Explore: Penetration Testing (computer Security)
Discover books, insights, and more — all in one place.
Learn more about Penetration Testing (computer Security) with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “penetration-testing-%28computer-security%29”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Gray Hat Hacking
The Ethical Hacker's Handbook
By Shon Harris, Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle and Jonathan Ness

“Gray Hat Hacking” Metadata:
- Title: Gray Hat Hacking
- Authors: ➤ Shon HarrisAllen HarperDaniel RegaladoRyan LinnStephen SimsBranko SpasojevicLinda MartinezMichael BaucomChris EagleJonathan Ness
- Language: English
- Number of Pages: Median: 595
- Publisher: ➤ McGraw Hill - McGraw-Hill Osborne Media - McGraw-Hill/Osborne - McGraw-Hill - McGraw-Hill Education
- Publish Date: ➤ 2004 - 2005 - 2008 - 2011 - 2015 - 2018 - 2022
- Publish Location: New York
“Gray Hat Hacking” Subjects and Themes:
- Subjects: ➤ Computer hackers - Computer security - Hackers - Computer crimes - Networking - Internet - Security - COMPUTERS - General - Penetration testing (Computer security) - Handbooks, manuals - Hacking - Engineering & Applied Sciences - Computer Science - Computing & information technology - Computer networking & communications - Ethical & social aspects of IT - Computer fraud & hacking - Network security - Computers and IT
Edition Identifiers:
- The Open Library ID: ➤ OL36144432M - OL26837931M - OL26833180M - OL23906038M - OL25016642M - OL3440123M - OL9257247M - OL7302570M
- Online Computer Library Center (OCLC) ID: 748265658 - 659756242 - 182552993 - 57688548
- Library of Congress Control Number (LCCN): 2005299894 - 2007047838 - 2010053295
- All ISBNs: ➤ 9780071495684 - 9781264268948 - 0071742557 - 9780071832380 - 0072257091 - 0071832386 - 0071495681 - 1264268947 - 9780072257090 - 9780071742559 - 9781260108415 - 1260108414
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Gray Hat Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2The hacker playbook 2
By Peter Kim

“The hacker playbook 2” Metadata:
- Title: The hacker playbook 2
- Author: Peter Kim
- Language: English
- Number of Pages: Median: 339
- Publisher: ➤ CreateSpace Independent Publishing Platform
- Publish Date: 2015
“The hacker playbook 2” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Hackers - Computer networks - Testing - Handbooks, manuals - Computer crimes - Computer programming - Security measures - Prevention - Computer software
Edition Identifiers:
- The Open Library ID: OL27196545M
- Online Computer Library Center (OCLC) ID: 919615727
- All ISBNs: 9781512214567 - 1512214566
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The hacker playbook 2 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3CEH
By Matthew Walker

“CEH” Metadata:
- Title: CEH
- Author: Matthew Walker
- Language: English
- Publisher: McGraw-Hill
- Publish Date: 2012
- Publish Location: New York
“CEH” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Examinations - Certification - Computer networks - Computer hackers - Computer security - Study guides - Electronic data processing personnel - Electronic data processing personnel, certification - Hackers
Edition Identifiers:
- The Open Library ID: OL25060894M
- Online Computer Library Center (OCLC) ID: 801817746
- Library of Congress Control Number (LCCN): 2011035418
- All ISBNs: 9780071772297 - 0071772294
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find CEH at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4White and Black Hat Hackers
By Jason Porterfield

“White and Black Hat Hackers” Metadata:
- Title: White and Black Hat Hackers
- Author: Jason Porterfield
- Number of Pages: Median: 64
- Publisher: Rosen Young Adult
- Publish Date: 2017
“White and Black Hat Hackers” Subjects and Themes:
- Subjects: ➤ Computer crimes - Crime prevention, juvenile literature - Penetration testing (Computer security) - Juvenile literature - Hacking - Computer security - Prevention
Edition Identifiers:
- The Open Library ID: OL35257183M
- Library of Congress Control Number (LCCN): 2016017849
- All ISBNs: 1508173141 - 9781508173144
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find White and Black Hat Hackers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Basic security testing with Kali Linux
By Daniel W. Dieterle

“Basic security testing with Kali Linux” Metadata:
- Title: ➤ Basic security testing with Kali Linux
- Author: Daniel W. Dieterle
- Language: English
- Number of Pages: Median: 299
- Publisher: [publisher not identified]
- Publish Date: 2013
- Publish Location: ➤ [Place of publication not identified]
“Basic security testing with Kali Linux” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer networks - Security measures - Kali Linux
Edition Identifiers:
- The Open Library ID: OL32769784M
- Online Computer Library Center (OCLC) ID: 878564036
- All ISBNs: 1494861275 - 9781494861278
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Basic security testing with Kali Linux at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6CEH Certified Ethical Hacker practice exams
By Matthew Walker

“CEH Certified Ethical Hacker practice exams” Metadata:
- Title: ➤ CEH Certified Ethical Hacker practice exams
- Author: Matthew Walker
- Language: English
- Publisher: McGraw-Hill Education
- Publish Date: 2014
- Publish Location: New York
“CEH Certified Ethical Hacker practice exams” Subjects and Themes:
- Subjects: ➤ Electronic data processing personnel - Certification - Computer security - Study guides - Examinations - Penetration testing (Computer security) - Hackers - Computer networks
Edition Identifiers:
- The Open Library ID: OL33020399M
- Online Computer Library Center (OCLC) ID: 894514714
- All ISBNs: 9780071838733 - 0071838724 - 9780071838726 - 0071838732
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find CEH Certified Ethical Hacker practice exams at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Ethical hacker
By Virginia Loh-Hagan

