Kali Linux Cookbook - Second Edition: Effective penetration testing solutions

Kali Linux Cookbook – Second Edition: Effective penetration testing solutions

Key Features Learn how to scan networks to find vulnerable computers and servers Hack into devices to control them, steal their data, and make them yours Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux Book Description Kali Linux is a Linux distribution designed for penetration testing […]

Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition: Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack

Kali Linux Wireless Penetration Testing Beginner’s Guide – Third Edition: Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack

Key Features Learn wireless penetration testing with Kali Linux Detect hidden wireless networks and discover their names Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Book Description […]

Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions

Kali Linux – An Ethical Hacker’s Cookbook: End-to-end penetration testing solutions

Key Features Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Book Description With the current rate of hacking, it is very important to pentest your environment in order […]

Hacking: The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux and Penetration Testing

Hacking: The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux and Penetration Testing

Learn to hack! Below are sample topics covered in the book: – Hacking into Computers and Smartphones – Ethical Hacking – Scanning Your Systems – Pinpointing Specific Vulnerabilities – The best tools for each kind of hacking – Cracking Encryption – Flaws in Websites and Applications – Attacking with Frameworks – Penetration Testing – Linux […]

Linux Bible

Linux Bible

The industry favorite Linux guide, updated for Red Hat Enterprise Linux 7 and the cloud Linux Bible, 9th Edition is the ultimate hands-on Linux user guide, whether you’re a true beginner or a more advanced user navigating recent changes. This updated ninth edition covers the latest versions of Red Hat Enterprise Linux 7 (RHEL 7), Fedora […]

Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit

Mastering Kali Linux for Advanced Penetration Testing – Second Edition: Secure your network with Kali Linux – the ultimate white hat hackers’ toolkit

A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers. About This Book Employ advanced pentesting techniques with Kali Linux to build highly-secured systems Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches Select and configure […]

Hacking Exposed Linux, 3rd Edition

Hacking Exposed Linux, 3rd Edition

The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network–whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is […]

Kali Linux Revealed: Mastering the Penetration Testing Distribution

Kali Linux Revealed: Mastering the Penetration Testing Distribution

Kali Linux has not only become the information security professional’s platform of choice, but evolved into an industrial-grade, and world-class operating system distribution–mature, secure, and enterprise-ready. Through the decade-long development process, Muts and his team, along with countless volunteers from the hacker community, have taken on the burden of streamlining and organizing our work environment, […]

Hacking: The Art of Exploitation, 2nd Edition

Hacking: The Art of Exploitation, 2nd Edition

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson […]