Penetration testing (Computer security)
Label
Penetration testing (Computer security)
Name
Penetration testing (Computer security)
Actions
Incoming Resources
- Subject of19
- Kali LInux CTF blueprints, build, test, and customize your own Capture the Flag challenges across mulitiple platforms designed to be attacked with Kali Linux, Cameron Buchanan
- The basics of hacking and penetration testing, ethical hacking and penetration testing made easy, Patrick Engebretson ; technical editor, James Broad
- BackTrack 4, assuring security by penetration testing, Shakeel Ali, Tedi Heriyanto
- Kali Linux tutorial for beginners, Tarek Naja
- Penetration testing services procurement guide, Version 1
- Learning Kali Linux, security testing, penetration testing, and ethical hacking, Ric Messier
- Penetration testing with the Metasploit Framework, a quickstart guide to White Hat security discovery and exploitation, with Ric Messier
- Computer and information security handbook, edited by John R. Vacca
- Linux basics for hackers, getting started with networking, scripting, and security in Kali, by OccupyTheWeb
- Hacking with Kali, practical penetration testing techniques, James Broad, Andrew Bindner
- Mastering Metasploit, write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach, Nipun Jaswal
- The art of hacking (video collection), Omar Santos, Ron Taylor, Jon Sternstein, Chris McCoy
- Hacking mit Metasploit, Das umfassende Handbuch zu Penetration Testing und Metasploit, Michael Messner
- Learning network penetration testing with Kali Linux, Cristian Gradisteanu
- Hacking und Bug Hunting, Peter Yaworski
- Hands-on bug hunting for penetration testers, a practical guide to help ethical hackers discover web application security flaws, Joseph Marshall
- Practical social engineering, a primer for the ethical hacker, by Joe Gray
- Ethical hacking workshop, explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity, Rishalin Pillay, Mohammed Abutheraa
- Penetration testing with the Bash shell, make the most of the Bash shell and Kali Linux's command-line-based security assessment tools, Keith Makan
- Web hacking expert, full-stack exploitation mastery
- Mastering machine learning for penetration testing, develop an extensive skill set to break self-learning systems using Python, Chiheb Chebbi
- Web hacking, become a professional web pentester, Geri Revay
- Mastering modern web penetration testing, master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!, Prakhar Prasad
- Practical network scanning, capture network vulnerabilities using standard tools such as Nmap and Nessus, Ajay Singh Chauhan
- Python for offensive PenTest, a practical guide to ethical hacking and penetration testing using Python, Hussam Khrais
- Metasploit revealed, secrets of the expert pentester : build your defense against complex attacks : a course in three modules
- Technische IT-Security für IT Security Manager, Von Cloud Computing über WLAN bis zu Penetrationstests, Thomas W. Harich
- Kali Linux, an ethical hacker's cookbook, practical recipes that combine strategies, attacks, and tools for advanced penetration testing, Himanshu Sharma
- Effective Python penetration testing, pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools, Rejah Rehim
- Python, penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules, Christopher Duffy
- Professional guide to wireless network hacking and penetration testing, Ric Messier
- Introduction to penetration testing, finding and analyzing vulnerabilities in systems and networks with Kali Linux, with Ric Messier
- Learn ethical hacking from scratch, Zaid Sabih
- Ethical hacking masterclass, Sunil Gupta
- Privilege Escalation Techniques, Ahmed, Alexis
- Penetration testing, a guide for business and it managers
- Penetration testing with Raspberry Pi, construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi, Joseph Muniz, Aamir Lakhani
- Mastering Metasploit - Fourth Edition, Nipun Jaswal
- The complete guide to bug bounty hunting
- Tribe of hackers security leaders, tribal knowledge from the best in cybersecurity leadership, Marcus J. Carey & Jennifer Jin
- Mastering Kali Linux for advanced penetration testing, apply a proactive approach to secure your cyber infrastructure and enchance your pentesting skills, Vijay Kumar Velu
- Red Team and Bug Bounty Conference
- Hacking mit Metasploit, Das umfassende handbuch zu penetration testing und metasploit, Michael Messner
- The complete Metasploit guide, explore effective penetration testing techniques with Metasploit, Sagar Rahalkar, Nipun Jaswal
- Hei ke wang luo ying yong, wang luo qin ru ying yong
- Learn website hacking, penetration testing from scratch, Zaid Sabih
- Learn man in the middle attacks from scratch
- Conducting network penetration and espionage in a global environment, Bruce Middleton
- Network scanning cookbook, practical network security using Nmap and Nessus 7, Sairam Jetty
- Kali Linux xue xi shou ce, Learning Kali Linux /, Ric Messier zhu ; Deng Shichao yi