“Ethical hacker” Metadata:
- Title: Ethical hacker
- Author: Virginia Loh-Hagan
- Language: English
- Number of Pages: Median: 32
- Publisher: Cherry Lake Publishing
- Publish Date: 2016
- Publish Location: Ann Arbor, Michigan
“Ethical hacker” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer crimes - Juvenile literature - Computer networks - Security measures - Prevention - Crime, juvenile literature
Edition Identifiers:
- The Open Library ID: OL30392974M
- Library of Congress Control Number (LCCN): 2015008957
- All ISBNs: ➤ 9781634700245 - 1634700511 - 1634701054 - 1634700783 - 1634700244 - 9781634701051 - 9781634700511 - 9781634700788
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Ethical hacker at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8CEH Certified Ethical Hacker Practice Exams, Third Edition
By Matt Walker

“CEH Certified Ethical Hacker Practice Exams, Third Edition” Metadata:
- Title: ➤ CEH Certified Ethical Hacker Practice Exams, Third Edition
- Author: Matt Walker
- Language: English
- Number of Pages: Median: 352
- Publisher: McGraw-Hill Education
- Publish Date: 2016
“CEH Certified Ethical Hacker Practice Exams, Third Edition” Subjects and Themes:
- Subjects: ➤ Hackers - Electronic data processing personnel, certification - Computer security - Examinations, questions - Penetration testing (Computer security) - Examinations - Computer networks - Electronic data processing personnel - Certification
Edition Identifiers:
- The Open Library ID: OL28609151M
- Library of Congress Control Number (LCCN): 2016047136
- All ISBNs: 9781259836602 - 1259836606
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find CEH Certified Ethical Hacker Practice Exams, Third Edition at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Penetration Testing: A Hands-On Introduction to Hacking
By Georgia Weidman

“Penetration Testing: A Hands-On Introduction to Hacking” Metadata:
- Title: ➤ Penetration Testing: A Hands-On Introduction to Hacking
- Author: Georgia Weidman
- Number of Pages: Median: 528
- Publisher: No Starch Press
- Publish Date: 2014
“Penetration Testing: A Hands-On Introduction to Hacking” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Kali Linux - Hackers - Computer security - COMPUTERS / Internet / Security - COMPUTERS / Networking / Security - COMPUTERS / Security / General - Penetration testing (computer security) - Computers / internet / security - Computers / networking / security - Computers / security / general
Edition Identifiers:
- The Open Library ID: OL26838292M
- Online Computer Library Center (OCLC) ID: 881503059
- Library of Congress Control Number (LCCN): 2014001066
- All ISBNs: 9781593275648 - 1593275641
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Penetration Testing: A Hands-On Introduction to Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10The basics of hacking and penetration testing
By Pat Engebretson

“The basics of hacking and penetration testing” Metadata:
- Title: ➤ The basics of hacking and penetration testing
- Author: Pat Engebretson
- Language: English
- Number of Pages: Median: 159
- Publisher: Syngress
- Publish Date: 2011
- Publish Location: Waltham, MA
“The basics of hacking and penetration testing” Subjects and Themes:
- Subjects: ➤ Computer hackers - Computer crimes - Computer security - Testing - Prevention - Computer software - Penetration testing (Computer security) - Hackers - Information technology - Management information systems - Professional, career & trade -> computer science -> information technology - Professional, career & trade -> computer science -> management information systems
Edition Identifiers:
- The Open Library ID: OL25066679M
- Online Computer Library Center (OCLC) ID: 731372835 - 761699155
- Library of Congress Control Number (LCCN): 2011018388
- All ISBNs: 9781597496551 - 1597496553
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The basics of hacking and penetration testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11The hacker playbook
By Peter Kim

“The hacker playbook” Metadata:
- Title: The hacker playbook
- Author: Peter Kim
- Language: English
- Number of Pages: Median: 276
- Publisher: Secure Planet, LLC
- Publish Date: 2014
- Publish Location: ➤ North Charleston, South Carolina
“The hacker playbook” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Hackers - Computer networks - Testing - Handbooks, manuals - Computer crimes - Computer programming - Computer security - Security measures - Prevention - Computer software
Edition Identifiers:
- The Open Library ID: OL27162589M
- Online Computer Library Center (OCLC) ID: 879289065
- Library of Congress Control Number (LCCN): 2014900431
- All ISBNs: 9781494932633 - 1494932636
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The hacker playbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses - Computer networks, security measures - Open source software
Edition Identifiers:
- The Open Library ID: OL24896075M
- Online Computer Library Center (OCLC) ID: 754641929
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Basics of Hacking and Penetration Testing
By Patrick Engebretson

“Basics of Hacking and Penetration Testing” Metadata:
- Title: ➤ Basics of Hacking and Penetration Testing
- Author: Patrick Engebretson
- Language: English
- Number of Pages: Median: 225
- Publisher: ➤ Elsevier Science & Technology Books
- Publish Date: 2011 - 2013
“Basics of Hacking and Penetration Testing” Subjects and Themes:
- Subjects: ➤ Computer security - Hackers - Computer software - Computer crimes - Penetration testing (Computer security) - Testing - Prevention - Information technology - Professional, career & trade -> computer science -> information technology - Computer hackers
Edition Identifiers:
- The Open Library ID: OL35770083M - OL34606571M - OL28509953M
- Online Computer Library Center (OCLC) ID: 857791812
- Library of Congress Control Number (LCCN): 2013017241
- All ISBNs: ➤ 1597496561 - 0124116418 - 9780124116412 - 9780124116443 - 9781597496568 - 0124116442
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Basics of Hacking and Penetration Testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Ethical Hacking and Penetration Testing Guide
By Rafay Baloch

“Ethical Hacking and Penetration Testing Guide” Metadata:
- Title: ➤ Ethical Hacking and Penetration Testing Guide
- Author: Rafay Baloch
- Language: English
- Number of Pages: Median: 531
- Publisher: ➤ CRC Press, Taylor & Francis Group - Routledge - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2014 - 2017
“Ethical Hacking and Penetration Testing Guide” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - COMPUTERS / Security / General - COMPUTERS / Networking / General - LAW / Forensic Science - Computer security - Computer networks - Security measures - Tests d'intrusion - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Security - General - Networking - LAW - Forensic Science - Penetration testing (computer security) - Computers / security / general - Computers / networking / general - Law / forensic science
Edition Identifiers:
- The Open Library ID: ➤ OL26838148M - OL37959692M - OL37980186M - OL37984263M - OL37971507M - OL33574903M - OL33517337M
- Online Computer Library Center (OCLC) ID: 868641489 - 1011595255
- Library of Congress Control Number (LCCN): 2014006695
- All ISBNs: ➤ 1351381334 - 9781315145891 - 1138436828 - 1322638594 - 9781351381345 - 1351381342 - 9781138436824 - 9781351381338 - 148223162X - 9781482231618 - 9781322638591 - 9781482231625 - 1315145898 - 1482231611
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Ethical Hacking and Penetration Testing Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses
Edition Identifiers:
- The Open Library ID: OL24906341M
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Hacking
By Josh Thomsons
“Hacking” Metadata:
- Title: Hacking
- Author: Josh Thomsons
- Language: English
- Number of Pages: Median: 109
- Publisher: ➤ CreateSpace Independent Publishing Platform
- Publish Date: 2017
“Hacking” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer security - Hackers - Computer networks - Hacking - Security measures
Edition Identifiers:
- The Open Library ID: OL26928615M
- Online Computer Library Center (OCLC) ID: 1006670673
- All ISBNs: 9781546548935 - 1546548939
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17The Ethical Hack
By James S. Tiller

“The Ethical Hack” Metadata:
- Title: The Ethical Hack
- Author: James S. Tiller
- Language: English
- Number of Pages: Median: 322
- Publisher: ➤ Taylor and Francis - Taylor & Francis Group - Auerbach Publishers, Incorporated - AUERBACH
- Publish Date: 2004 - 2005 - 2019
- Publish Location: London
“The Ethical Hack” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Penetration testing (Computer security) - Computer hackers - Computer networks - Testing - Security measures - Business enterprises - Hackers - Computer networks, security measures - Business enterprises, computer networks - Réseaux d'ordinateurs - Sécurité - Mesures - Pirates informatiques - Entreprises - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL33461822M - OL54207446M - OL8259205M - OL37979189M - OL34724651M - OL37980819M - OL24246119M - OL34664878M
- Online Computer Library Center (OCLC) ID: 61362977
- Library of Congress Control Number (LCCN): 2003052467
- All ISBNs: ➤ 9780429209550 - 1135502439 - 1135502471 - 9781102154655 - 9780849316098 - 084931609X - 042920955X - 9781135502430 - 9780367393816 - 1102154652 - 9781135502478 - 9781280157707 - 9780203495414 - 0367393816 - 1280157704 - 0203495411
First Setence:
"Hiring someone to hack your company goes by many names, such as ethical hacking, penetration testing, tiger teaming, intrusion testing, vulnerability analysis, and even security assessment."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Ethical Hack at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Hands-on ethical hacking and network defense
By Michael T. Simpson

“Hands-on ethical hacking and network defense” Metadata:
- Title: ➤ Hands-on ethical hacking and network defense
- Author: Michael T. Simpson
- Language: English
- Number of Pages: Median: 450
- Publisher: ➤ Course Technology - Stacy L. Hiquet
- Publish Date: 2013
- Publish Location: Boston, MA
“Hands-on ethical hacking and network defense” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer networks - Computer hackers - Security measures - Computer security - Hackers - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL25902144M - OL25407698M
- Online Computer Library Center (OCLC) ID: 810454466 - 793166956
- Library of Congress Control Number (LCCN): 2012930937
- All ISBNs: 9781133935612 - 1133935613
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Hands-on ethical hacking and network defense at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Mastering Kali Linux for Advanced Penetration Testing
By Robert W. Beggs

