Quantcast
Channel: CloudLearnr
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

The Hacker Playbook: Practical Guide To Penetration Testing

    Just as a professional athlete doesnt show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides...

View Article



Image may be NSFW.
Clik here to view.

The Hacker Playbook 2: Practical Guide To Penetration Testing

    Just as a professional athlete doesnt show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides...

View Article

Image may be NSFW.
Clik here to view.

Learning Linux Binary Analysis

  Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis,...

View Article

Image may be NSFW.
Clik here to view.

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems

  The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and...

View Article

Image may be NSFW.
Clik here to view.

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any...

  In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the...

View Article


Image may be NSFW.
Clik here to view.

Hacking the Human

    Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on...

View Article

Image may be NSFW.
Clik here to view.

Penetration Testing: Procedures & Methodologies

  The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this...

View Article

Image may be NSFW.
Clik here to view.

Git Recipes

  Whether you’re relatively new to git or you need a refresher, or if you just need a quick, handy reference for common tasks in git, Git Recipes is just the reference book you need. With recipes to...

View Article


Image may be NSFW.
Clik here to view.

Git for Teams: A User-Centered Approach to Creating Efficient Workflows in Git

  Yes, this is a book about the popular version control system, Git. But unlike just about every other book written about Git, it doesnt start with how to install the software and create your first...

View Article


Image may be NSFW.
Clik here to view.

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your...

  Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a...

View Article
Browsing latest articles
Browse All 10 View Live


Latest Images