Hacking Books



Bookstore > Books > Hacking

Gray Hat Hacking, 5th Edition

Gray Hat Hacking, 5th Edition

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-t...
Python For Offensive PenTest

Python For Offensive PenTest

Python is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script.This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is di...
JavaScript on Things

JavaScript on Things

JavaScript on Things is your first step into the exciting and downright entertaining world of programming for small electronics. If you know enough JavaScript to hack a website together, you'll be making things go bleep, blink, and spin faster than you can say "nodebot".Are you ready to make things move? If you can build a web a...
Learn Social Engineering

Learn Social Engineering

This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages ...
The Hardware Hacker

The Hardware Hacker

For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in ma...
Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. D...
Hacking Exposed Industrial Control Systems

Hacking Exposed Industrial Control Systems

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused...
Hacking Android

Hacking Android

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and sec...
Common Lisp Recipes

Common Lisp Recipes

Find solutions to problems and answers to questions you are likely to encounter when writing real-world applications in Common Lisp. This book covers areas as diverse as web programming, databases, graphical user interfaces, integration with other programming languages, multi-threading, and mobile devices as well as debugging techniques a...
Mastering Kali Linux Wireless Pentesting

Mastering Kali Linux Wireless Pentesting

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit.This book will take you on a journey where you will learn to m...
Penetration Testing with Raspberry Pi

Penetration Testing with Raspberry Pi

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing ...
Network Attacks and Exploitation

Network Attacks and Exploitation

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space ...
Machine Learning Projects for .NET Developers

Machine Learning Projects for .NET Developers

Machine Learning Projects for .NET Developers shows you how to build smarter .NET applications that learn from data, using simple algorithms and techniques that can be applied to a wide range of real-world problems. You'll code each project in the familiar setting of Visual Studio, while the machine learning logic uses F#, a language idea...
Data Science from Scratch

Data Science from Scratch

Data science libraries, frameworks, modules, and toolkits are great for doing data science, but they're also a good way to dive into the discipline without actually understanding data science. In this book, you'll learn how many of the most fundamental data science tools and algorithms work by implementing them from scratch.If you have an...
Network Security Assessment, 3rd Edition

Network Security Assessment, 3rd Edition

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that professional security analysts use to identify and assess risks in government, military, and commercial networks. Armed with this book, you can work to create environments that are hardened and ...
Programmer's Guide to Drupal, 2nd Edition

Programmer's Guide to Drupal, 2nd Edition

If you're a web programmer, your experiences have taught you certain lessons - and only some of them apply well to Drupal. Drupal has its own set of programming principles that require a different approach, and many programmers make mistakes when relying on skills they've used for other projects. This book will show you which programming ...
Kali Linux Wireless Penetration Testing

Kali Linux Wireless Penetration Testing

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.Kali Linux Wireless Penetration Testing Beginner's...
Web Penetration Testing with Kali Linux, 2nd Edition

Web Penetration Testing with Kali Linux, 2nd Edition

Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering.At the beginning of the book, you will be introduced to the...
Python Penetration Testing Essentials

Python Penetration Testing Essentials

This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples.We start by exploring the basics of networking with Python and then proceed to network hacking. Next, we delve into hacking the application layer where we start with gathering information from a website. We t...
Hacking Point of Sale

Hacking Point of Sale

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the prob...

Pages: 1, 2, 3 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.