Безпека систем

Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure

Sagar Rahalkar

NHibernate 4.x Cookbook. Click here to enter text. - Second Edition

Gunnar Liljas, Alexander Zaytsev, Jason Dentler

Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition

Paulino Calderon

OAuth 2.0 Cookbook. Protect your web applications using Spring Security

Adolfo Eloy Nascimento

Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it

Mantavya Gajjar

Offensive Security Using Python. A hands-on guide to offensive tactics and threat mitigation using practical strategies

Rejah Rehim, Manindar Mohan, Grant Ongers

Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them

Rishalin Pillay

OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition

Jan Just Keijser

Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit, Joseph Opacki

OSINT w praktyce. Jak gromadzić i analizować dane dostępne w sieci

Dale Meredith

Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise

Daniel W. Dieterle

Penetration Testing: A Survival Guide. A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, ...

Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques

Jason Beltrame

Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs

Maurício Harley

Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes

Paul Smith

Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition

Bayo Erinle