“Mastering Kali Linux for Advanced Penetration Testing” Metadata:
- Title: ➤ Mastering Kali Linux for Advanced Penetration Testing
- Author: Robert W. Beggs
- Language: English
- Number of Pages: Median: 325
- Publisher: ➤ Packt Publishing - ebooks Account - Packt Publishing, Limited
- Publish Date: 2014
“Mastering Kali Linux for Advanced Penetration Testing” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Internet - Computer networks - Security - COMPUTERS - Security measures - General
Edition Identifiers:
- The Open Library ID: OL26838074M - OL39584341M
- Online Computer Library Center (OCLC) ID: 883661832
- All ISBNs: 9781782163138 - 1782163131 - 1782163123 - 9781782163121
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering Kali Linux for Advanced Penetration Testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Basics of Web Hacking
By Josh Pauli

“Basics of Web Hacking” Metadata:
- Title: Basics of Web Hacking
- Author: Josh Pauli
- Language: English
- Number of Pages: Median: 160
- Publisher: ➤ Syngress - Elsevier Science & Technology Books
- Publish Date: 2013
“Basics of Web Hacking” Subjects and Themes:
- Subjects: ➤ Web sites - Computer networks, security measures - Computer security - Hackers - Computer crimes - Application software - Security measures - Web applications - Computer networks - Penetration testing (Computer security) - Prevention - Computer hackers
Edition Identifiers:
- The Open Library ID: OL34602847M - OL28511782M
- Online Computer Library Center (OCLC) ID: 858036837
- Library of Congress Control Number (LCCN): 2013017240
- All ISBNs: 9780124166004 - 0124166008 - 0124166598 - 9780124166592
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Basics of Web Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Unauthorised access
By Wil Allsopp

“Unauthorised access” Metadata:
- Title: Unauthorised access
- Author: Wil Allsopp
- Language: English
- Number of Pages: Median: 302
- Publisher: ➤ Wiley - Wiley & Sons, Incorporated, John
- Publish Date: 2009 - 2010
- Publish Location: Chichester, West Sussex, U.K
“Unauthorised access” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Reliability - Computer security - Computer networks - Testing - Security measures - Computer software - Computer networks, security measures - Computer security--testing - Computer networks--security measures - Qa76.9.a25 a456 2009
Edition Identifiers:
- The Open Library ID: OL39885705M - OL29038182M - OL29036182M - OL28998199M - OL25100804M
- Online Computer Library Center (OCLC) ID: 608489637 - 419866397
- Library of Congress Control Number (LCCN): 2010487083
- All ISBNs: ➤ 0470970022 - 9780470970010 - 0470682728 - 0470747617 - 9781282354876 - 0470970014 - 9780470682722 - 9780470747612 - 1282354876 - 9780470970027
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Unauthorised access at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Beginning Ethical Hacking with Python
By Sanjib Sinha

“Beginning Ethical Hacking with Python” Metadata:
- Title: ➤ Beginning Ethical Hacking with Python
- Author: Sanjib Sinha
- Language: English
- Number of Pages: Median: 201
- Publisher: Apress, Incorporated - Apress
- Publish Date: 2016 - 2017
“Beginning Ethical Hacking with Python” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Python (Computer program language) - Computer security - Computer programmers - Hacking - Professional ethics - Python (computer program language)
Edition Identifiers:
- The Open Library ID: OL26836846M - OL37457841M
- All ISBNs: 9781484225400 - 9781484225417 - 1484225406 - 1484225414
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Beginning Ethical Hacking with Python at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Learning Kali Linux
Security Testing, Penetration Testing, and Ethical Hacking
By Ric Messier

“Learning Kali Linux” Metadata:
- Title: Learning Kali Linux
- Author: Ric Messier
- Language: English
- Number of Pages: Median: 402
- Publisher: O'Reilly Media
- Publish Date: 2018
“Learning Kali Linux” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer networks - Hacking - Security measures - Kali Linux - Linux (computer operating system)
Edition Identifiers:
- The Open Library ID: OL26833220M
- All ISBNs: 149202869X - 9781492028697
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Learning Kali Linux at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24The Browser Hacker's Handbook
By Wade Alcorn, Christian Frichot and Michele Orru

“The Browser Hacker's Handbook” Metadata:
- Title: The Browser Hacker's Handbook
- Authors: Wade AlcornChristian FrichotMichele Orru
- Language: English
- Number of Pages: Median: 648
- Publisher: ➤ Wiley - Wiley & Sons, Incorporated, John
- Publish Date: 2014
“The Browser Hacker's Handbook” Subjects and Themes:
- Subjects: ➤ Hackers - Computer networks, security measures - Browsers (computer programs) - Computer networks - Handbooks, manuals - Security measures - Browsers (Computer programs) - Computer security - Penetration testing (Computer security)
Edition Identifiers:
- The Open Library ID: OL39907327M - OL29221612M - OL26838227M - OL29164876M
- Online Computer Library Center (OCLC) ID: 883141254
- Library of Congress Control Number (LCCN): 2013958295
- All ISBNs: ➤ 1118662091 - 9781306473446 - 9781118662090 - 1306473446 - 111891435X - 1118662105 - 9781118914359 - 9781118662106
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The Browser Hacker's Handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Penetration tester's open source toolkit
By Jeremy Faircloth

