صورة الكتاب | اسم الكتاب | رابط التحميل | رابط موقع أمازون |
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation | |||
Black Hat Go: Go Programming For Hackers and Pentesters | |||
Foundations of Information Security: A Straightforward Introduction | |||
Hacking the Xbox: An Introduction to Reverse Engineering | |||
Hacking: The Art of Exploitation, 2nd Edition | |||
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali | |||
Malware Data Science: Attack Detection and Attribution | |||
Metasploit: The Penetration Tester's Guide | |||
Penetration Testing: A Hands-On Introduction to Hacking | |||
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly. | |||
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software | |||
Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems | |||
Real-World Bug Hunting: A Field Guide to Web Hacking | |||
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats | |||
Serious Cryptography: A Practical Introduction to Modern Encryption | |||
The Car Hacker's Handbook: A Guide for the Penetration Tester | |||
The Hardware Hacker: Adventures in Making and Breaking Hardware | |||
The Linux Command Line, 2nd Edition: A Complete Introduction | |||
Web Security for Developers: Real Threats, Practical Defense | |||
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters | |||
Black Hat GraphQL: Attacking Next Generation APIs | |||
Hacking APIs: Breaking Web Application Programming Interfaces |