Rtfm

Author: Ben Clark
Publisher:
ISBN: 9781494295509
Size: 45.39 MB
Format: PDF, ePub, Mobi
View: 949
Download Read Online
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell.

Blue Team Field Manual

Author: Alan White
Publisher: Createspace Independent Publishing Platform
ISBN: 9781541016361
Size: 68.27 MB
Format: PDF, Kindle
View: 2375
Download Read Online
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical ...

Red Team

Author: Micah Zenko
Publisher: Hachette UK
ISBN: 0465073956
Size: 72.48 MB
Format: PDF
View: 4700
Download Read Online
An international security expert shows how competitive organizations can get—and stay—ahead by thinking like their adversaries

Blue Team Handbook

Author: Don Murdoch
Publisher: CreateSpace
ISBN: 9781500734756
Size: 48.59 MB
Format: PDF, Mobi
View: 3404
Download Read Online
Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections. The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike.

Penetration Testing

Author: Georgia Weidman
Publisher: No Starch Press
ISBN: 1593275641
Size: 13.47 MB
Format: PDF, Kindle
View: 5717
Download Read Online
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.

Violent Python

Author: TJ O'Connor
Publisher: Newnes
ISBN: 1597499641
Size: 22.85 MB
Format: PDF, Kindle
View: 3129
Download Read Online
This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

The Hacker Playbook 2

Author: Peter Kim
Publisher: CreateSpace
ISBN: 9781512214567
Size: 32.67 MB
Format: PDF, ePub, Mobi
View: 5955
Download Read Online
Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.

Defensive Security Handbook

Author: Lee Brotherston
Publisher: "O'Reilly Media, Inc."
ISBN: 1491960337
Size: 16.46 MB
Format: PDF, ePub
View: 6404
Download Read Online
Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, ...

Metasploit

Author: Jim O'Gorman
Publisher: No Starch Press
ISBN: 159327288X
Size: 38.60 MB
Format: PDF, Docs
View: 1607
Download Read Online
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless.

Black Hat Python

Author: Justin Seitz
Publisher: No Starch Press
ISBN: 1593275900
Size: 71.84 MB
Format: PDF, ePub, Mobi
View: 2724
Download Read Online
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, ...