“Penetration tester's open source toolkit” Metadata:
- Title: ➤ Penetration tester's open source toolkit
- Author: Jeremy Faircloth
- Language: English
- Number of Pages: Median: 458
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2006 - 2007 - 2011 - 2016
- Publish Location: Waltham, MA
“Penetration tester's open source toolkit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - Computer networks - Computers - Security measures - Computers, access control - Computer security - Computer networks, security measures - Open source software
Edition Identifiers:
- The Open Library ID: ➤ OL35770090M - OL35755261M - OL28579982M - OL35770487M - OL24886177M - OL34507910M
- Online Computer Library Center (OCLC) ID: 733546833 - 761694692
- Library of Congress Control Number (LCCN): 2011025807
- All ISBNs: ➤ 9780080556079 - 1597496286 - 1597496278 - 9780080489520 - 0128023538 - 0080489524 - 9780128023532 - 0080556078 - 9780128021491 - 9781597496278 - 9781597496285 - 0128021497
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Penetration tester's open source toolkit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Hacking with Kali
By James Broad and Andrew Bindner

“Hacking with Kali” Metadata:
- Title: Hacking with Kali
- Authors: James BroadAndrew Bindner
- Language: English
- Number of Pages: Median: 238
- Publisher: ➤ Elsevier Science & Technology Books
- Publish Date: 2013
“Hacking with Kali” Subjects and Themes:
- Subjects: ➤ Computers, access control - Computer networks, security measures - Computers, study and teaching - Electronic data processing personnel, certification - Penetration testing (Computer security) - Hackers - Kali Linux - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL28505252M - OL35490901M
- Online Computer Library Center (OCLC) ID: 870340083
- Library of Congress Control Number (LCCN): 2013045051
- All ISBNs: 9780124078833 - 9780124077492 - 0124077498 - 0124078834
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking with Kali at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Google hacking for penetration testers
By Johnny Long, Ed Skoudis and Alrik van Eijkelenborg

“Google hacking for penetration testers” Metadata:
- Title: ➤ Google hacking for penetration testers
- Authors: Johnny LongEd SkoudisAlrik van Eijkelenborg
- Language: English
- Number of Pages: Median: 534
- Publisher: Syngress Pub. - Syngress
- Publish Date: 2005 - 2008
- Publish Location: ➤ Burlington, MA - Rockland, Mass
“Google hacking for penetration testers” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Google - Internet - Internet programming - Security measures - Web search engines - Penetration testing (Computer security) - Internet searching - COMPUTERS - Online Services - System Administration - Storage & Retrieval
Edition Identifiers:
- The Open Library ID: OL8805350M - OL25538931M - OL18494899M - OL18898271M
- Online Computer Library Center (OCLC) ID: 57308594 - 824498939 - 85789357
- Library of Congress Control Number (LCCN): 2008530223
- All ISBNs: ➤ 9781597491761 - 9781597490139 - 159749013X - 9781931836364 - 1931836361 - 1597491764
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Google hacking for penetration testers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Advanced Penetration Testing: Hacking the World's Most Secure Networks
By Wil Allsopp

“Advanced Penetration Testing: Hacking the World's Most Secure Networks” Metadata:
- Title: ➤ Advanced Penetration Testing: Hacking the World's Most Secure Networks
- Author: Wil Allsopp
- Number of Pages: Median: 288
- Publisher: Wiley
- Publish Date: 2017
“Advanced Penetration Testing: Hacking the World's Most Secure Networks” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer networks - Security measures - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26836603M
- All ISBNs: 1119367689 - 9781119367680
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Advanced Penetration Testing: Hacking the World's Most Secure Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Bayesian methods for hackers
By Cameron Davidson-Pilon

“Bayesian methods for hackers” Metadata:
- Title: Bayesian methods for hackers
- Author: Cameron Davidson-Pilon
- Language: English
- Number of Pages: Median: 256
- Publisher: ➤ Addison-Wesley - Addison-Wesley Longman, Incorporated
- Publish Date: 2015 - 2016
“Bayesian methods for hackers” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Mathematics - Soft computing - Bayesian statistical decision theory - Computer programming - Entscheidungstheorie - BAYES - Soft Computing - Penetrationstest - Statistische Entscheidungstheorie
Edition Identifiers:
- The Open Library ID: OL34021008M - OL34011498M - OL27204002M
- Online Computer Library Center (OCLC) ID: 881450744
- Library of Congress Control Number (LCCN): 2015017249
- All ISBNs: ➤ 9780133902921 - 0133902900 - 9780133902839 - 0133902927 - 9780133902907 - 0133902838
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Bayesian methods for hackers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Computer security and penetration testing
By Alfred Basta

“Computer security and penetration testing” Metadata:
- Title: ➤ Computer security and penetration testing
- Author: Alfred Basta
- Language: English
- Number of Pages: Median: 463
- Publisher: ➤ Delmar Cengage Learning - Thomson
- Publish Date: 2008 - 2013
- Publish Location: Boston
“Computer security and penetration testing” Subjects and Themes:
- Subjects: Computer networks - Security measures - Computer security - Computer networks, security measures - Penetration testing (Computer security)
Edition Identifiers:
- The Open Library ID: OL28451115M - OL19999956M
- Online Computer Library Center (OCLC) ID: 148759915 - 864647358
- Library of Congress Control Number (LCCN): 2008270481 - 2013939807
- All ISBNs: 0840020937 - 9780840020932 - 1418048267 - 9781418048266
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security and penetration testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
By Jessey Bullock

“Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework” Metadata:
- Title: ➤ Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
- Author: Jessey Bullock
- Number of Pages: Median: 288
- Publisher: Wiley
- Publish Date: 2017
“Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer networks - Kali Linux - Computer security - Metasploit (Electronic resource) - Security measures - Computer network protocols - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL26836602M
- All ISBNs: 9781118918210 - 1118918215
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Official certified ethical hacker review guide
By Steven DeFino

“Official certified ethical hacker review guide” Metadata:
- Title: ➤ Official certified ethical hacker review guide
- Author: Steven DeFino
- Language: English
- Number of Pages: Median: 361
- Publisher: ➤ Course Technology, Cengage Learning
- Publish Date: 2010
- Publish Location: Boston, MA
“Official certified ethical hacker review guide” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Examinations - Certification - Computer networks - Computer hackers - Computer security - Study guides - Electronic data processing personnel - Hackers - Electronic data processing personnel, certification
Edition Identifiers:
- The Open Library ID: OL25059377M
- Online Computer Library Center (OCLC) ID: 377661204
- Library of Congress Control Number (LCCN): 2009938744
- All ISBNs: 1435488539 - 9781435488533
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Official certified ethical hacker review guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33CISO's guide to penetration testing
By James S. Tiller
“CISO's guide to penetration testing” Metadata:
- Title: ➤ CISO's guide to penetration testing
- Author: James S. Tiller
- Language: English
- Number of Pages: Median: 389
- Publisher: ➤ Auerbach Publishers, Incorporated - CRC Press - Taylor & Francis Group
- Publish Date: 2012 - 2016 - 2020
- Publish Location: Boca Raton, FL
“CISO's guide to penetration testing” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Business enterprises - Data processing - Computer networks - Testing - Security measures - Business enterprises, computer networks - Computer security - Tests d'intrusion - Entreprises - Informatique - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL34459826M - OL37949610M - OL37979183M - OL25078157M - OL34667959M - OL34467896M
- Online Computer Library Center (OCLC) ID: 879683643 - 772692279
- Library of Congress Control Number (LCCN): 2011038737
- All ISBNs: ➤ 9781439880289 - 1466516852 - 0429184751 - 1439880271 - 9780367382001 - 0367382008 - 9780429184758 - 9781466516854 - 9781439880272 - 1466516844 - 143988028X - 9781466516847
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find CISO's guide to penetration testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34CEH
By Kimberly Graves

“CEH” Metadata:
- Title: CEH
- Author: Kimberly Graves
- Language: English
- Number of Pages: Median: 392
- Publisher: Wiley Pub.
- Publish Date: 2010
- Publish Location: Indianapolis, Ind
“CEH” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Examinations - Certification - Computer networks - Computer hackers - Computer security - Study guides - Electronic data processing personnel
Edition Identifiers:
- The Open Library ID: OL24880072M
- Online Computer Library Center (OCLC) ID: 426814058
- Library of Congress Control Number (LCCN): 2010003135
- All ISBNs: 0470525207 - 9780470525203
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find CEH at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Kali Linux Cookbook
By Willie Pritchett

“Kali Linux Cookbook” Metadata:
- Title: Kali Linux Cookbook
- Author: Willie Pritchett
- Publisher: Packt Publishing Limited
- Publish Date: 2013
“Kali Linux Cookbook” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Penetration testing (Computer security) - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL26073991M
- Online Computer Library Center (OCLC) ID: 867854358
- All ISBNs: 1783289597 - 9781783289592
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Kali Linux Cookbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36CEH: Certified Ethical Hacker Version 8 Study Guide
By Oriyano

“CEH: Certified Ethical Hacker Version 8 Study Guide” Metadata:
- Title: ➤ CEH: Certified Ethical Hacker Version 8 Study Guide
- Author: Oriyano
- Number of Pages: Median: 504
- Publisher: Sybex
- Publish Date: 2014
“CEH: Certified Ethical Hacker Version 8 Study Guide” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Examinations - Hackers - Certification - Computer networks - Computer security - Study guides - Electronic data processing personnel - Electronic data processing personnel, certification
Edition Identifiers:
- The Open Library ID: OL26838072M
- Library of Congress Control Number (LCCN): 2014931949
- All ISBNs: 111864767X - 9781118647677
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CEH: Certified Ethical Hacker Version 8 Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Kali Linux Network Scanning Cookbook
By Justin Hutchens

“Kali Linux Network Scanning Cookbook” Metadata:
- Title: ➤ Kali Linux Network Scanning Cookbook
- Author: Justin Hutchens
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ Packt Publishing - ebooks Account - Packt Publishing, Limited
- Publish Date: 2014
“Kali Linux Network Scanning Cookbook” Subjects and Themes:
- Subjects: ➤ Computers - Access control - Computer security - Penetration testing (Computer security) - Computer networks - Security measures - Kali Linux
Edition Identifiers:
- The Open Library ID: OL39596455M - OL26838073M
- Online Computer Library Center (OCLC) ID: 891187312
- All ISBNs: 9781783982158 - 1783982144 - 9781783982141 - 1783982152
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Kali Linux Network Scanning Cookbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Kali Linux: Assuring Security By Penetration Testing
By Tedi Heriyanto, Lee Allen and Shakeel Ali

