The best guide to the Metasploit Framework. —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless...
A fast, hands-on introduction to offensive hacking techniques. Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks t...
How to Hack Like a Ghost takes readers deep inside the mind of a hacker as they carry out a fictionalised attack against a tech company, teaching cutting-edge hacking techniques along the way. Readers shadow...
Penetration testing enables you to evaluate the security or strength of a computer system, network, or web application that an attacker can exploit. With this book, you'll understand why Python is one of...
Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug hunters. This comprehensive guide looks at networking from an atta...
Fully-updated for Python 3, the second edition of this worldwide bestseller (over 100,000 copies sold) explores the stealthier side of programming and brings you all new strategies for your hacking projects....
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You’ll also learn...
Rigorous in its definitions yet easy to read, Crypto Dictionary covers the field of cryptography in an approachable, and sometimes humorous way.
Expand your mind and your crypto knowledge with...
Enter your address and we will specify the offer for your area.