The Pentester BluePrint: Starting a Career as an Ethical Hacker
If you like book The Pentester BluePrint: Starting a Career as an Ethical Hacker here is the list of books you may also like
Buy this book on AmazonSimilar books (20)
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Buy this book on Amazon -
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a terrifying first look…
Buy this book on Amazon -
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.
Buy this book on Amazon
Like it or not, your every move is being… -
-
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highl…
Buy this book on Amazon -
Dark Wire: The Incredible True Story of the Largest Sting Operation Ever
The inside story of the largest law-enforcement sting operation ever, in which the FBI made its own tech start-up to wiretap the world, shows how cunning both the authorities and drug traffickers have…
Buy this book on Amazon -
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
A chilling, globe-spanning detective story, tracking an elite group of Russian hackers and the future of global warfare
Buy this book on Amazon
In 2014, the world witnessed the start of an escalating series of cyberattacks. T… -
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-…
Buy this book on Amazon -
Social Engineering
The first book to reveal and dissect the technical aspect ofmany social engineering maneuvers From elicitation, pretexting, influence and manipulation allaspects of social engineering are picked apart…
Buy this book on Amazon -
-
Tools of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers
The latest groundbreaking tome from Tim Ferriss, the #1 New York Times best-selling author of The 4-Hour Workweek .
Buy this book on Amazon
From the
“For the last two years, I’ve interviewed more than 200 world-class performe… -
The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Buy this book on Amazon
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI m… -
Autocracy, Inc.
All of us have in our minds a cartoon image of what an autocratic state looks like, with a bad man at the top. But in the 21st century, that cartoon bears little resemblance to reality. Nowadays, auto…
Buy this book on Amazon -
Learning Python
Portable, powerful, and a breeze to use, Python is the popular open source object-oriented programming language used for both standalone programs and scripting applications. Python is considered easy …
Buy this book on Amazon -
Bug Bounty Bootcamp
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Buy this book on Amazon -
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at a uranium enrichment plant in Iran were failing and being replaced at an unprecedented rate. The cau…
Buy this book on Amazon -
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug d…
Buy this book on Amazon -
-
Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate e…
Buy this book on Amazon -