-
Applied Incident Response
Applied Incident Response
Cargando .... -
Intrusion Detection Honeypots
Detection through Deception
Cargando .... -
Cybersecurity Blue Team Toolkit
Cargando .... -
The Practice of Network Security Monitoring
Understanding Incident Detection and Response
Cargando .... -
Applied Network Security Monitoring
Collection, Detection, and Analysis
Cargando .... -
Blue Team Handbook: SOC, SIEM, and Threat Hunting
A Condensed Guide for the Security Operations Team and Threat Hunter
Cargando .... -
Practical Vulnerability Management
A Strategic Approach to Managing Cyber Risk
Cargando .... -
Blue Team Field Manual (BTFM)
(BTFM)
Cargando ....
-
Bulletproof SSL and TLS
Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Cargando .... -
Computational Number Theory and Modern Cryptography
Cargando .... -
Introduction to Modern Cryptography
Chapman & Hall/CRC Cryptography and Network Security Series
Cargando .... -
Serious Cryptography
A Practical Introduction to Modern Encryption
Cargando .... -
Cryptography Apocalypse
Preparing for the Day When Quantum Computing Breaks Today's Crypto
Cargando .... -
Cryptography Engineering
Design Principles and Practical Applications
Cargando ....
-
Pro SQL Server Internals
Cargando .... -
The Oracle Hacker's Handbook
Hacking and Defending Oracle
Cargando .... -
The Database Hacker's Handbook
Defending Database Servers
Cargando .... -
Microsoft SQL Server 2012 Internals
Dive deep inside the architecture of SQL Server 2012
Cargando ....
-
Writing Security Tools and Exploits
Cargando .... -
A Bug Hunter's Diary
A Guided Tour Through the Wilds of Software Security
Cargando .... -
Buffer Overflow Attacks
Detect, Exploit, Prevent
Cargando .... -
A Guide to Kernel Exploitation
Attacking the Core
Cargando .... -
Sockets, Shellcode, Porting, and Coding
Reverse Engineering Exploits and Tool Coding for Security Professionals
Cargando .... -
Hacking Second Edition
The Art of Exploitation
Cargando .... -
The Shellcoder's Handbook
Discovering and Exploiting Security Holes, 2nd Edition
Cargando ....
-
iOS Forensic Analysis
for iPhone, iPad, and iPod touch (Books for Professionals by Professionals)
Cargando .... -
Investigating Cryptocurrencies
Understanding, Extracting, and Analyzing Blockchain Evidence
Cargando .... -
File System Forensic Analysis
Cargando .... -
Real Digital Forensics
Computer Security and Incident Response
Cargando .... -
Forensic Discovery
Cargando .... -
Digital Forensics with Open Source Tools
Cargando .... -
The Art of Memory Forensics
Detecting Malware and Threats in Windows, Linux, and Mac Memory
Cargando .... -
Digital Forensics with Kali Linux
Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
Cargando .... -
Practical Forensic Imaging
Securing Digital Evidence with Linux Tools
Cargando ....
-
The Basics of Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Made Easy
Cargando .... -
Metasploit
The Penetration Tester's Guide
Cargando .... -
Advanced Penetration Testing AWS
Hacking AWS 2
Cargando .... -
Kali Linux Revealed
Mastering the Penetration Testing Distribution
Cargando .... -
Hacking Point of Sale
Payment Application Secrets, Threats, and Solutions
Cargando .... -
Penetration Testing
A Hands-On Introduction to Hacking
Cargando .... -
Game Hacking
Developing Autonomous Bots for Online Games
Cargando .... -
Hash Crack
Password Cracking Manual: 3
Cargando .... -
Gray Hat Hacking
The Ethical Hacker's Handbook, Fifth Edition
Cargando .... -
Advanced Penetration Testing
Hacking the World's Most Secure Networks
Cargando .... -
Pentesting Azure Applications
The Definitive Guide to Testing and Securing Deployments
Cargando .... -
Hacking redes WiFi
Tecnología, Auditorías y Fortificación
Cargando .... -
The Complete Metasploit Guide
Explore effective penetration testing techniques with Metasploit
Cargando .... -
Counter Hack Reloaded
A Step-by-Step Guide to Computer Attacks and Effective Defenses
Cargando .... -
The Hacker Playbook 3
Practical Guide To Penetration Testing
Cargando .... -
Rtfm
Red Team Field Manual
Cargando ....
