The Hacker Playbook 3: Practical Guide To Penetration Testing
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put you…
If you like book The Hacker Playbook 3: Practical Guide To Penetration Testing here is the list of books you may also like
Buy this book on AmazonThe Hacker Playbook 3: Practical Guide To Penetration Testing similar books
-
-
Red Team Field Manual
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man pa…
Buy this book on Amazon -
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
Buy this book on Amazon
In Black Hat Python, the latest from Jus… -
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.…
Buy this book on Amazon -
-
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-…
Buy this book on Amazon -
Permanent Record
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system …
Buy this book on Amazon -
UNIX and Linux System Administration Handbook
"As an author, editor, and publisher, I never paid much attention to the competition-except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books …
Buy this book on Amazon -
The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War
In 2014, Sony Pictures Entertainment was brutally hacked, with thousands of computers wiped and the personal data of hundreds of employees released online. This was the world's first glance at the Laz…
Buy this book on Amazon -
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
Buy this book on Amazon -
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highl…
Buy this book on Amazon -
The 33 Strategies of War
Strategies of war—and the subtle social game of everyday life—by the bestselling author of The 48 Laws of Power
Buy this book on Amazon
Robert Greene’s groundbreaking guides, The 48 Laws of Power , The Art of Seduction , an… -
ADHD 2.0: New Science and Essential Strategies for Thriving with Distraction—From Childhood Through Adulthood
A revolutionary new approach to ADD/ADHD featuring cutting-edge research and strategies to help readers thrive, by the bestselling authors of the seminal books Driven to Distraction and Delivered from…
Buy this book on Amazon -
-
The Pragmatic Programmer: From Journeyman to Master
Straight from the programming trenches, The Pragmatic Programmer cuts through the increasing specialization and technicalities of modern software development to examine the core process--taking a …
Buy this book on Amazon -
-
Hacking: The Art of Exploitation w/CD
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
Buy this book on Amazon -
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn't clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code…
Buy this book on Amazon -
Metasploit Penetration Testing Cookbook - Third Edition
Buy this book on Amazon -
The 48 Laws of Power
Amoral, cunning, ruthless, and instructive, this multi-million-copy New York Times bestseller is the definitive manual for anyone interested in gaining, observing, or defending against ultimate contro…
Buy this book on Amazon