Hacking Exposed Web Applications: Web Security Secrets & Solutions
Hacking Exposed Web Applications provides a technical deep dive into the mind of a digital intruder to help you protect online assets. This manual breaks down the methodology used by hackers to exploit vulnerabilities in modern web architecture. By adopting an offensive mindset, readers learn to identify weaknesses before they are leveraged for data theft or service disruption. The authors draw o…
Shelves
More like this
Red Team Field Manual
The Red Team Field Manual serves as a practical, condensed reference for cybersecurity professionals who need immediate access to command syntax d…
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
The true story of Max Butler, the master hacker who ran a billion dollar cyber crime network. The word spread through the hacking undergrou…
The Hacker Playbook: Practical Guide to Penetration Testing
The Hacker Playbook transforms complex penetration testing into a structured athletic game plan. Peter Kim uses his extensive background as a secu…
Hacking: The Art of Exploitation w/CD
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows ho…
The Tangled Web: A Guide to Securing Modern Web Applications
"Thorough and comprehensive coverage from one of the foremost experts in browser security." —Tavis Ormandy, Google Inc. Modern web a…
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the…
This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
The barbarians aren't at the gates. They're inside. This is the first full account of the cypherpunks who aim to free the world's information, fro…
Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
From driverless cars to smart thermostats, the Internet now has direct effects on the physical world. Although this computerized future, often cal…
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Linux Basics for Hackers serves as a practical entry point for aspiring security professionals who want to master the command line through the len…
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
A chilling, globe-spanning detective story, tracking an elite group of Russian hackers and the future of global warfare In 2014, the world …
Threat Modeling: Designing for Security
Adam Shostack provides a practical framework for identifying and addressing security risks before they become costly vulnerabilities. As a leading…
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of re…