Syngress, 2016. — 336 p. — ISBN13: 978-0128054727. Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used....
McGraw-Hill, 2021. — 400 p. — ISBN: 978-1-26-046392-7. 100% coverage of every objective for the EC-Council’s Certified Chief Information Security Officer exam Take the challenging CCISO exam with confidence using the comprehensive information contained in this effective study guide. CCISO Certified Chief Information Security Officer All-in-One Exam Guide provides 100% coverage...
Packt Publishing, 2018. — 584 p. — ISBN10: 1788295668, 13 978-1788295666. Windows has always been the go-to platform for users around the globe to perform administration and ad hoc tasks, in settings that range from small offices to global enterprises, and this massive footprint makes securing Windows a unique challenge. This book will enable you to distinguish yourself to your...
Packt Publishing, 2016. — 534 p. — ISBN13: 9781785883491. Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it In this book you will be introduced to a proven professional security and penetration testing methodology that has trained thousands of professional testers. Your experience from reading...
Apress Media LLC., 2020. — 252 p. — ISBN13: 978-1-4842-6433-1. Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud...
No Starch Press, 2025. — 336 p. — ISBN-13 978-1-7185-0375-5. Креативные сценарии для хакеров и пентестеров Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more! In the hands of the penetration tester, bash scripting becomes a powerful offensive...
Apress, 2018. - 371p. - ISBN: 1484232127 Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring...
Cybellium Ltd., 2023-09-11. — 288 p. — ASIN: B0CHXP7Y8T. Unlocking the Secrets of Effective IT Auditing In a rapidly evolving technological landscape, the role of IT auditing has never been more crucial. As organizations increasingly rely on complex digital systems to drive their operations, the need for robust IT audit practices has become paramount. Welcome to the...
Packt Publishing, 2015. — 220 p. Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By performing a penetration test, you can proactively identify which vulnerabilities are most critical. This allows your organization to more intelligently prioritize remediation and apply necessary...
3rd edition. — Jones & Bartlett Learning, 2024. — 1103 p. — ISBN 9781284248807. The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how...
3rd Edition. — McGraw-Hill Education, 2019. — 576 p. — ISBN: 978-1-26-045323-2. Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on...
2nd Edition. — David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, Daniel G. Graham. — No Starch Press, 2024 — 288 p. — ISBN-13: 978-1-7185-0299-4. The new and improved guide to penetration testing using the legendary Metasploit Framework. Metasploit: The Penetration Tester’s Guide has been the definitive security assessment resource for over a decade. The Metasploit...
Packt, 2019. — 366 p. — ISBN: 9781788994064. Test, fuzz, and break web applications and services using Burp Suite's powerful capabilities Key Features Master the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intruder and much more Discover the best-way to penetrate and test web...
Packt Publishing, 2014 - 150; ISBN13: 978-1-84969-510-7; на англ. языке. Book Description This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux. The book begins by introducing some of the fundamental bash...
EPUB. +Файлы примеров. Язык англ.
Packt Publishing, 2015. - 178p.
Employ the power of Python to get the best out of pentesting.
This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.
We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve...
McGraw-Hill, 2021. - 480p. - ISBN: 9781260456745 Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam This effective self-study guide...
The Pragmatic Programmers, LLC., 2016. — 219 p. — ISBN13: 978-1-68050-183-4. This book is for everyone who needs to test the web. As a tester, you’ll automate your tests. As a developer, you’ll build more robust solutions. And as a team, you’ll gain a vocabulary and a means to coordinate how to write and organize automated tests for the web. Follow the testing pyramid and level...
IGI Global, 2021. — 275 p. – (Advances in Digital Crime, Forensics, and Cyber Terrorism (ADCFCT) Book Series). — ISBN 9781799841623. With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more...
No Starch Press, 2014. — 192 p. — ISBN: 1593275900, 9781593275907
Python is the language of choice for hackers and security analysts for creating powerful and effective tools. Ever wonder how they do it?
A follow-up to the perennial best-seller Gray Hat Python, Justin Seitz's Black Hat Python explores the darker side of Python's capabilities—writing network sniffers,...
2nd Edition. — No Starch Press, 2021. — 216 p.— ISBN 978-1-7185-0112-6, 978-1-7185-0113-3. Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold. When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python, you’ll explore the darker side of Python’s...
4th Edition. — Jones & Bartlett Learning, 2022-12-07. — 400 р. — ISBN 978-1284248999. Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with...
Packt Publishing, 2021. — 382 p. — ISBN 978-1-78961-913-3. Explore embedded systems pentesting by applying the most common attack techniques and patterns Key Features Learn various pentesting tools and techniques to attack and secure your hardware infrastructure Find the glitches in your hardware that can be a possible entry point for attacks Discover best practices for...
СПб.: Питер, 2018. — 272 с. — (Библиотека программиста). — ISBN: 978-5-4461-0662-2. В этой книге рассматриваются методы обхода систем безопасности сетевых сервисов и проникновения в открытые информационные системы. Информационная безопасность, как и многое в нашем мире, представляет собой медаль с двумя сторонами. С одной стороны, мы проводим аудит, ищем способы проникновения и...
Комментарии