-
Practical Industrial Internet of Things Security
Cargando .... -
The Hardware Hacking Handbook
Breaking Embedded Security with Hardware Attacks
Cargando .... -
The IoT Hacker's Handbook
A Practical Guide to Hacking the Internet of Things
Cargando .... -
The Hacker's Hardware Toolkit
The best collection of hardware gadgets for Red Team hackers, pentesters and security researchers
Cargando .... -
Hardware Security
A Hands-on Learning Approach
Cargando ....
-
Hacking Exposed Industrial Control Systems
ICS and SCADA Security Secrets & Solutions
Cargando .... -
Applied Cyber Security and the Smart Grid
Implementing Security Controls into the Modern Power Infrastructure
Cargando .... -
Cybersecurity for Industrial Control Systems
SCADA, DCS, PLC, HMI, and SIS
Cargando .... -
Countdown To Zero Day
Stuxnet and the Launch of the World's First Digital Weapon
Cargando .... -
Handbook of SCADA/Control Systems Security
Cargando .... -
Robust Control System Networks
How to Achieve Reliable Control After Stuxnet
Cargando .... -
Industrial Network Security
Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Cargando ....
-
Mastering IBM i
The Complete Resource for Today's IBM i System
Cargando .... -
Experts' Guide to Os/400 & i5/os security
Cargando .... -
Hacking iSeries by Shalom Carmel
Cargando .... -
Mainframe Basics for Security Professionals
Getting Started with RACF
Cargando .... -
Introduction to the New Mainframe
z/OS Basics by Mike Ebbers, John Kettner, Wayne O'Brien, Bill Ogden (2011)
Cargando ....
-
Malicious Cryptography
Exposing Cryptovirology
Cargando .... -
The Rootkit Arsenal 2ED
ESCAPE & EVASION IN DARK CORNERS OF WEB
Cargando .... -
Practical Malware Analysis
The Hands-On Guide to Dissecting Malicious Software
Cargando .... -
Malware Forensics
Investigating and Analyzing Malicious Code
Cargando .... -
Malware Analyst's Cookbook and DVD
Tools and Techniques for Fighting Malicious Code
Cargando .... -
Art of Computer Virus Research and Defense
Cargando ....
-
Decompiling Android
Cargando .... -
iOS Application Security
The Definitive Guide for Hackers and Developers
Cargando .... -
Android Security Internals
An In-Depth Guide to Android's Security Architecture
Cargando .... -
The Mobile Application Hacker's Handbook
Cargando .... -
iOS Hacker's Handbook
Cargando .... -
Android Hacker's Handbook
Cargando ....
-
Computer Networking
A Top-Down Approach
Cargando .... -
Linux Firewalls
Attack Detection and Response: Attack, Detection and Response with Iptables, Psad and Fwsnort
Cargando .... -
Mastering the Nmap Scripting Engine
Cargando .... -
Attacking Network Protocols
A Hacker's Guide to Capture, Analysis, and Exploitation
Cargando .... -
Wireshark for Security Professionals
Using Wireshark and the Metasploit Framework
Cargando .... -
Practical Packet Analysis, 3E
Using Wireshark to Solve Real-World Network Problems
Cargando .... -
Nmap Network Scanning
The Official Nmap Project Guide to Network Discovery and Security Scanning
Cargando ....
-
Operating Systems In Depth
Design and Programming
Cargando .... -
Operating System Concepts
Cargando .... -
Modern Operating Systems
International Edition
Cargando .... -
Operating Systems
Three Easy Pieces
Cargando .... -
Computer Organization and Design ARM Edition
The Hardware Software Interface
Cargando .... -
Concrete Mathematics
A Foundation for Computer Science
Cargando ....
-
Solaris Internals
Solaris 10 and OpenSolaris Kernel Architecture
Cargando .... -
The Linux Programming Interface
A Linux and UNIX System Programming Handbook
Cargando .... -
Linux Kernel Development
(Developer's Library)
Cargando .... -
Linux Basics For Hackers
Getting Started with Networking, Scripting, and Security in Kali
Cargando ....
-
Mac OS X and IOS Internals
To the Apple's Core (Wrox Programmer to Programmer)
Cargando .... -
OS X and iOS Kernel Programming
Cargando ....
-
What Makes It Page?
