Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
-
GeoServer is an open-source server written in Java that allows users to share, process, and edit geospatial data. This book will guide you through the new features and improvements of GeoServer and will help you get started with it. GeoServer Beginner's Guide gives you a kick-start to build custom maps using your data without the need for costly co
- PDF + ePub + Mobi pkt
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
With ever-improving and ever-changing cyber threats, businesses need to be on their toes to ensure their safety. This comprehensive book takes you from understanding the basics of cyber security and industrial protocols to building robust industrial control systems. Through real-world scenarios, you will understand vulnerabilities and will be equip
- PDF + ePub + Mobi pkt
Industrial Cybersecurity. Efficiently secure critical infrastructure systems Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications.
- PDF + ePub + Mobi pkt
OAuth 2.0 Cookbook. Protect your web applications using Spring Security OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book will be packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) as per your requirements and move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Odoo is a Python-based ERP system and is completely open source. Odoo is a comprehensive suite of business applications offering a wealth of functionalities that can be deployed to meet your business needs.
- PDF + ePub + Mobi pkt
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Learn about design patterns and best practices required with the Spring Framework to solve common problems when designing an application or system. This book not only covers the essential GoF design patterns but also those patterns, considerations, and best practices required at different stages in Application Development. It will demonstrate the R
- PDF + ePub + Mobi pkt
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed for the present while keeping the future in mind. This book talks about how to design and implement enterprise ne
- PDF + ePub + Mobi pkt
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
In Understanding Software, Max Kanat-Alexander, Technical Lead for Code Health at Google, brings you his writings and thoughts so that your code and your life as a developer can be healthy, avoid complexity, and embrace simplicity. Why make life hard when making software can be simple?
- PDF + ePub + Mobi pkt
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
With rapid adaptation of the cloud platform, the need for cloud certification has also increased. This is your one stop solution and will help you transform yourself from zero to certified. This guide will help you gain technical expertise in the AWS platform and help you start working with various AWS Services.
- PDF + ePub + Mobi pkt
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
The Junos automation toolkit is part of the standard Junos OS available on all switches, routers, and security devices running Junos OS. Junos automation simplifies complex configurations and reduces potential configuration errors.This book is a set of powerful recipes that will cover all you need to know about implementing Junos Automation to auto
- PDF + ePub + Mobi pkt
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Go is a modern systems programming language, which allows the creation of systems applications and modules just above any kernel, e.g. Linux, and container, e.g. Docker. This book explains thread-safe and concurrent Go, and goes into writing server, cloud and systems-level applications. No more C style memory management, for instance. If you want t
- PDF + ePub + Mobi pkt
Go Systems Programming. Master Linux and Unix system level programming with Go Go Systems Programming. Master Linux and Unix system level programming with Go
-
Technology plays an increasingly large role in our daily life and shows no signs of stopping. Now, more than ever, it is paramount that an investigator develops programming expertise to deal with increasingly large datasets. By leveraging the Python recipes explored throughout this book, we make the complex simple, quickly extracting relevant infor
- PDF + ePub + Mobi pkt
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need fo
- PDF + ePub + Mobi pkt
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Microsoft’s launch of Windows 10 is a step toward satisfying the enterprise administrator’s needs for management and user experience customization. This book provides the enterprise administrator with the knowledge needed to fully utilize the advanced feature set of Windows 10 Enterprise.
- PDF + ePub + Mobi pkt
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
C++ has come a long way and has now been adopted in several contexts. Its key strengths are its software infrastructure and resource-constrained applications. The C++ 17 release will change the way developers write code and this book will help you master your developing skills with C++.
- PDF + ePub + Mobi pkt
Mastering C++ Programming. Modern C++ 17 at your fingertips Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Imagine creating and testing Java EE applications on Apache Tomcat Server or Wildfly Application Server in minutes along with deploying and managing Java applications swiftly. Sounds too good to be true? But you have a reason to cheer as such scenarios are only possible by leveraging Docker and Kubernetes.
- PDF + ePub + Mobi pkt
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Everything humans interact with has an experience associated with it. Some are good, some are bad, but only recently have we begun to consciously design these experiences. We are now at a point in time when experience-design has suddenly exploded into the consciousness of business people and ordinary people all over the world. This book addressees
- PDF + ePub + Mobi pkt
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Serverless architecture allows you to build and run applications and services without having to manage the infrastructure. Many companies have started adopting serverless architecture for their applications to save costs and improve scalability. This book will give you all the information you need to set up and deploy applications to Azure Serverle
- PDF + ePub + Mobi pkt
Serverless computing in Azure with .NET. Build, test, and automate deployment Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. Whether talking about digital forensics conducted by law enforcement or a corporate security department, the simple fact is that forens
- PDF + ePub + Mobi pkt
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Got some experience of Angular under your belt? Want to learn everything about using advanced features for developing websites? This book is everything you need for the deep understanding of Angular that will set you apart from the developer crowd.Angular has introduced a new way to build applications. Creating complex and rich web applications, wi
- PDF + ePub + Mobi pkt
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula
-
This book is an all-purpose toolkit for your programming career. It is split up into three main topic areas: Coder Skills, Freelancer Skills, and Career Skills to help you identify and answer the key questions and stumbling blocks that programmers encounter. It is a comprehensive guide containing more than 50 insights and methodologies that you can
- PDF + ePub + Mobi pkt
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Java is a powerful language that has applications in a wide variety of fields. Right from playing games on your computer to performing banking transactions, Java is at the heart of everything. With this book, you will get a deep understanding of this robust programming language and how it can make your life easier. This collection of projects will
- PDF + ePub + Mobi pkt
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Metasploit for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. This book would help the reader absorb the essential concepts on using Metasploit framework for comprehensive penetration testing. By the end of the book, the reader would feel confident
- PDF + ePub + Mobi pkt
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
JMeter is a Java application designed to load and test performance for a web application. JMeter extends to improve the functioning of various other static and dynamic resources. This book is a great starting point to learn about JMeter. It covers the new features introduced with JMeter 3 and enables you to dive deep into the new techniques neede
- PDF + ePub + Mobi pkt
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Over the past years, all kind of companies from start-ups to giant enterprises started their move to public cloud providers in order to save their costs and reduce the operation effort needed to keep their shops open. Now it is even possible to craft a complex software system consisting of many independent micro-functions that will run only when th
- PDF + ePub + Mobi pkt
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Mastering Kali Linux for Advanced Penetration Testing will provide you with a number or proven techniques to defeat the latest defences on the networks using Kali Linux. From selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Kali Linux 2016.2 is the next generation of Back Track 5, which is one of the best open-source penetration tool kits. Mastering Kali Linux for Web Penetration Testing will assist you in responsibly exposing identifying, and disclosing weaknesses and flaws in web applications at all stages of development.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Spring 5.0 is due to arrive with a myriad of new and exciting features that will change the way we’ve used the framework so far. This book will show you this evolution—from solving the problems of testable applications to building distributed applications on the Cloud.
- PDF + ePub + Mobi pkt
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.
- PDF + ePub + Mobi pkt
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Domain-Driven Design has arrived in the PHP community, but for every developer who has to implement it, little in terms of examples and guidance is available. Assuming you have an existing PHP project to deal with, this book enables you to take advantage of the DDD approach by following its practical stages to completion and learning the concepts
- PDF + ePub + Mobi pkt
Domain-Driven Design in PHP. A Highly Practical Guide Domain-Driven Design in PHP. A Highly Practical Guide
-
DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and the IT operations team. The main goal of DevOps is to automate the software development process with proper processes that involve people to change the culture. This book will follow a bootcamp approach, which will
- PDF + ePub + Mobi pkt
-
Akka is an open source toolkit that simplifies the construction of distributed and concurrent applications on the JVM. This book will teach you how to develop reactive applications in Scala using the Akka framework.
- PDF + ePub + Mobi pkt
Akka Cookbook. Recipes for concurrent, fast, and reactive applications Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
With the ever-increasing amount of data flowing in today’s world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2
- PDF + ePub + Mobi pkt
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
This is the second edition of ‘Nmap 6: Network Exploration and Security Auditing Cookbook’. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security audit
- PDF + ePub + Mobi pkt
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Do you want to create better products and innovative solutions? User experience maps will help you understand users, gain strategic insights, and improve communication with stakeholders. Maps can also champion user-centricity within the organizationTwo advanced mapping techniques will be revealed for the first time in print, the behavioural change
- PDF + ePub + Mobi pkt
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Metasploit Bootcamp will enable readers to gain hands-on knowledge on Penetration testing with Metasploit in various environments using a boot camp style approach. The readers will learn about Scanning, fingerprinting and exploiting different software. They will also learn about testing on services like Databases, VOIP and other known and unknown s
- PDF + ePub + Mobi pkt
Metasploit Bootcamp. The fastest way to learn Metasploit Metasploit Bootcamp. The fastest way to learn Metasploit
-
Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, takes you deeper into one of the major subjects of his international best seller, The DevOps 2.0 Toolkit, and shows you how to successfully integrate Docker Swarm into your DevOps toolset.
- PDF + ePub + Mobi pkt
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.
- PDF + ePub + Mobi pkt
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
This book will walk you through all the concepts and tools that Microsoft Azure has to offer and how these can be used in the DevOps environment. You will be introduced to use and management of Visual Studio Team Services (VSTS), so that you can understand the structure of the application that we will use as a sample throughout the book. You will u
- PDF + ePub + Mobi pkt
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Software architecture or creating a blueprint design for a particular software application is not a walk in the park. The two biggest challenges in software architecture are keeping architecture in sync, first, with the requirements as they are uncovered or evolve and, next, with the implementation as it gets built and evolves.
- PDF + ePub + Mobi pkt
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Microsoft .NET has always been the preferred framework for developing Enterprise applications that target the Windows platform. However, the release of .NET Core empowers senior developers and enterprise architects to think out of the box, and use .NET Core to design and develop robust applications that target multiple platforms.
- PDF + ePub + Mobi pkt
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo
- PDF + ePub + Mobi pkt
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Walmart’s OneOps is an open source DevOps platform that is used for cloud and application lifecycle management. It can manage critical and complex application workload on any multi cloud-based infrastructure and revolutionizes the way administrators, developers, and engineers develop and launch new products.
- PDF + ePub + Mobi pkt
-
In this short book, we take an in-depth look at lambdas in Java and their supporting features. It covers essential topics, such as functional interfaces and type inference, and the key differences between lambdas and closures.
- PDF + ePub + Mobi pkt
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
Software testing is a crucial aspect of any development process if one wants to build a high-quality product. With the increase in app usage, the need for testing has only grown leaps and bounds.
- PDF + ePub + Mobi pkt
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. Mastering Blockchain is a comprehensive guide to this leading, cutting-edge technology and its implementation in the real world.
- PDF + ePub + Mobi pkt
Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks
-
- PDF + ePub + Mobi pkt
-
QGIS is a desktop geographic information system that facilitates data viewing, editing, and analysis. Based on version QGIS 2.18, this book will teach you how to write Python code that works with spatial data to automate geoprocessing tasks in QGIS.
- PDF + ePub + Mobi pkt
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
- PDF + ePub + Mobi pkt
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
- PDF + ePub + Mobi pkt
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
- PDF + ePub + Mobi pkt
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights .NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
- PDF + ePub + Mobi pkt
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
- PDF + ePub + Mobi pkt
Penetration Testing: A Survival Guide. A Survival Guide Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran
-
- PDF + ePub + Mobi pkt
Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition
-
The second edition of Penetration Testing with Raspberry Pi will show you how to use Raspberry Pi 3 to develop a portable, cost-efficient hacking tool with Kali Linux 2. You’ll be able to get hands-on with pentesting and explore a variety of essential techniques.
- PDF + ePub + Mobi pkt
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
- PDF + ePub + Mobi pkt
Docker Networking Cookbook. Click here to enter text Docker Networking Cookbook. Click here to enter text
-
- PDF + ePub + Mobi pkt
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
- PDF + ePub + Mobi pkt
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
Christopher Duffy, Mohit Raj, Cameron Buchanan, Andrew Mabbitt, Terry Ip, Dave Mound, Benjamin May
-
- PDF + ePub + Mobi pkt
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
This book gets you up and running with mobile forensics, covering everything from how to effectively deal with digital evidence to mobile acquisition tools and techniques. You’ll also gain insights into the various challenges faced while performing mobile forensics.
- PDF + ePub + Mobi pkt
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
- PDF + ePub + Mobi pkt
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
Ashwin Pajankar, Richard Grimmett, Matthew Poole, Arush Kakkar
-
This updated edition focuses on the use of Kali Linux 2, aka Sana, and provides you with the skills needed to conduct penetration testing effectively. You’ll find out how to install Kali Linux and then use it for pentesting with the help of cutting-edge wireless penetration tools, enabling you to test your corporate network against threats.
- PDF + ePub + Mobi pkt
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
- PDF + ePub + Mobi pkt
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
- PDF + ePub + Mobi pkt
-
- PDF + ePub + Mobi pkt
CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition
-
- PDF + ePub + Mobi pkt
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
- PDF + ePub + Mobi pkt
Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
-
Do you want to understand how to defend your organization and prevent vulnerabilities in your IoT ecosystem? The Practical Internet of Things Security book will show you how to do this effectively with the help of detailed explanations, examples, and expert tips.
- PDF + ePub + Mobi pkt
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Are you interested in digital forensics? Practical Windows Forensics takes a step-by-step approach to helping you understand how to perform forensic analysis on Windows-based systems. You’ll explore expert tips, techniques, and more in this hands-on guide.
- PDF + ePub + Mobi pkt
Practical Windows Forensics. Leverage the power of digital forensics for Windows systems Practical Windows Forensics. Leverage the power of digital forensics for Windows systems
-
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.
- PDF + ePub + Mobi pkt
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
- PDF + ePub + Mobi pkt
Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks
-
- PDF + ePub + Mobi pkt
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
- PDF + ePub + Mobi pkt
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
-
- PDF + ePub + Mobi pkt
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide! Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
- PDF + ePub + Mobi pkt
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
- PDF + ePub + Mobi pkt
Practical Linux Security Cookbook. Click here to enter text Practical Linux Security Cookbook. Click here to enter text
-
- PDF + ePub + Mobi pkt
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337 Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
- PDF + ePub + Mobi pkt
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
- PDF + ePub + Mobi pkt
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
- PDF + ePub + Mobi pkt
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
- PDF + ePub + Mobi pkt
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
- PDF + ePub + Mobi pkt
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
- PDF + ePub + Mobi pkt
Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board
-
- PDF + ePub + Mobi pkt
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
- PDF + ePub + Mobi pkt
Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis
-
- PDF + ePub + Mobi pkt
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
- PDF + ePub + Mobi pkt
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0 Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
- PDF + ePub + Mobi pkt
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
- PDF + ePub + Mobi pkt
Mastering Python Forensics. Master the art of digital forensics and analysis with Python Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
- PDF + ePub + Mobi pkt
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
- PDF + ePub + Mobi pkt
Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests
-
- PDF + ePub + Mobi pkt
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
- PDF + ePub + Mobi pkt
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
- PDF + ePub + Mobi pkt
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
- PDF + ePub + Mobi pkt
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
- PDF + ePub + Mobi pkt
Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance
-
- PDF + ePub + Mobi pkt
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
Benjamin May, Cameron Buchanan, Andrew Mabbitt, Dave Mound, Terry Ip
-
- PDF + ePub + Mobi pkt
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
- PDF + ePub + Mobi pkt
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
- PDF + ePub + Mobi pkt
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
- PDF + ePub + Mobi pkt
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
- PDF + ePub + Mobi pkt
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
- PDF + ePub + Mobi pkt
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
- PDF + Mobi pkt
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
- PDF + ePub + Mobi pkt
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
-
- PDF + ePub + Mobi pkt
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
- PDF + ePub + Mobi pkt
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
- PDF + ePub + Mobi pkt
JavaScript Security. Learn JavaScript security to make your web applications more secure JavaScript Security. Learn JavaScript security to make your web applications more secure
-
- PDF + ePub + Mobi pkt
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
- PDF + ePub + Mobi pkt
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
- PDF + ePub + Mobi pkt
Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning
-
- PDF + ePub + Mobi pkt
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual
-
- PDF + ePub + Mobi pkt
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
- PDF + ePub + Mobi pkt
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
- PDF + ePub + Mobi pkt
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools