Advanced Penetration Testing |
269 Pages |
2. |
The Basics of Web Hacking |
179 Pages |
3. |
The Basics of Hacking and Penetration Testing |
178 Pages |
4. |
The Art of Deception by Kevin Mitnick |
577 Pages |
5. |
SQL Injection Attacks and Defense |
761 Pages |
6. |
Metasploit – The Penetration Tester’s Guide |
332 Pages |
7. |
Ethical Hacking and Penetration Testing Guide |
523 Pages |
8. |
Network Attacks and Exploitation – A Framework |
219 Pages |
9. |
Python Web Penetration Testing Cookbook |
224 Pages |
10. |
Wireshark for Security Professionals |
391 Pages |
11. |
Mastering Modern Web Penetration Testing |
298 Pages |
12. |
The Shellcoder’s Handbook |
745 Pages |
13. |
The Little Black Book of Computer Viruses |
183 Pages |
14. |
XSS Attacks – Cross Site Scripting Exploits and Defense |
482 Pages |
15. |
The Web Application Hacker’s Handbook |
771 Pages |
16. |
Ethical Hacking and Countermeasures |
239 Pages |
17. |
Reversing – Secrets of Reverse Engineering |
619 Pages |
18. |
Network Security Bible |
697 Pages |
19. |
Hacking Web Applications – Hacking Exposed |
416 Pages |
20. |
Hacking for Dummies |
387 Pages |
21. |
Hacking Wireless Network for Dummies |
387 Pages |
22. |
Ninja Hacking – Unconventional Penetration Testing Tacting and Techniques |
314 pages |
23. |
Professional Penetration Testing |
525 Pages |
24. |
Gray Hat Hacking – The Ethical Hacker’s Handbook |
577 Pages |
25. |
Hack Attacks Testing |
561 Pages |
26. |
Basic Security Testing with Kali Linux |
242 Pages |
27. |
Mastering Kali Linux for Advanced Penetration Testing |
356 Pages |
28. |
Kali Linux CTF Blueprints |
190 Pages |
29. |
Kali Linux Cookbook |
261 Pages |
30. |
Kali Linux – Assuring Security by Penetration Testing |
454 Pages |
31. |
Information Security Management Handbook |
3206 Pages |
32. |
Computer and Information Security Handbook |
877 Pages |
33. |
CISSP – Certified Information Systems Security Professional |
804 Pages |
34. |
Computer Security and Cryptography |
542 Pages |
35. |
Python for Kids |
348 Pages |
36. |
End to End Network Security – Defense-in-Depth |
469 Pages |
37. |
A Guide to Computer Network Security |
483 Pages |
38. |
Essential Computer Security |
321 Pages |
39. |
Security in Wireless Mesh Networks |
548 Pages |
40. |
Hacking Windows XP (OLD) |
379 Pages |
41. |
Hacking Exposed – Windows Security, Secrets and Solutions |
482 Pages |
42. |
Hacking Exposed – Network Security, Secrets and Solutions |
736 Pages |
43. |
Information Security – Principles and Pratice |
413 Pages |
44. |
Nessus, Snort and Ethereal Power Tools |
472 Pages |
45. |
Active Defense – A Comprehensive Guide to Network Security |
374 Pages |
46. |
Information Security Fundamentals |
262 Pages |
47. |
Wireless Network Security |
422 Pages |
48. |
Red Hat Linux Security and Optimization |
721 Pages |
49. |
Windows Forensics Analysis |
386 Pages |
50. |
Mobile and Wireless Network Security and Privacy |
232 Pages |
51. |
Firewalls and Internet Security |
456 Pages |
52. |
An Introduction to Computer Security – The NIST Handbook |
290 Pages |
53. |
Unauthorized Access – Physical Penetration Testing for IT Security Teams |
309 Pages |
54. |
Testing Web Security |
297 Pages |
55. |
Maximum Security – A Hacker’s Guide to Protecting Your Internet Site and Network |
670 Pages |
56. |
Information Resource Guide – Computer, Internet and Network Systems Security |
325 Pages |
57. |
The Hacker’s Underground Handbook |
116 Pages |
58. |
Guide to SCADA and Industrial Control Systems Security |
164 Pages |
59. |
The International Handbook of Computer Security |
274 Pages |
60. |
The Code Book – How to Make It, Break It, Hack It, Crack It |
273 Pages |
61. |
Linux 101 Hacks |
271 Pages |
62. |
Introduction to Linux – A Hands on Guide |
223 Pages |
63. |
Bluetooth Security |
222 Pages |
64. |
IT Governance – A Manager’s Guide to Data Security and ISO 27001/27002 |
385 Pages |
65. |
Batch File Programming |
155 Pages |
66. |
Cracking the Coding Interview |
310 Pages |
67. |
Dictionary of Networking |
465 Pages |
68. |
Hacking Gmail |
310 Pages |
69. |
Linux Complete Command Reference |
1528 Pages |
70. |
Practical Hacking Techniques and Countermeasures |
752 Pages |
71. |
The Art of Intrusion by Kevin Mitnick |
291 Pages |
72. |
Hack Notes – Windows Security Portable Reference |
289 Pages |
73. |
Hacking – The Next Generation |
298 Pages |
74. |
Hacking the Cable Modem |
330 Pages |
75. |
Hackers Beware – Defending Your Network From The Wiley Hacker |
817 Pages |
76. |
Hack Proofing Your Network |
826 Pages |
77. |
Hack Attacks Revealed |
837 Pages |
78. |
Dissecting the Hack – The F0rb1dd3n Network |
441 Pages |
79. |
TCP/IP Guide |
1671 Pages |
80. |
Offensive Security – Wireless Attacks – WiFu |
385 Pages |
81. |
Google Hacking – For Penetration Testers |
529 Pages |
82. |
Computer Forensics Investigating Network Intrusions and Cyber Crime |
394 Pages |
83. |
Hakin9 Bible |
207 Pages |
84. |
Network Forensics – Tracking Hackers Through Cyberspace |
574 Pages |
85. |
Computer Forensics – Investigating Data and Image Files |
227 Pages |
86. |
Penetration Testing and Network Defense |
625 Pages |
87. |
Hacking Exposed – Malware and Rootkits |
401 Pages |
88. |
Malware Analyst’s Cookbook |
746 Pages |
89. |
Mobile Malware – Attacks and Defense |
386 Pages |
90. |
Java 2 Network Security |
702 Pages |
91. |
A Bug Hunter’s Diary |
212 Pages |
92. |
Viruses Revealed – Understand and Counter Malicious Software |
721 Pages |
93. |
Figital Forensics With Open Source Tools |
289 Pages |
94. |
SSH, The Secure Shell – The Definitive Guide |
438 Pages |
95. |
Pro PHP Security |
369 Pages |
96. |
Zero Day Exploit – Countdown to Darkness |
363 Pages |
97. |
Metasploit Penetration Testing Cookbook |
269 Pages |
98. |
24 Deadly Sins of Software Securtiy |
433 Pages |
99. |
Botnets – The Killer Web App |
482 Pages |
100. |
Hacker Highschool – Hack School for Beginners (ZIP) |
12 Books |