Web Application Security: Exploitation and Countermeasures for Modern Web Applications
If you like book Web Application Security: Exploitation and Countermeasures for Modern Web Applications here is the list of books you may also like
Buy this book on AmazonWeb Application Security: Exploitation and Countermeasures for Modern Web Applications similar books
-
Bug Bounty Bootcamp
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Buy this book on Amazon -
-
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO.
Buy this book on Amazon
The company's new IT initiative, code named Phoenix Project, is critical… -
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
It’s not just computers―hacking is everywhere.
Buy this book on Amazon
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about y… -
The Programmer's Brain
Your brain responds in a predictable way when it encounters new or difficult tasks. This unique book teaches you concrete techniques rooted in cognitive science that will improve the way you learn and…
Buy this book on Amazon -
-
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
Buy this book on Amazon
In Black Hat Python, the latest from Jus… -
Thinking In Systems: A Primer
Meadows’ Thinking in Systems, is a concise and crucial book offering insight for problem solving on scales ranging from the personal to the global. Edited by the Sustainability Institute’s Diana Wrigh…
Buy this book on Amazon -
-
Social Engineering
The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart…
Buy this book on Amazon -
Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with…
Buy this book on Amazon -
Offensive Countermeasures: The Art of Active Defense
Tired of playing catchup with hackers? Does it ever seem they have all of the cool tools? Does it seem like defending a network is just not fun?This books introduces new cyber-security defensive tacti…
Buy this book on Amazon -
-
-
It Doesn't Have to Be Crazy at Work
In this timely manifesto, the authors of the New York Times bestseller Rework broadly reject the prevailing notion that long hours, aggressive hustle, and "whatever it takes" are required to run a suc…
Buy this book on Amazon -
Clean Architecture
Building upon the success of best-sellers The Clean Coder and Clean Code, legendary software craftsman Robert C. "Uncle Bob" Martin shows how to bring greater professionalism and discipline to applica…
Buy this book on Amazon -
-
-
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Buy this book on Amazon