Dzięki książkom tu zawartym poznasz od podstaw kolejne fazy przeprowadzania testów bezpieczeństwa, począwszy od zbierania podstawowych informacji o środowisku celu. Dowiesz się, jak przełamywać zabezpieczenia urządzeń sieciowych, systemów i aplikacji oraz szacować, jakich szkód mógłby narobić złośliwy napastnik, któremu udałoby się dostać do tego miejsca.
Testy penetracyjne
Książki, ebooki, audiobooki, kursy video z kategorii: Testy penetracyjne dostępne w księgarni Helion
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Kali Linux i testy penetracyjne. Biblia
-
Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności
-
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
-
Testowanie w Angularze. Kurs video. Karma i Jasmine
-
Mroczne odmęty phishingu. Nie daj się złowić!
Niedostępna
-
Metasploit. Przewodnik po testach penetracyjnych
Czasowo niedostępna
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
Niedostępna
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
Niedostępna
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
Niedostępna
-
Metasploit. Receptury pentestera. Wydanie II
Niedostępna
-
Testy penetracyjne dla zaawansowanych. Hakowanie najlepiej zabezpieczonych sieci na świecie
Niedostępna
-
Black Hat Python. Język Python dla hakerów i pentesterów
Czasowo niedostępna
-
Skanowanie sieci z Kali Linux. Receptury
Czasowo niedostępna
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort
-
Kali Linux. Testy penetracyjne
Czasowo niedostępna
-
BackTrack 5. Testy penetracyjne sieci WiFi
Niedostępna
-
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
-
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests
-
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
-
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
Niedostępna
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
Czasowo niedostępna
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
Niedostępna