Michael Kofler, Tobias Scheible, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, Andre Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania...
This latest edition of Practical Hardware Pentesting features even more practical advice on how to pentest various devices, from IoT to simpler hardware. As you progress through the chapters, youll quickly learn the most common attack techniques, a...Lasīt vairāk
The Future of Hacking Looks Different Than You Think surveys hackers and ethical hacking and explores the experiences of the people working to defend us from cyber-attacks. It explores diverse topics on cybersecurity, Internet freedom, cyber awarene...Lasīt vairāk
A revised introduction to the Linux operating system for beginning hackers and penetration testers.If youre just getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an...Lasīt vairāk
Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Writ...Lasīt vairāk
(Izdošanas datums: 11-Feb-2025, Paperback / softback, Izdevniecība: John Wiley & Sons Inc, ISBN-13: 9781394295593)
A hands-on, beginner-friendly intro to web application pentesting In A Beginners Guide to Web Application Penetration Testing, seasoned cybersecurity veteran Ali Abdollahi delivers a startlingly insightful and up-to-date explorat...Lasīt vairāk
Level up your pentesting skills by learning how to perform advanced system reconnaissance, and streamline offensive operations with command-line scripting Key Features Learn how to apply key attributes of Bash to accomplish com...Lasīt vairāk
Sērija : River Publishers Series in Digital Security and Forensics
(Izdošanas datums: 27-Dec-2024, Hardback, Izdevniecība: River Publishers, ISBN-13: 9788770046978)
This is an essential resource for navigating the complex, high-stakes world of cybersecurity. It bridges the gap between foundational cybersecurity knowledge and its practical application in web application security. Designed for professionals who...Lasīt vairāk
Reinforcement learning (RL) is an area of machine learning concerned with how intelligent agents ought to take actions in an environment in order to maximize the notion of cumulative reward. Reinforcement learning is one of three basic machine learn...Lasīt vairāk
Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!Bash is one of the first building blocks that expert p...Lasīt vairāk
Learn the essential steps to successfully identify and leverage API endpoints with a sequenced and structured approach Key Features Gain detailed insights into vulnerabilities and attack vectors for RESTful and GraphQL APIs Fol...Lasīt vairāk
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting emerges as an essential guide to mastering the art and science of web application pentesting. T...Lasīt vairāk
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking Arsenal: A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art and science of web applicati...Lasīt vairāk
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for penetration testers and other professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, the Kali Linux can also be...Lasīt vairāk
The Hack is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks on computer systems and networks. This book will benefit the offensive minded hacker (red-teamers) as wel...Lasīt vairāk
Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives?...Lasīt vairāk
Embark on your bug bounty journey by gaining practical skills and contribute to a safer digital landscape Key Features Prepare to participate in a bug bounty program Discover your first bug and claim your reward upon successful...Lasīt vairāk
Investigate how password protection works and delve into popular cracking techniques for penetration testing and retrieving data Key Features Gain guidance for setting up a diverse password-cracking environment across multiple...Lasīt vairāk