Instant Kali Linux
Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...
Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Recipes designed to educate you extensively on the penetration testing principles and Kali...
A Wavelet Tour of Signal Processing, Third Edition: The Sparse Way
I cannot help but find striking resemblances between scientific communities and schools of fish. We interact in conferences and through articles, and we move together while a global trajectory emerges from individual contributions. Some of us like to be at the center of the school, others prefer to wander around, and a few swim in multiple...
Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
Write your own custom information security tools using Perl and object-oriented Perl modules
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
Agile UX Storytelling: Crafting Stories for Better Software Development
Learn how to use stories throughout the agile software development lifecycle. Through lessons and examples, Agile UX Storytelling demonstrates to product owners, customers, scrum masters, software developers, and designers how to craft stories to facilitate communication, identify problems and patterns, refine collaborative...
Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman...
|Result Page: 20 19 18 17 16 15 14 13 12 11 |