How to Hack Like a Ghost: Breaching the Cloud
If you like book How to Hack Like a Ghost: Breaching the Cloud here is the list of books you may also like
Buy this book on AmazonHow to Hack Like a Ghost: Breaching the Cloud similar books
-
The Hacker Playbook 3: Practical Guide To Penetration Testing
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put you…
Buy this book on Amazon -
-
Red Team Field Manual
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man pa…
Buy this book on Amazon -
-
-
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
Buy this book on Amazon -
The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Buy this book on Amazon
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI m… -
Permanent Record
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system …
Buy this book on Amazon -
Social Engineering
The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart…
Buy this book on Amazon -
-
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Buy this book on Amazon -
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a terrifying first look…
Buy this book on Amazon -
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
A chilling, globe-spanning detective story, tracking an elite group of Russian hackers and the future of global warfare
Buy this book on Amazon
In 2014, the world witnessed the start of an escalating series of cyberattacks. T… -
Full Stack Python Security: Cryptography, TLS, and attack resistance
Buy this book on Amazon -
Internet
Internet on parasta ja pahinta mitä meille on tapahtunut.
Buy this book on Amazon
Suomen tunnetuin tietoturva-asiantuntija kertoo kirjassaan, mitä jokaisen meistä tulee tietää internetin uhkista ja mahdollisuuksista.
Internet-… -
Bug Bounty Bootcamp
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Buy this book on Amazon -
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
Buy this book on Amazon
In Black Hat Python, the latest from Jus… -
Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture
Masters of Doom is the amazing true story of the Lennon and McCartney of video John Carmack and John Romero. Together, they ruled big business. They transformed popular culture. And they provoked a na…
Buy this book on Amazon -
Chip War: The Fight for the World's Most Critical Technology
An epic account of the decades-long battle to control what has emerged as the world's most critical resource—microchip technology—with the United States and China increasingly in conflict.
Buy this book on Amazon
You may be s… -
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
Buy this book on Amazon