free tracker

Rtfm

Pub Date : 2014-02-11 | Author : Ben Clark | Publisher :

ISBN 10 : 1494295504
ISBN 13 : 9781494295509

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to s..


Blue Team Field Manual

Pub Date : 2017-01-13 | Author : Alan White | Publisher : Createspace Independent Publishing Platform

ISBN 10 : 154101636X
ISBN 13 : 9781541016361

Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Prote..


Red Team

Pub Date : 2015-11-03 | Author : Micah Zenko | Publisher : Basic Books

ISBN 10 : 9780465073955
ISBN 13 : 0465073956

An international security expert shows how competitive organizations can get—and stay—ahead by thinking like their adversaries..


Blue Team Handbook

Pub Date : 2014-08-03 | Author : Don Murdoch | Publisher : CreateSpace

ISBN 10 : 1500734756
ISBN 13 : 9781500734756

Updated, Expanded, and released to print on 10/5/14! Complete details below! Two new sections, five protocol header illustrations, improved formatting, and other corrections. The B..


Penetration Testing

Pub Date : 2014-06-14 | Author : Georgia Weidman | Publisher : No Starch Press

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..


Practical Reverse Engineering

Pub Date : 2014-02-03 | Author : Bruce Dang | Publisher : John Wiley & Sons

ISBN 10 : 9781118787397
ISBN 13 : 1118787390

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to t..


Violent Python

Pub Date : 2012-12-28 | Author : TJ O'Connor | Publisher : Newnes

ISBN 10 : 9781597499644
ISBN 13 : 1597499641

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tool..


Leave a Reply

Your email address will not be published. Required fields are marked *