The Windows 7 (x64) Virtual Memory Manager
Cargando .... -
Windows 10 System Programming
Part 1
Cargando .... -
Secrets of PowerShell Remoting
Cargando .... -
Windows Forensic Analysis Toolkit
Advanced Analysis Techniques for Windows 8
Cargando .... -
Windows Forensic Analysis Toolkit
Advanced Analysis Techniques for Windows 7
Cargando .... -
Windows Internals, Part 2
User Mode: System architecture, processes, threads, memory management, and more
Cargando .... -
Windows Kernel Programming
Cargando .... -
Windows Internals, Part 1
User Mode: System architecture, processes, threads, memory management, and more
Cargando ....
-
The Complete Book of Locks and Locksmithing
Seventh Edition
Cargando .... -
The Car Hacker's Handbook
A Guide for the Penetration Tester
Cargando .... -
Keys to the Kingdom
Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Cargando .... -
Visual Guide to Lock Picking
Cargando .... -
Practical Lock Picking
A Physical Penetration Tester's Training Guide
Cargando ....
-
C Programming Language
Cargando .... -
Compilers
Principles, Techniques, and Tools
Cargando .... -
ATL Internals
Working with ATL 8
Cargando .... -
Gray Hat C
A Hacker's Guide to Creating and Automating Security Tools
Cargando .... -
Modern C
Cargando .... -
Cracking the Coding Interview
150 Programming Questions and Solutions
Cargando .... -
Violent Python
A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Cargando .... -
Hacker's Delight
Cargando .... -
Compiladores
Principios, Ténicas Y Herramientas
Cargando .... -
Surreptitious Software
Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection (Addison-Wesley Software Security)
Cargando .... -
Threat Modeling
Designing for Security
Cargando .... -
Gray Hat Python
Python Programming for Hackers and Reverse Engineers
Cargando .... -
Black Hat Python
2nd Edition: Python Programming for Hackers and Pentesters
Cargando .... -
The Algorithm Design Manual
Cargando .... -
Black Hat Go
Go Programming For Hackers and Pentesters
Cargando .... -
Python Scapy Dot11
Programación en Python para pentesters Wi-Fi
Cargando .... -
Assembly Language Step-by-Step Third Edition
Programming with Linux
Cargando ....
-
Rootkits and Bootkits
Reversing Modern Malware and Next Generation Threats
Cargando .... -
Hacker Disassembling Uncovered
Cargando .... -
The Ghidra Book
The Definitive Guide
Cargando .... -
Decompiling Java
Bytecodes and the Java Virtual Machine
Cargando .... -
Reversing
Secrets of Reverse Engineering
Cargando .... -
BIOS Disassembly Ninjutsu Uncovered
by Darmawan Salihun
Cargando .... -
Practical Reverse Engineering
x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Cargando .... -
The IDA Pro Book
The Unofficial Guide to the World's Most Popular Disassembler
Cargando .... -
Practical Binary Analysis
Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Cargando ....
-
Secrets and Lies
Digital Security in a Networked World
Cargando .... -
Security Engineering
A Guide to Building Dependable Distributed Systems
Cargando .... -
Foundations of Information Security
A Straightforward Introduction
Cargando .... -
Silence on the Wire
A Field Guide to Passive Reconnaissance and Indirect Attacks
Cargando ....
-
Advanced Persistent Threat Hacking
The Art and Science of Hacking Any Organization
Cargando .... -
The Art of Intrusion
The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Cargando .... -
Social Engineering
The Science of Human Hacking
Cargando .... -
Persuasion Skills Black Book
Practical NLP Language Patterns for Getting The Response You Want
Cargando .... -
The Art of Deception
Controlling the Human Element of Security
Cargando ....
-
Burp Suite Essentials
Cargando .... -
The Web Application Hacker's Handbook
Discovering and Exploiting Security Flaws
Cargando .... -
Introduccion Teorico-Practica a la Programacion Web
Cargando .... -
Web Security for Developers
Real Threats, Practical Defense
Cargando .... -
Real-World Bug Hunting
A Field Guide to Web Hacking
Cargando .... -
The Tangled Web
A Guide to Securing Modern Web Applications
Cargando .... -
The Browser Hacker's Handbook
Cargando ....
-
PTFM
Purple Team Field Manual
Cargando .... -
Operator Handbook
Red Team + OSINT + Blue Team Reference
Cargando ....