Security

Security ebooks videos
Penetration Testing

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Forensics

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Cyber Security

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

application security

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

cloud security

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

malware analysis

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

Bestselling eBooks

Machine Learning for Finance
Hands-On Qt for Python Developers

Hands-On Qt for Python Developers

Mastering Malware Analysis

Mastering Malware Analysis

Hands-On Domain-Driven Design with .NET Core

Hands-On Domain-Driven Design with .NET Core

Hands-On Machine Learning with Microsoft Excel 2019

Hands-On Machine Learning with Microsoft Excel 2019

Software Architect's Handbook

Software Architect's Handbook

New In

Machine Learning for Finance

Machine Learning for Finance

Hands-On Qt for Python Developers

Hands-On Qt for Python Developers

Mastering Malware Analysis

Mastering Malware Analysis

Hands-On Domain-Driven Design with .NET Core

Hands-On Domain-Driven Design with .NET Core

Hands-On Machine Learning with Microsoft Excel 2019

Hands-On Machine Learning with Microsoft Excel 2019

Software Architect's Handbook

Software Architect's Handbook

Items 1-15 of 225

Page
per page
Set Ascending Direction
  1. 404 pages
    Kali Linux Web Penetration Testing Cookbook - Second Edition
    August 2018
    $39.99
    Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security
  2. 482 pages
    Practical Linux Security Cookbook - Second Edition
    August 2018
    $35.99
    Enhance file system security and learn about network attack, security tools and different versions of Linux build.
  3. 316 pages
    Penetration Testing with Raspberry Pi - Second Edition
    November 2016
    $31.99
    Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2
  4. 510 pages
    Mastering Kali Linux for Advanced Penetration Testing - Second Edition
    June 2017
    $39.99
    A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.
  5. 318 pages
    Mastering Mobile Forensics
    May 2016
    $35.99
    Develop the capacity to dig deeper into mobile device data acquisition
  6. 384 pages
    Cybersecurity - Attack and Defense Strategies
    January 2018
    $31.99
    Enhance your organization's secure posture by improving your attack and defense strategies
  7. 210 pages
    Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition
    December 2017
    $27.99
    Kali Linux Wireless Penetration Testing Beginner's Guide (Third Edition) presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.
  8. 480 pages
    Hands-On Red Team Tactics
    September 2018
    $27.99
    Your one-stop guide to learning and implementing Red Team tactics effectively
  9. 492 pages
    Mastering Metasploit - Third Edition
    May 2018
    $35.99
    Discover the next level of network defense with the Metasploit framework
  10. 528 pages
    Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition
    October 2018
    $35.99
    Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition
  11. 252 pages
    Mastering AWS Security
    October 2017
    $31.99
    In depth informative guide to implement and use AWS security services effectively.
  12. 358 pages
    Burp Suite Cookbook
    September 2018
    $31.99
    Get hands-on experience in using Burp Suite to execute attacks and perform web assessments
  13. 404 pages
    Kali Linux 2018: Windows Penetration Testing - Second Edition
    October 2018
    $34.99
    Become the ethical hacker you need to be to protect your network
  14. 456 pages
    Industrial Cybersecurity
    October 2017
    $35.99
    Your one-step guide to understanding industrial cyber security, its control systems, and its operations.
  15. 392 pages
    Threat Hunting with Elastic Stack
    July 2021
    $34.99
    Get hands-on with advanced threat analysis techniques by implementing Elastic Stack security features with the help of practical examples

Items 1-15 of 225

Page
per page
Set Ascending Direction