Hacking Exposed Web Applications: Web Security Secrets & Solutions

3.75/5 · 100+ ratings

Hacking Exposed Web Applications provides a technical deep dive into the mind of a digital intruder to help you protect online assets. This manual breaks down the methodology used by hackers to exploit vulnerabilities in modern web architecture. By adopting an offensive mindset, readers learn to identify weaknesses before they are leveraged for data theft or service disruption. The authors draw o…

Shelves
Joel Scambray Caleb Sima Computers Hackers Mike Shema book Computer Science Technology Technical

More like this


Red Team Field Manual

Author: Ben Clark

The Red Team Field Manual serves as a practical, condensed reference for cybersecurity professionals who need immediate access to command syntax d…

3.75/5 · 100+ ratings

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network. The word spread through the hacking undergrou…

3.75/5 · 100+ ratings

The Hacker Playbook: Practical Guide to Penetration Testing

Author: Peter Kim

The Hacker Playbook transforms complex penetration testing into a structured athletic game plan. Peter Kim uses his extensive background as a secu…

3.75/5 · 100+ ratings

Hacking: The Art of Exploitation w/CD

A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows ho…

3.75/5 · 100+ ratings

The Tangled Web: A Guide to Securing Modern Web Applications

"Thorough and comprehensive coverage from one of the foremost experts in browser security." —Tavis Ormandy, Google Inc. Modern web a…

3.75/5 · 100+ ratings

Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the…

3.75/5 · 100+ ratings

This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information

The barbarians aren't at the gates. They're inside. This is the first full account of the cypherpunks who aim to free the world's information, fro…

3.75/5 · 100+ ratings

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World

From driverless cars to smart thermostats, the Internet now has direct effects on the physical world. Although this computerized future, often cal…

3.75/5 · 100+ ratings

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali

Linux Basics for Hackers serves as a practical entry point for aspiring security professionals who want to master the command line through the len…

3.75/5 · 100+ ratings

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

A chilling, globe-spanning detective story, tracking an elite group of Russian hackers and the future of global warfare In 2014, the world …

3.75/5 · 100+ ratings

Threat Modeling: Designing for Security

Adam Shostack provides a practical framework for identifying and addressing security risks before they become costly vulnerabilities. As a leading…

3.75/5 · 100+ ratings

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of re…

3.75/5 · 100+ ratings