The Hacker Playbook 2: Practical Guide To Penetration Testing

Author: Peter Kim
4.25/5 · 400+ ratings

Peter Kim treats cybersecurity like a professional sport, providing a tactical manual for ethical hackers who need a concrete game plan. This second edition expands on the original by incorporating modern attack vectors and advanced tools used by top security researchers. It focuses on the mindset required to navigate complex corporate environments, moving beyond basic theory to offer a hands-on …

Shelves
Computers Software Programming Nonfiction Hackers Peter Kim book Textbooks Computer Science Technology Technical Reference

More like this


JavaScript: The Definitive Guide

This Fifth Edition is completely revised and expanded to cover JavaScript as it is used in today's Web 2.0 applications. This book is both an exam…

4.25/5 · 400+ ratings

Clean Architecture

Building upon the success of best-sellers The Clean Coder and Clean Code, legendary software craftsman Robert C. "Uncle Bob" Martin shows how to b…

4.25/5 · 400+ ratings

JavaScript: The Good Parts

Most programming languages contain good and bad parts, but JavaScript has more than its share of the bad, having been developed and released in a …

4.25/5 · 400+ ratings

Learn You a Haskell for Great Good!

Learn You a Haskell for Great Good! is a fun, illustrated guide to learning Haskell, a functional programming language that's growing in popularit…

4.25/5 · 400+ ratings

The Art of Computer Programming, Volume 1: Fundamental Algorithms

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer program…

4.25/5 · 400+ ratings

Patterns of Enterprise Application Architecture

Developers of enterprise applications (e.g reservation systems, supply chain programs, financial systems, etc.) face a unique set of challenges, d…

4.25/5 · 400+ ratings

Release It!: Design and Deploy Production-Ready Software

Whether it's in Java, .NET, or Ruby on Rails, getting your application ready to ship is only half the battle. Did you design your system to surviv…

4.25/5 · 400+ ratings

Coders at Work: Reflections on the Craft of Programming

Peter Seibel interviews 16 of the most interesting computer programmers alive today in Coders at Work, offering a brand-new companion volume to Ap…

4.25/5 · 400+ ratings

The Hacker Playbook 3: Practical Guide To Penetration Testing

Author: Peter Kim

The Hacker Playbook 3 Red Team Edition serves as a technical manual for security professionals looking to move beyond standard vulnerability scann…

4.25/5 · 400+ ratings

The Hacker Playbook: Practical Guide to Penetration Testing

Author: Peter Kim

The Hacker Playbook transforms complex penetration testing into a structured athletic game plan. Peter Kim uses his extensive background as a secu…

4.25/5 · 400+ ratings

Extreme Programming Explained: Embrace Change

“In this second edition of Extreme Programming Explained, Kent Beck organizes and presents five years’ worth of experiences, growth, and change re…

4.25/5 · 400+ ratings

Effective C++: 55 Specific Ways to Improve Your Programs and Designs

The Barnes & Noble Review Since early in the 90s, working C++ programmers have relied on Scott Meyers s Effective C++ to dramatically improve …

4.25/5 · 400+ ratings