Penetration tests

BackTrack 5. Testy penetracyjne sieci WiFi

Vivek Ramachandran

Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki

Lee Brotherston, Amanda Berlin

Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP

Joshua Arvin Lat

Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually

Kevin Cardwell

Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition

Dr. Sunny Wear

C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications

Ayobami Adewole

Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java

Rahul Shetty

Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems

Furqan Khan

Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony

Jean-Georges Valle

Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit

Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh

Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition

Mitesh Soni, Alan Mark Berg

Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition

Patrick Li

Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition

Wolf Halton, Bo Weaver

Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II

Vivek Ramachandran, Cameron Buchanan

Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

Cameron Buchanan