Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Beginning LoRa Radio Networks with Arduino: Build Long Range, Low Power Wireless IoT Networks
Beginning LoRa Radio Networks with Arduino: Build Long Range, Low Power Wireless IoT Networks
Create your own LoRa wireless projects for non-industrial use and gain a strong basic understanding of the LoRa technology, LoRa WAN, and LPWAN. 

You'll start by building your first LoRa wireless channel and then move on to various interesting projects such as setting up networks with a LoRa gateway,
...
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Are you interested in learning about how to hack systems?

Do you want to learn how to protect yourself from being hacked?

Do you wish to learn the art of ethical hacking?

Do you want to know the secrets techniques that genius hackers use?

Do you want to learn how to protect yourself...

Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things

With this book, you will learn how to build apps and hardware for the Internet of Things, using Apple's native APIs and industry standard protocols like Bluetooth and HTTPS. You'll start out learning how to access the sensors on the iPhone, move on to building your own accessories using the Arduino and Raspberry
...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Result Page: 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy