SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how... | | Learning Nessus for Penetration Testing
Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment
Overview
-
Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
... | | Web Penetration Testing with Kali Linux
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Overview
-
Learn key reconnaissance concepts needed as a penetration tester
-
Attack and exploit key features, authentication, and sessions on web...
|