Testy penetracyjne

Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition

Nikhil Pathania

Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests

Christopher Duffy

Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps

Aditya Gupta

Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2

Miroslav Vitula

Mastering Distributed Tracing. Analyzing performance in microservices and complex systems

Yuri Shkuro

Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition

Vijay Kumar Velu

Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition

Vijay Kumar Velu, Robert Beggs

Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition

Nipun Jaswal

Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition

Nipun Jaswal

Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert

Nipun Jaswal

Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition

Sagar Rahalkar

Metasploit. Receptury pentestera. Wydanie II

Abhinav Singh, Monika Agarwal

Mroczne odmęty phishingu. Nie daj się złowić!

Christopher Hadnagy

Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them

Rishalin Pillay

Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

David Okeyode, Karl Fosaaen, Charles Horton

Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox

Stefan Umit Uygur

Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

Joseph Muniz, Joseph Muniz, Aamir Lakhani

Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools

Keith Harald Esrick Makan

Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes

Paul Smith

Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition

Bayo Erinle

Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide

Phara McLachlan

PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms

Dr. Andrew Blyth, Campbell Murray

Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks

Jean-Georges Valle