“Kali Linux: Assuring Security By Penetration Testing” Metadata:
- Title: ➤ Kali Linux: Assuring Security By Penetration Testing
- Authors: Tedi HeriyantoLee AllenShakeel Ali
- Language: English
- Number of Pages: Median: 541
- Publisher: ➤ Packt Publishing - ebooks Account - Packt Publishing, Limited
- Publish Date: 2014
“Kali Linux: Assuring Security By Penetration Testing” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Linux
Edition Identifiers:
- The Open Library ID: OL39586153M - OL26838076M
- Online Computer Library Center (OCLC) ID: 879386170
- All ISBNs: 184951948X - 1849519498 - 9781849519489 - 9781849519496
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Kali Linux: Assuring Security By Penetration Testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Penetration Testing Essentials
By Sean-Philip Oriyano

“Penetration Testing Essentials” Metadata:
- Title: Penetration Testing Essentials
- Author: Sean-Philip Oriyano
- Language: English
- Number of Pages: Median: 360
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2016 - 2017
“Penetration Testing Essentials” Subjects and Themes:
- Subjects: ➤ Cryptography - Computer security - Hackers - Hacking - Computer Security - Sécurité informatique - Pirates informatiques - Piratage informatique - Computer crimes - Prevention - Penetration testing (Computer security)
Edition Identifiers:
- The Open Library ID: OL34525675M - OL39935491M - OL29299078M - OL33607075M
- Online Computer Library Center (OCLC) ID: 964295404
- Library of Congress Control Number (LCCN): 2016958766
- All ISBNs: ➤ 9781119235309 - 1119235308 - 1119235332 - 9781119323983 - 9781119235330 - 1119323983 - 9781119419358 - 1119419352
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Penetration Testing Essentials at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Mastering Metasploit
By Nipun Jaswal

“Mastering Metasploit” Metadata:
- Title: Mastering Metasploit
- Author: Nipun Jaswal
- Number of Pages: Median: 378
- Publisher: Packt Publishing
- Publish Date: 2014
- Publish Location: Birmingham,UK
“Mastering Metasploit” Subjects and Themes:
- Subjects: Computer security - Computers - Access control - Penetration testing (Computer security) - Metasploit (Electronic resource)
Edition Identifiers:
- The Open Library ID: OL26350174M
- Online Computer Library Center (OCLC) ID: 881432974 - 961682387
- All ISBNs: 1782162224 - 9781782162223
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Professional penetration testing
By Thomas Wilhelm

“Professional penetration testing” Metadata:
- Title: ➤ Professional penetration testing
- Author: Thomas Wilhelm
- Language: English
- Publisher: ➤ Elsevier Science [distributor] - Elsevier Science & Technology Books - Syngress
- Publish Date: 2010 - 2013 - 2025
- Publish Location: Oxford - Rockland, Mass
“Professional penetration testing” Subjects and Themes:
- Subjects: ➤ Examinations - Practice - Computer security - Penetration testing (Computer security) - Computer networks - Testing - Security measures - Hackers - Computer hackers
Edition Identifiers:
- The Open Library ID: OL57535433M - OL35497687M - OL25559573M
- Online Computer Library Center (OCLC) ID: 500575246 - 535576351
- Library of Congress Control Number (LCCN): 2012419876
- All ISBNs: ➤ 0443264783 - 9780443264788 - 9780080960944 - 9780124046184 - 0080960944 - 1597494259 - 0124046185 - 9781597494250
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Professional penetration testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Coding for penetration testers
By Jason Andress

“Coding for penetration testers” Metadata:
- Title: Coding for penetration testers
- Author: Jason Andress
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2011 - 2016
- Publish Location: Boston
“Coding for penetration testers” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer networks - Testing - Security measures - Javascript (computer program language) - Python (computer program language) - Perl (computer program language)
Edition Identifiers:
- The Open Library ID: OL35768425M - OL33527233M - OL28614630M - OL25556265M
- Online Computer Library Center (OCLC) ID: 806221434
- Library of Congress Control Number (LCCN): 2011029098
- All ISBNs: ➤ 1597497304 - 9781597497299 - 9780128054727 - 0128054735 - 1597497290 - 9780128054734 - 0128054727 - 9781597497305
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Coding for penetration testers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Building Virtual Pentesting Labs for Advanced Penetration Testing
By Kevin Cardwell
“Building Virtual Pentesting Labs for Advanced Penetration Testing” Metadata:
- Title: ➤ Building Virtual Pentesting Labs for Advanced Penetration Testing
- Author: Kevin Cardwell
- Language: English
- Number of Pages: Median: 430
- Publisher: ➤ Packt Publishing - Packt Publishing, Limited - de Gruyter GmbH, Walter
- Publish Date: 2014 - 2016
“Building Virtual Pentesting Labs for Advanced Penetration Testing” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computers - Access control - Computer security - Computer software - Testing
Edition Identifiers:
- The Open Library ID: OL39588387M - OL37756594M - OL51797826M
- Online Computer Library Center (OCLC) ID: 883801310
- All ISBNs: ➤ 1785884956 - 9781785884955 - 1783284773 - 1783284781 - 9781783284771 - 9781783284788
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Building Virtual Pentesting Labs for Advanced Penetration Testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Metasploit toolkit for penetration testing, exploit development, and vulnerability research
By David Maynor

