Rtfm

Author: Ben Clark
Publisher:
ISBN: 9781494295509
Size: 55.24 MB
Format: PDF, Mobi
View: 6399
Download Read Online
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell.

Blue Team Field Manual

Author: Alan White
Publisher: Createspace Independent Publishing Platform
ISBN: 9781541016361
Size: 66.25 MB
Format: PDF, Docs
View: 864
Download Read Online
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical ...

Penetration Testing

Author: Georgia Weidman
Publisher: No Starch Press
ISBN: 1593275641
Size: 17.79 MB
Format: PDF, ePub, Docs
View: 4992
Download Read Online
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.

Blue Team Handbook

Author: Don Murdoch
Publisher: CreateSpace
ISBN: 9781500734756
Size: 67.77 MB
Format: PDF, ePub, Mobi
View: 2209
Download Read Online
"The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike.

Violent Python

Author: TJ O'Connor
Publisher: Newnes
ISBN: 1597499641
Size: 79.28 MB
Format: PDF, ePub, Mobi
View: 2951
Download Read Online
This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

Red Team

Author: Micah Zenko
Publisher: Hachette UK
ISBN: 0465073956
Size: 49.87 MB
Format: PDF, Docs
View: 2744
Download Read Online
In Red Team, national security expert Micah Zenko provides an in-depth investigation into the work of red teams, revealing the best practices, most common pitfalls, and most effective applications of these modern-day Devil's Advocates.

The Hacker Playbook 2

Author: Peter Kim
Publisher: CreateSpace
ISBN: 9781512214567
Size: 71.35 MB
Format: PDF, Docs
View: 1931
Download Read Online
Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.

Hash Crack

Author: Joshua Picolet
Publisher: Createspace Independent Publishing Platform
ISBN: 9781540444967
Size: 52.34 MB
Format: PDF, Docs
View: 3700
Download Read Online
The Hash Crack manual contains syntax and examples for the most popular cracking and analysis tools and will save you hours of research looking up tool usage.

Practical Reverse Engineering

Author: Bruce Dang
Publisher: John Wiley & Sons
ISBN: 1118787315
Size: 52.68 MB
Format: PDF, ePub, Mobi
View: 2769
Download Read Online
However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step. The book uses real world examples from the public domain.

Advanced Penetration Testing

Author: Wil Allsopp
Publisher: John Wiley & Sons
ISBN: 1119367689
Size: 63.40 MB
Format: PDF, Kindle
View: 6487
Download Read Online
Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and ...