- The author examines the history, development, theory, and practice of distributed denial of service actions as a tactic of political activism.
- release October 23, 2014
Archives ""
The Hacker Playbook 2: Practical Guide To Penetration Testing
- This second version of The Hacker Playbook takes all the best “plays” from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.
- June 20, 2015
The Browser Hacker’s Handbook
- Gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
- release March 24, 2014
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd Ed.)
- Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed.
- release August 15, 2013
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
- This book gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.
- release May 9, 2014
Mastering Metasploit
- With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
- release May 11, 2014
Mastering Kali Linux for Advanced Penetration Testing
- This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers.
- release May 21, 2014
Kali Linux CTF Blueprints
- Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux.
- release August 13, 2014
Ethical Hacking and Penetration Testing Guide
- The author supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test.
- release July 28, 2014
Dissecting the Hack: The F0rb1dd3n Network
- The book is divided into two parts. The first part, entitled “The F0rb1dd3n Network,” tells the fictional story of Bob and Leon, two kids caught up in an adventure where they learn the real-world consequence of digital actions. The second part, “Security Threats Are Real” (STAR), focuses on these real-world lessons.
- release July 15, 2010