- Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information.
- release December 3, 2013
Archives ""
Information Governance and Security: Protecting and Managing Your Company’s Proprietary Information
- Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization’s most important asset-its proprietary information-safe from cyber and physical compromise.
- release October 6, 2014
Honeypots: A New Paradigm to Information Security
- The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms. Additional topics include denial of service, viruses, worms, phishing, and virtual honeypots and forensics.
- release February 3, 2011
The Hacker Playbook 2: Practical Guide To Penetration Testing
- This second version of The Hacker Playbook takes all the best “plays” from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.
- June 20, 2015
The Browser Hacker’s Handbook
- Gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks.
- release March 24, 2014
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (2nd Ed.)
- Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed.
- release August 15, 2013
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
- This book gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment.
- release May 9, 2014
Mastering Metasploit
- With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
- release May 11, 2014
Mastering Kali Linux for Advanced Penetration Testing
- This book will take you, as a tester, through the reconnaissance, exploitation, and post-exploitation activities used by penetration testers and hackers.
- release May 21, 2014
Kali Linux CTF Blueprints
- Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux.
- release August 13, 2014