Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks at networking from an attacker's …
If you like book Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation here is the list of books you may also like
Buy this book on AmazonSimilar books (20)
-
Malware Data Science: Attack Detection and Attribution
Buy this book on Amazon -
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic…
Buy this book on Amazon -
Black Hat Go: Go Programming For Hackers and Pentesters
Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and autom…
Buy this book on Amazon -
Permanent Record
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system …
Buy this book on Amazon -
Refactoring: Improving the Design of Existing Code
As the application of object technology—particularly the Java programming language—has become commonplace, a new problem has emerged to confront the software development community. Significant numbers…
Buy this book on Amazon -
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
Buy this book on Amazon
In Black Hat Python, the latest from Jus… -
Hacking: The Art of Exploitation w/CD
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
Buy this book on Amazon -
Security Engineering: A Guide to Building Dependable Distributed Systems
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a livel…
Buy this book on Amazon -
-
The Ultimate Kali Linux Book
Buy this book on Amazon -
The Art of War
Twenty-Five Hundred years ago, Sun Tzu wrote this classic book of military strategy based on Chinese warfare and military thought. Since that time, all levels of military have used the teaching on Sun…
Buy this book on Amazon -
Bug Bounty Bootcamp
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Buy this book on Amazon -
-
-
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
It’s not just computers―hacking is everywhere.
Buy this book on Amazon
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about y… -
Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with…
Buy this book on Amazon -
The Hacker Playbook 3: Practical Guide To Penetration Testing
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put you…
Buy this book on Amazon -
-
Dr. Jekyll and Mr. Hyde
Robert Louis Stevenson's masterpiece of the duality of good and evil in man's nature sprang from the darkest recesses of his own unconscious—during a nightmare from which his wife awakened him, alerte…
Buy this book on Amazon -
Kali Linux Penetration Testing Bible
Buy this book on Amazon