Rtfm

Author: Ben Clark
Publisher:
ISBN: 9781494295509
Size: 54.56 MB
Format: PDF, Docs
View: 6719
Download Read Online
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell.

Blue Team Field Manual

Author: Alan White
Publisher: Createspace Independent Publishing Platform
ISBN: 9781541016361
Size: 36.73 MB
Format: PDF, ePub, Docs
View: 3091
Download Read Online
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical ...

Blue Team Handbook

Author: Don Murdoch
Publisher: CreateSpace
ISBN: 9781500734756
Size: 71.35 MB
Format: PDF, Kindle
View: 3969
Download Read Online
"The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike.

Red Team

Author: Micah Zenko
Publisher: Hachette UK
ISBN: 0465073956
Size: 52.66 MB
Format: PDF, ePub, Docs
View: 4772
Download Read Online
In Red Team, national security expert Micah Zenko provides an in-depth investigation into the work of red teams, revealing the best practices, most common pitfalls, and most effective applications of these modern-day Devil's Advocates.

Penetration Testing

Author: Georgia Weidman
Publisher: No Starch Press
ISBN: 1593275641
Size: 53.83 MB
Format: PDF, Mobi
View: 1326
Download Read Online
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.

The Basics Of Hacking And Penetration Testing

Author: Patrick Engebretson
Publisher: Elsevier
ISBN: 0124116418
Size: 45.22 MB
Format: PDF, Mobi
View: 6817
Download Read Online
This is complemented by PowerPoint slides for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.

Practical Reverse Engineering

Author: Bruce Dang
Publisher: John Wiley & Sons
ISBN: 1118787315
Size: 69.59 MB
Format: PDF, ePub, Mobi
View: 294
Download Read Online
However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step. The book uses real world examples from the public domain.

Metasploit

Author: Jim O'Gorman
Publisher: No Starch Press
ISBN: 159327288X
Size: 78.98 MB
Format: PDF, Kindle
View: 4809
Download Read Online
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless.

Defensive Security Handbook

Author: Lee Brotherston
Publisher: "O'Reilly Media, Inc."
ISBN: 1491960353
Size: 32.67 MB
Format: PDF, ePub, Docs
View: 4529
Download Read Online
Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, ...