The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesnt show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides...
View ArticleThe Hacker Playbook 2: Practical Guide To Penetration Testing
Just as a professional athlete doesnt show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides...
View ArticleLearning Linux Binary Analysis
Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis,...
View ArticleEthical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and...
View ArticleAdvanced Persistent Threat Hacking: The Art and Science of Hacking Any...
In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the...
View ArticleHacking the Human
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on...
View ArticlePenetration Testing: Procedures & Methodologies
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this...
View ArticleGit Recipes
Whether you’re relatively new to git or you need a refresher, or if you just need a quick, handy reference for common tasks in git, Git Recipes is just the reference book you need. With recipes to...
View ArticleGit for Teams: A User-Centered Approach to Creating Efficient Workflows in Git
Yes, this is a book about the popular version control system, Git. But unlike just about every other book written about Git, it doesnt start with how to install the software and create your first...
View ArticleHacker Disassembling Uncovered: Powerful Techniques To Safeguard Your...
Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a...
View Article