The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...
Mastering Kali Linux for Advanced Penetration Testing
A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers
About This Book
Conduct realistic and effective security tests on your network
Demonstrate how key data systems are stealthily exploited, and learn how to...
Modular Java: Creating Flexible Applications with OSGi and Spring The secret weapon for attacking complexity in any project is to break it down into smaller, cohesive, and more easily digestible pieces. With Modular Java, you can easily develop applications that are more flexible, testable, maintainable, and comprehensible.
Modular Java is a pragmatic guide to developing modular...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were
involved in some of the fi rst penetration tests performed in the UK, where large organizations and
government departments allowed ethical hackers into their networks to determine the risk they
faced from what are now known as cyber attacks....
|Result Page: 5 4 3 2 1 |