Items

Go to All Bundles

Item nameItem Type
Unauthorised Access: Physical Penetration Testing For IT Security Teamsebook
Advanced Penetration Testing: Hacking the World's Most Secure Networksebook
Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Editionebook
Applied Incident Responseebook
The Art of Deception: Controlling the Human Element of Securityebook
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceiversebook
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memoryebook
Cryptography Engineering: Design Principles and Practical Applicationsebook
Cybersecurity Blue Team Toolkitebook
How I Rob Banks: And Other Such Placesebook
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniquesebook
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidenceebook
The Language of Deception: Weaponizing Next Generation AIebook
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Codeebook
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscationebook
Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Editionebook
Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Editionebook
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Editionebook
Taming the Hacking Storm: A Framework for Defeating Hackers and Malwareebook
Threat Modeling: Designing for Securityebook
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the Worldebook
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Editionebook
Wireshark for Security Professionals: Using Wireshark and the Metasploit Frameworkebook
x86 Software Reverse-Engineering, Cracking, and Counter-Measuresebook