Real-World Bug Hunting: A Field Guide to Web Hacking
If you like book Real-World Bug Hunting: A Field Guide to Web Hacking here is the list of books you may also like
Buy this book on AmazonReal-World Bug Hunting: A Field Guide to Web Hacking similar books
-
Bug Bounty Bootcamp
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Buy this book on Amazon -
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
Buy this book on Amazon
In Black Hat Python, the latest from Jus… -
-
-
-
Hacking APIs: Breaking Web Application Programming Interfaces
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.
Buy this book on Amazon
Hacking APIs is … -
Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with…
Buy this book on Amazon -
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
Buy this book on Amazon -
Stolen Focus: Why You Can't Pay Attention— and How to Think Deeply Again
Our ability to pay attention is collapsing. From the New York Times bestselling author of Chasing the Scream and Lost Connections comes a groundbreaking examination of why this is happening--and how t…
Buy this book on Amazon -
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a terrifying first look…
Buy this book on Amazon -
The Hacker Playbook 3: Practical Guide To Penetration Testing
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put you…
Buy this book on Amazon -
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
A chilling, globe-spanning detective story, tracking an elite group of Russian hackers and the future of global warfare
Buy this book on Amazon
In 2014, the world witnessed the start of an escalating series of cyberattacks. T… -
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug d…
Buy this book on Amazon -
Clean Architecture
Building upon the success of best-sellers The Clean Coder and Clean Code, legendary software craftsman Robert C. "Uncle Bob" Martin shows how to bring greater professionalism and discipline to applica…
Buy this book on Amazon -
Hacking: The Art of Exploitation w/CD
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
Buy this book on Amazon -
-
The 5 AM Club: Own Your Morning. Elevate Your Life
Legendary leadership and elite performance expert Robin Sharma introduced The 5am Club concept over twenty years ago, based on a revolutionary morning routine that has helped his clients maximize thei…
Buy this book on Amazon -
Foundation (Foundation, #1)
The first novel in Isaac Asimov's classic science-fiction masterpiece, the Foundation series
Buy this book on Amazon
For twelve thousand years the Galactic Empire has ruled supreme. Now it is dying. But only Hari Seldon, cre… -
Security Engineering: A Guide to Building Dependable Distributed Systems
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a livel…
Buy this book on Amazon -
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Buy this book on Amazon