Michael Kofler, Tobias Scheible, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, Andre Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania...
This latest edition of Practical Hardware Pentesting features even more practical advice on how to pentest various devices, from IoT to simpler hardware. As you progress through the chapters, youll quickly learn the most common attack techniques, a...Loe edasi...
The Future of Hacking Looks Different Than You Think surveys hackers and ethical hacking and explores the experiences of the people working to defend us from cyber-attacks. It explores diverse topics on cybersecurity, Internet freedom, cyber awarene...Loe edasi...
A revised introduction to the Linux operating system for beginning hackers and penetration testers.If you’re just getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an...Loe edasi...
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Writ...Loe edasi...
(Ilmumisaeg: 11-Feb-2025, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781394295593)
A hands-on, beginner-friendly intro to web application pentesting In A Beginners Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date explorat...Loe edasi...
Level up your pentesting skills by learning how to perform advanced system reconnaissance, and streamline offensive operations with command-line scripting Key Features Learn how to apply key attributes of Bash to accomplish com...Loe edasi...
Sari: River Publishers Series in Digital Security and Forensics
(Ilmumisaeg: 27-Dec-2024, Hardback, Kirjastus: River Publishers, ISBN-13: 9788770046978)
This is an essential resource for navigating the complex, high-stakes world of cybersecurity. It bridges the gap between foundational cybersecurity knowledge and its practical application in web application security. Designed for professionals who...Loe edasi...
Reinforcement learning (RL) is an area of machine learning concerned with how intelligent agents ought to take actions in an environment in order to maximize the notion of cumulative reward. Reinforcement learning is one of three basic machine learn...Loe edasi...
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!Bash is one of the first building blocks that expert p...Loe edasi...
Learn the essential steps to successfully identify and leverage API endpoints with a sequenced and structured approach Key Features Gain detailed insights into vulnerabilities and attack vectors for RESTful and GraphQL APIs Fol...Loe edasi...
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. T...Loe edasi...
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web applicati...Loe edasi...
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for penetration testers and other professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, the Kali Linux can also be...Loe edasi...
The Hack is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks on computer systems and networks. This book will benefit the offensive minded hacker (red-teamers) as wel...Loe edasi...
Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives?...Loe edasi...
Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key Features Prepare to participate in a bug bounty program Discover your first bug and claim your reward upon successful...Loe edasi...
Investigate how password protection works and delve into popular cracking techniques for penetration testing and retrieving data Key Features Gain guidance for setting up a diverse password-cracking environment across multiple...Loe edasi...