by Corey Ball
An Application Programming Interface (API) is a software connection that allows applications to communicate and share services. Hacking APIs will teach you how to test web APIs for security vulnerabilities. You'll learn how the common API types, REST, SOAP, and GraphQL, work in the wild. Then you'll set up a streamlined API testing lab and perform common attacks, like those targeting an API's...
Price: $42.49 | Publisher: No Starch Press | Release: 2022
Mastering Kali Linux for Advanced Penetration Testing, 4th Edition
by Vijay Kumar Velu
Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employed by real hackers. You'll go through laboratory integration to c...
Price: $54.99 | Publisher: Packt Publishing | Release: 2022
by Bryson Payne
Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you'll be shocked by how easy they are to carry out - and realize just how vulnerable most people really are. You'll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself...
Price: $20.99 | Publisher: No Starch Press | Release: 2022
FREE EBOOK - Game Hacking Academy
by Attilathedud
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling of creating a working aimbot for a game and then destroying a...
Publisher: Self-publishing | Release: 2021
by Colin O'Flynn, Jasper van Woudenberg
Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere - in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, compone...
Price: $29.99 | Publisher: No Starch Press | Release: 2021
by Daniel G. Graham
Ethical Hacking is a crash course in modern hacking techniques. It's already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then vi...
Price: $19.00 | Publisher: No Starch Press | Release: 2021
by Andrew Martin, Michael Hausenblas
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Martin and Michael Hausenblas share best-practice configura...
Price: $37.04 | Publisher: O'Reilly Media | Release: 2021
by Vickie Li
A comprehensive guide for any web application hacker, Bug Bounty Bootcamp is a detailed exploration of the many vulnerabilities present in modern websites and the hands-on techniques you can use to most successfully exploit them.Bug Bounty Bootcamp prepares you for participation in bug bounty programs, which companies set up to reward hackers for finding and reporting vulnerabilities in their applications. ...
Price: $32.99 | Publisher: No Starch Press | Release: 2021
by Andrew Hoffman
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply.Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense,...
Price: $28.00 | Publisher: O'Reilly Media | Release: 2020
by Jonathan Helmus
Cloud security has always been treated as the highest priority by AWS while designing a robust cloud infrastructure. AWS has now extended its support to allow users and security experts to perform penetration tests on its environment. This has not only revealed a number of loopholes and brought vulnerable points in their existing system to the fore, but has also opened up opportunities for organizations to ...
Price: $44.99 | Publisher: Packt Publishing | Release: 2020