BackTrack 5 wireless penetration testing : beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
Learning iOS penetration testing : secure your iOS applications and uncover hidden vunerabilities by conducting penetration tests /
Penetration testing services procurement guide.
Procuring penetration testing services.
Digital forensics with Kali Linux : perform data acquisition, data recover, network forensics, and malware analysis with Kali Linux 2019x /
Advanced penetration testing for highly-secured environments /
Penetration testing : protecting networks and systems /
Practical hardware pentesting : a guide to attacking embedded systems and protecting them against the most common hardware attacks /
Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment /
Kali Linux wireless penetration testing cookbook : identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security /
Python : penetration testing for developers : unleash the power of Python scripting to execute effective and efficient penetration tests : a course in three modules /
Securing Remote Access in Palo Alto Networks Practical Techniques to Enable and Protect Remote Users, Improve Your Security Posture, and Troubleshoot Next-Generation Firewalls.
AWS Penetration Testing : Implement Various Security Strategies on AWS Using Tools Such As Kali Linux, Metasploit, and Nmap.
Kali Linux network scanning cookbook : over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning /
Nmap : network exploration and security auditing cookbook : a complete guide to mastering Nmap and its scripting engine, covering practical tasks for penetration testers and system administrators /
Enterprise Cloud Security and Governance : Efficiently set data protection and privacy principles.
UI TESTING WITH PUPPETEER : implement end-to-end testing and browser automation using javascript... and node.js.
Security Tokens and Stablecoins Quick Start Guide : Learn How to Build STO and Stablecoin Decentralized Applications.
MASTERING VEEAM BACKUP & REPLICATION 10 : protect your virtual environment and implement cloud... backup using veeam technology.
The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit.
Network Scanning Cookbook : Practical Network Security Using Nmap and Nessus 7.
Cybersecurity governance in Latin America states, threats, and alliances /
Internet privacy rights : rights to protect autonomy /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Logics and languages for reliability and security /
Formal logical methods for system security and correctness /
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes /
Health Informatics : building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012) /
Securing the cloud : cloud computer security techniques and tactics /
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
Hack proofing XML /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Techniques and applications of digital watermarking and content protection /
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices /
Nokia network security : solutions handbook /
Cyber crime, security and digital intelligence /
Technology and privacy : the new landscape /
Who goes there? : authentication through the lens of privacy /
CCNA Cyber Ops SECOPS certification guide 210-255 : learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate /
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design /