Independently published, 2021. — 200 p. — ASIN : B0943CJR5Q. Do you want to become a professional hacker? If answer to that question is yes, then you need to learn Kali Linux. It is the most world famous and the best operating system for hacking and pentration testing! This book will not only be teaching you hacking with kali Linux, but will also teach you all the things you...
Packt Publishing, 2013. - 70 pages. На англ. языке.
Burp Suite — это набор относительно независимых кроссплатформенных приложений, написанных на Java, призванных решать повседневные задачи пентестера.
Web security is more important than ever for protecting the confidentiality, integrity, and availability of web applications. Although there is no silver bullet tool, using the...
O’Reilly Media, Inc., 2012. — 320 p. — ISBN: 978-1-449-30371-6. If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through...
Wiley, 2024. — 320 р. — (Tech Today). — ISBN-13: 978-1-394-19988-4. A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to...
Wiley Publishing, Inc., 2011. — 624 p. — ISBN: 978-0-7645-7481-8. Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into...
Packt Publishing, 2016. — 440 p. — ISBN13: 9781786463166. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by...
3rd Edition. — Packt Publishing, 2018. — 569 p. — ISBN: 978-1-78899-061-5. Discover the next level of network defense with the Metasploit framework We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out...
Packt Publishing, 2017. — 230 p. — ISBN: 978-1788297134. Key Features A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days Carry out penetration testing in complex and highly-secured environments. Learn techniques to Integrate Metasploit with industry's leading tools Book Description The book starts with a hands-on Day 1 chapter, covering...
Manning Publications Co., 2019. — 454 p. — ISBN: 978-1617294358. Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them. Foreword by Daniel...
Amazon Digital Services LLC, 2015. — 200 p. — ISBN: 1517110947. — ASIN: B014LM7TI8 The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way This book is intended to be an exceptionally delicate yet exhaustive manual for the secrets in the universe of hacking and infiltration testing. The book contains an in-depth analysis and...
4th ed. — Jones & Bartlett Learning, 2023. — 1040 p. — ISBN 9781284220735. Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security.
Wiley, 2020. — 272 p. — ISBN: 978-1119491804. A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities...
Packt Publishing, 2017. — 302 p. Discover the tools and techniques of mobile forensic investigations and make sure your mobile autopsy doesn’t miss a thing, all through powerful practical recipes Considering the emerging use of mobile phones, there is a growing need for mobile forensics. Mobile forensics focuses specifically on performing forensic examinations of mobile devices,...
Amazon Digital Services LLC, 2018. — 348 р. — ASIN B07M9CGZLQ. Ethical hackers are in high demand. As we become more and more reliant on computer technology, black-hat hackers are working to profit from exploiting those technologies to steal personal information, so this is a perfect ethical hacking books for beginners 2019 in this we will learn basic of hacking and how to...
2019. — 23 p. — ASIN B07XJ76YFG. Information systems are exposed to different types of security risks. Theconsequences of information systems security (ISS) breaches can vary from e.g. damaging the data base integrity to physical "destruction" of entire information system facilities, and can result with minor disruptions in less important segments of information systems, or...
BPB Publications, 2024. — 328 р. — ISBN: 978-93-89898-569. Learn how to work towards making the most out of a career in emerging tech Key Features Understand the core concepts related to careers in emerging tech. Learn innovative, exclusive, and exciting ways to design a successful career in ET. Reduce your learning curve by examining the career trajectories of eminent ET...
Packt Publishing, 2012. - 235 pages. На англ. языке. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after...
Amazon Digital Services, 2018. — 482 p. The book begins with a hands-on Day 1 section, protecting basic principles of the Metasploit structure and planning visitors for a self-completion exercise at the end of every section. The Day 2 section delves deep into the use of checking and fingerprinting solutions with Metasploit while helping visitors to alter current segments according...
No Starch Press, San Francisco, 2012. — 802 p. — ISBN 13: 978-1593272906. Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the...
Independently published, 2025. — 277 p. Взлом кода: обратная инженерия защиты программного обеспечения Ever wondered what makes software tick? Or better yet, how to make it stop ticking when it insists on a license key you definitely don’t have? Welcome to Cracking the Code: Reverse Engineering Software Protections, your ultimate guide to unraveling the defenses that developers...
No Starch Press, 2019. — 266 p. — ISBN10: 1593278616, 13 978-1593278618. Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications. Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks...
М.: ДМК Пресс, 2013. – 240с.: ил. — ISBN: 978-5-94074-374-3. Даже самые простые ошибки могут иметь драматические последствия, позволяя атакующему компрометировать системы, повышать локальные привилегии и наносить иной ущерб системе. Книга рассказывает, как обнаруживаются и используются ошибки, найденные им в некоторых наиболее популярных во всем мире программных продуктах,...
Комментарии