Linux e-book, Linux Security, Security January 27, 2016 The Hacker Playbook 2 : Practical Guide To Penetration Testing Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared,…
Hacking, Kali, Linux e-book, Security July 21, 2015 Building Virtual Pentesting Labs for Advanced Penetration Testing Build intricate virtual architecture to practice any penetration testing technique virtually Overview Build and enhance your existing pentesting methods and skills Get a solid…
Kali, Linux e-book June 21, 2015 Metasploit: The Penetration Tester’s Guide “The best guide to the Metasploit Framework.”—HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and…
Kali, Security June 21, 2015 Penetration Testing: A Hands-On Introduction to Hacking Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate…
Hacking, Linux e-book, Security March 30, 2015 Network Forensics: Tracking Hackers through Cyberspace “This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based…