
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
-
Testowanie w Angularze. Kurs video. Karma i Jasmine
-
Ethically hacking an industrial control system
-
Testowanie oprogramowania w praktyce
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Cloud Computing for Everyone
-
My Data My Privacy My Choice
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
-
Testy penetracyjne dla zaawansowanych. Hakowanie najlepiej zabezpieczonych sieci na świecie
-
Cracking the Cybersecurity Interview
-
Hands-on Penetration Testing for Web Applications
-
Metasploit. Receptury pentestera. Wydanie II
-
Microsoft Defender for Endpoint
-
CCISO Exam Guide and Security Leadership Essentials
-
Social Engineering Cookbook
-
Quantum Blockchain
-
Cloud Security for Beginners
-
Vulnerability Assessment and Penetration Testing (VAPT)
-
Advanced Malware Analysis and Intelligence
-
Mastering the Red Hat Certified Engineer (RHCE) Exam
-
Introduction to Confidential Computing
-
Mastering Honeypots
-
The Cybersecurity Mesh Architecture
-
AWS Certified Security - Specialty Certification Guide (SCS-C01)
-
Penetration Testing with Kali NetHunter
-
Mastering Network Forensics
-
ISC2 Certified Cloud Security Professional (CCSP) Exam Guide
-
Demystifying DevSecOps in AWS
-
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
Enhancing IoT Security
-
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
Python for Cybersecurity Cookbook
-
Multi-Cloud Administration Guide
-
Installation and Configuration of IBM FileNet Information Management Software
-
Modern Cybersecurity Strategies for Enterprises
-
Practical Cyber Threat Intelligence
-
Ethical Hacker?s Penetration Testing Guide
-
Penetration Testing for Jobseekers
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Digital transformation with dataverse
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Implementing DevSecOps with Docker and Kubernetes
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Microsoft Azure Security Technologies (AZ-500) - A Certification Guide
-
Cryptography and Network Security
-
Penetration Testing with Kali Linux
-
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Cybercrime and Preventive Measures
-
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
E Commerce for Entrepreneurs
-
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
DevOps and Containers Security
-
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests
-
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
-
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort