free tracker

Blue Team Field Manual

Pub Date : 2017-01-13 | Author : Alan White | Publisher : Createspace Independent Publishing Platform

ISBN 10 : 154101636X
ISBN 13 : 9781541016361

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Prote..


Rtfm

Pub Date : 2014-02-11 | Author : Ben Clark | Publisher :

ISBN 10 : 1494295504
ISBN 13 : 9781494295509

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to s..


Blue Team Handbook

Pub Date : 2014-08-03 | Author : Don Murdoch | Publisher : CreateSpace

ISBN 10 : 1500734756
ISBN 13 : 9781500734756

Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections. The B..


Red Team

Pub Date : 2015-11-03 | Author : Micah Zenko | Publisher : Basic Books

ISBN 10 : 9780465073955
ISBN 13 : 0465073956

An international security expert shows how competitive organizations can get—and stay—ahead by thinking like their adversaries..


Defensive Security Handbook

Pub Date : 2017-04-03 | Author : Lee Brotherston | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781491960332
ISBN 13 : 1491960337

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information ..


Penetration Testing

Pub Date : 2014-06-14 | Author : Georgia Weidman | Publisher : No Starch Press

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..


Violent Python

Pub Date : 2012-12-28 | Author : TJ O'Connor | Publisher : Newnes

ISBN 10 : 9781597499644
ISBN 13 : 1597499641

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tool..


Leave a Reply

Your email address will not be published. Required fields are marked *