McGraw-Hill, 2021. — 400 p. — ISBN: 978-1-26-046392-7. 100% coverage of every objective for the EC-Council’s Certified Chief Information Security Officer exam Take the challenging CCISO exam with confidence using the comprehensive information contained in this effective study guide. CCISO Certified Chief Information Security Officer All-in-One Exam Guide provides 100% coverage...
Packt Publishing, 2016. — 534 p. — ISBN13: 9781785883491. Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it In this book you will be introduced to a proven professional security and penetration testing methodology that has trained thousands of professional testers. Your experience from reading...
Apress Media LLC., 2020. — 252 p. — ISBN13: 978-1-4842-6433-1. Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud...
No Starch Press, 2025. — 336 p. — ISBN-13 978-1-7185-0375-5. Креативные сценарии для хакеров и пентестеров Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more! In the hands of the penetration tester, bash scripting becomes a powerful offensive...
Cybellium Ltd., 2023-09-11. — 288 p. — ASIN: B0CHXP7Y8T. Unlocking the Secrets of Effective IT Auditing In a rapidly evolving technological landscape, the role of IT auditing has never been more crucial. As organizations increasingly rely on complex digital systems to drive their operations, the need for robust IT audit practices has become paramount. Welcome to the...
2nd Edition. — David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham. — No Starch Press, 2024 — 288 p. — ISBN-13: 978-1-7185-0299-4. The new and improved guide to penetration testing using the legendary Metasploit Framework. Metasploit: The Penetration Tester’s Guide has been the definitive security assessment resource for over a decade. The Metasploit...
The Pragmatic Programmers, LLC., 2016. — 219 p. — ISBN13: 978-1-68050-183-4. This book is for everyone who needs to test the web. As a tester, you’ll automate your tests. As a developer, you’ll build more robust solutions. And as a team, you’ll gain a vocabulary and a means to coordinate how to write and organize automated tests for the web. Follow the testing pyramid and level...
No Starch Press, 2014. — 192 p. — ISBN: 1593275900, 9781593275907
Python is the language of choice for hackers and security analysts for creating powerful and effective tools. Ever wonder how they do it?
A follow-up to the perennial best-seller Gray Hat Python, Justin Seitz's Black Hat Python explores the darker side of Python's capabilities—writing network sniffers,...
2nd Edition, Early Access edition, 12/3/20. — Independently published, 2021. — 200 p.— ISBN 978-1-7185-0112-6, 978-1-7185-0113-3. Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, you’ll explore...
2nd Edition. — No Starch Press, April 13, 2021. — 216 p.— ISBN 978-1-7185-0112-6. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, 2nd Edition, you’ll explore the darker side of Python’s capabilities—writing network sniffers, stealing email credentials, brute forcing directories,...
4th Edition. — Jones & Bartlett Learning, 2022-12-07. — 400 р. — ISBN 978-1284248999. Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with...
Packt Publishing, 2015. — 132 p. — ISBN: 9781784395049. A penetration test is one of the most important methods to secure a network or any individual machine. Having knowledge of these methods can enable a user to protect himself/herself from any kinds of attacks. Penetration tests can also be used to discover flaws or loop holes in one's security system, which if not fixed,...
Комментарии