Security


Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
- Kali Linux Web Penetration Testing Cookbook - Second EditionAugust 2018$39.99Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security
- Practical Linux Security Cookbook - Second EditionAugust 2018$35.99Enhance file system security and learn about network attack, security tools and different versions of Linux build.
- Penetration Testing with Raspberry Pi - Second EditionNovember 2016$31.99Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2
- Mastering Kali Linux for Advanced Penetration Testing - Second EditionJune 2017$39.99A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.
- Mastering Mobile ForensicsMay 2016$35.99Develop the capacity to dig deeper into mobile device data acquisition
- Cybersecurity - Attack and Defense StrategiesJanuary 2018$31.99Enhance your organization's secure posture by improving your attack and defense strategies
- Kali Linux Wireless Penetration Testing Beginner's Guide - Third EditionDecember 2017$27.99Kali Linux Wireless Penetration Testing Beginner's Guide (Third Edition) presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.
- Hands-On Red Team TacticsSeptember 2018$27.99Your one-stop guide to learning and implementing Red Team tactics effectively
- Mastering Metasploit - Third EditionMay 2018$35.99Discover the next level of network defense with the Metasploit framework
- Kali Linux 2018: Assuring Security by Penetration Testing - Fourth EditionOctober 2018$35.99Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition
- Mastering AWS SecurityOctober 2017$31.99In depth informative guide to implement and use AWS security services effectively.
- Burp Suite CookbookSeptember 2018$31.99Get hands-on experience in using Burp Suite to execute attacks and perform web assessments
- Kali Linux 2018: Windows Penetration Testing - Second EditionOctober 2018$34.99Become the ethical hacker you need to be to protect your network
- Industrial CybersecurityOctober 2017$35.99Your one-step guide to understanding industrial cyber security, its control systems, and its operations.
- Threat Hunting with Elastic StackJuly 2021$34.99Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security features with the help of practical examples