The Hacker Playbook 2

Peter Kim CreateSpace

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides the

ISBN10 : 9781512214567 , ISBN13 : 1512214566

Page Number : 358

Penetration Testing

Georgia Weidman No Starch Press

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate e

ISBN10 : 1593275641 , ISBN13 : 9781593275648

Page Number : 528

Metasploit

Jim O'Gorman No Starch Press

"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is

ISBN10 : 159327288X , ISBN13 : 9781593272883

Page Number : 328

Violent Python

TJ O'Connor Newnes

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will te

ISBN10 : 1597499641 , ISBN13 : 9781597499644

Page Number : 288

Black Hat Python

Justin Seitz No Starch Press

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating pac

ISBN10 : 1593275900 , ISBN13 : 9781593275907

Page Number : 192

Hacking With Kali

James Broad Newnes

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard d

ISBN10 : 0124078834 , ISBN13 : 9780124078833

Page Number : 238