Independently published, 2021. — 200 p. — ASIN : B0943CJR5Q. Do you want to become a professional hacker? If answer to that question is yes, then you need to learn Kali Linux. It is the most world famous and the best operating system for hacking and pentration testing! This book will not only be teaching you hacking with kali Linux, but will also teach you all the things you...
O’Reilly Media, Inc., 2012. — 320 p. — ISBN: 978-1-449-30371-6. If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through...
Wiley, 2024. — 320 р. — (Tech Today). — ISBN-13: 978-1-394-19988-4. A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to...
Packt Publishing, 2016. — 440 p. — ISBN13: 9781786463166. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by...
3rd Edition. — Packt Publishing, 2018. — 569 p. — ISBN: 978-1-78899-061-5. Discover the next level of network defense with the Metasploit framework We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out...
Packt Publishing, 2017. — 230 p. — ISBN: 978-1-78829-713-4. Master the art of penetration testing with Metasploit Framework in 7 days. The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and...
Manning Publications Co., 2019. — 454 p. — ISBN: 978-1617294358. Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them. Foreword by Daniel...
Wiley, 2020. — 272 p. — ISBN: 978-1119491804. A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities...
Apress Media LLC, 2020. — 948 p. — ISBN13: (electronic): 978-1-4842-6193-4. Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to...
BPB Publications, 2024. — 328 р. — ISBN: 978-93-89898-569. Learn how to work towards making the most out of a career in emerging tech Key Features Understand the core concepts related to careers in emerging tech. Learn innovative, exclusive, and exciting ways to design a successful career in ET. Reduce your learning curve by examining the career trajectories of eminent ET...
No Starch Press, San Francisco, 2012. — 802 p. — ISBN 13: 978-1593272906. Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the...
No Starch Press, 2019. — 264 p. — ISBN13: 978-1-59327-861-8. Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications. Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common...
Комментарии