 |
|
 Coding for Penetration Testers: Building Better Tools
My Dear Reader,
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting... |  |  Practical Lock Picking: A Physical Penetration Tester's Training Guide
I feel somewhat like an old man remarking in this fashion, but this book is a great example of the
wonderful time in which you currently find yourself. To be alive and learning right now—when there
are accessible resources such as this about lockpicking, with beautiful illustrations and lessons written
with passion visible on... |  |  How Google Tests Software
Software development is hard. Testing that software is hard, too. And when you talk about development and testing at the scale of the entire web, you are talking about Google. If you are interested in how one of the biggest names in the Internet handles such large-scale testing, then you have found the right ... |
|
|
 Robot Framework Test Automation
Create test suites and automated acceptance tests from scratch
Overview
-
Create a Robot Framework test file and a test suite
-
Identify and differentiate between different test case writing styles
-
Full of easy- to- follow steps, to get you started with Robot Framework
... |  |  Web Penetration Testing with Kali Linux
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Overview
-
Learn key reconnaissance concepts needed as a penetration tester
-
Attack and exploit key features, authentication, and sessions on web...
|  |  Learning Nessus for Penetration Testing
Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment
Overview
-
Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
... |
|
 The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect... |  |  Raspberry Pi Projects For Dummies
Join the Raspberry revolution with these fun and easy Piprojects
The Raspberry Pi has opened up a whole new world of innovationfor everyone from hardware hackers and programmers to students,hobbyists, engineers, and beyond. Featuring a variety of hands-onprojects, this easy-to-understand guide walks you through everystep of... |  |  Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.
... |
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |