Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate e…
If you like book Penetration Testing: A Hands-On Introduction to Hacking here is the list of books you may also like
Buy this book on AmazonSimilar books (20)
-
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, n…
Buy this book on Amazon -
Fluent Python: Clear, Concise, and Effective Programming
Python's simplicity lets you become productive quickly, but this often means you aren't using everything it has to offer. With this hands-on guide, you'll learn how to write effective, idiomatic Pytho…
Buy this book on Amazon -
A Brief History of Time
A landmark volume in science writing by one of the great minds of our time, Stephen Hawking’s book explores such profound questions as: How did the universe begin—and what made its start possible? Doe…
Buy this book on Amazon -
Foundation and Empire (Foundation, #2)
Foundation and Empire tells the incredible story of a new breed of man who create a new force for galactic government. Thus, the Foundation hurtles into conflict with the decadent, decrepit First Empi…
Buy this book on Amazon -
Second Foundation (Foundation, #3)
So far the Foundation was safe. But there was a hidden Second Foundation to protect the first. The Mule has yet to find it, but he was getting closer all the time. The men of the Foundation sought it,…
Buy this book on Amazon -
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-…
Buy this book on Amazon -
Neuromancer (Sprawl, #1)
Hotwired to the leading edges of art and technology, Neuromancer is a cyberpunk, science fiction masterpiece—a classic that ranks with 1984 and Brave New World as one of the twentieth century’s most p…
Buy this book on Amazon -
I, Robot (Robot, #0.1)
Isaac Asimov's I, Robot launches readers on an adventure into a not-so-distant future where man and machine , struggle to redefinelife, love, and consciousness—and where the stakes are nothing less th…
Buy this book on Amazon -
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
Buy this book on Amazon
In Black Hat Python, the latest from Jus… -
Foundation (Foundation, #1)
The first novel in Isaac Asimov's classic science-fiction masterpiece, the Foundation series
Buy this book on Amazon
For twelve thousand years the Galactic Empire has ruled supreme. Now it is dying. But only Hari Seldon, cre… -
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
Buy this book on Amazon -
-
How Linux Works: What Every Superuser Should Know
How Linux Works describes the inside of the Linux system for systems administrators, whether they maintain an extensive network in the office or one Linux box at home. Some books try to give you copy-…
Buy this book on Amazon -
Slow Productivity: The Lost Art of Accomplishment Without Burnout
Do fewer things. Work at a natural pace. Obsess over quality.
Buy this book on Amazon
From the New York Times bestselling author of Digital Minimalism and Deep Work, a groundbreaking philosophy for pursuing meaningful accompl… -
Red Team Field Manual
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man pa…
Buy this book on Amazon -
The C Programming Language
This book is meant to help the reader learn how to program in C. It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a wor…
Buy this book on Amazon -
The Time of Contempt (The Witcher, #2)
The New York Times bestselling series that inspired the international hit video game: The Witcher
Buy this book on Amazon
Geralt is a witcher: guardian of the innocent; protector of those in need; a defender, in d… -
Code: The Hidden Language of Computer Hardware and Software
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with…
Buy this book on Amazon -
Death Note, Vol. 1: Boredom (Death Note, #1)
Light Yagami is an ace student with great prospects - and he's bored out of his mind. But all that changes when he finds the Death Note, a notebook dropped by a rogue Shinigami, a death god. Any human…
Buy this book on Amazon -
So Good They Can't Ignore You: Why Skills Trump Passion in the Quest for Work You Love
In this eye-opening account, Cal Newport debunks the long-held belief that "follow your passion" is good advice.
Buy this book on Amazon
Not only is the cliché flawed—preexisting passions are rare and have little to do with …