“Metasploit toolkit for penetration testing, exploit development, and vulnerability research” Metadata:
- Title: ➤ Metasploit toolkit for penetration testing, exploit development, and vulnerability research
- Author: David Maynor
- Language: English
- Number of Pages: Median: 272
- Publisher: ➤ Syngress - Elsevier Science & Technology Books
- Publish Date: 2007 - 2011
- Publish Location: Burlington, MA
“Metasploit toolkit for penetration testing, exploit development, and vulnerability research” Subjects and Themes:
- Subjects: ➤ Computer security - Open source software - Penetration testing (Computer security) - Metasploit (Electronic resource) - Computer networks
Edition Identifiers:
- The Open Library ID: OL35749894M - OL18018552M
- Library of Congress Control Number (LCCN): 2007299879
- All ISBNs: 008054925X - 9780080549255 - 1597490741 - 9781597490740
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Metasploit toolkit for penetration testing, exploit development, and vulnerability research at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Penetration Testing Fundamentals
By William (Chuck) Easttom II

“Penetration Testing Fundamentals” Metadata:
- Title: ➤ Penetration Testing Fundamentals
- Author: William (Chuck) Easttom II
- Number of Pages: Median: 448
- Publisher: Pearson IT Certification
- Publish Date: 2018
“Penetration Testing Fundamentals” Subjects and Themes:
- Subjects: ➤ Computer security - Penetration testing (computer security) - Information technology--security measures - Computer security--management - Computer networks--security measures - Data protection - Tk5105.59
Edition Identifiers:
- The Open Library ID: OL28338245M
- All ISBNs: 0789759373 - 9780789759375
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Penetration Testing Fundamentals at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Kali Linux Social Engineering
By Rahul Singh Patel
“Kali Linux Social Engineering” Metadata:
- Title: Kali Linux Social Engineering
- Author: Rahul Singh Patel
- Language: English
- Number of Pages: Median: 84
- Publisher: Packt Publishing, Limited
- Publish Date: 2013
“Kali Linux Social Engineering” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Penetration testing (Computer security) - Linux
Edition Identifiers:
- The Open Library ID: OL44149051M - OL49516064M
- Online Computer Library Center (OCLC) ID: 870467514
- All ISBNs: 9781783283279 - 9781783283286 - 1783283289 - 1783283270
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Kali Linux Social Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Ceh Certified Ethical Hacker Practice Exams
By Matt Walker

“Ceh Certified Ethical Hacker Practice Exams” Metadata:
- Title: ➤ Ceh Certified Ethical Hacker Practice Exams
- Author: Matt Walker
- Publisher: McGraw-Hill/Osborne Media
- Publish Date: 2013
“Ceh Certified Ethical Hacker Practice Exams” Subjects and Themes:
- Subjects: ➤ Computer security - Hackers - Electronic data processing personnel - Certification - Study guides - Examinations - Penetration testing (Computer security) - Computer networks
Edition Identifiers:
- The Open Library ID: OL25968575M
- Online Computer Library Center (OCLC) ID: 883801328
- Library of Congress Control Number (LCCN): 2013444510
- All ISBNs: 9780071810265 - 0071810269
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Ceh Certified Ethical Hacker Practice Exams at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Google Hacking for Penetration Testers, Volume 2
By Johnny Long

“Google Hacking for Penetration Testers, Volume 2” Metadata:
- Title: ➤ Google Hacking for Penetration Testers, Volume 2
- Author: Johnny Long
- Language: English
- Number of Pages: Median: 448
- Publisher: Syngress
- Publish Date: 2007
“Google Hacking for Penetration Testers, Volume 2” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Internet programming - Google - Computer security - Internet - Computer networks - Security measures - Web search engines
Edition Identifiers:
- The Open Library ID: OL9504102M
- All ISBNs: 1597491764 - 9781597491761
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Google Hacking for Penetration Testers, Volume 2 at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49The CEH Prep Guide
The Comprehensive Guide to Certified Ethical Hacking
By Ronald L. Krutz

“The CEH Prep Guide” Metadata:
- Title: The CEH Prep Guide
- Author: Ronald L. Krutz
- Language: English
- Number of Pages: Median: 738
- Publisher: Wiley
- Publish Date: 2007 - 2008
- Publish Location: Indianapolis, IN
“The CEH Prep Guide” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Examinations - Computer networks - Testing - Computer hackers - Computer security - Study guides - Security measures - Hackers
Edition Identifiers:
- The Open Library ID: OL24878317M - OL10279826M
- Online Computer Library Center (OCLC) ID: 154713529
- Library of Congress Control Number (LCCN): 2007033354
- All ISBNs: 9780470135921 - 0470135921
Author's Alternative Names:
"Ronald L Krutz"Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The CEH Prep Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50The car hacker's handbook
By Smith, Craig (Reverse engineer)

“The car hacker's handbook” Metadata:
- Title: The car hacker's handbook
- Author: ➤ Smith, Craig (Reverse engineer)
- Language: English
- Number of Pages: Median: 278
- Publisher: No Starch Press
- Publish Date: 2016
“The car hacker's handbook” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Automotive computers - Handbooks, manuals - Automobiles - Motor vehicles - Vandalism - Customizing - Performance - Security measures - Prevention - Automobiles, customizing - TECHNOLOGY & ENGINEERING / Engineering (General)
Edition Identifiers:
- The Open Library ID: OL27202476M
- Online Computer Library Center (OCLC) ID: 945554862 - 919482423
- Library of Congress Control Number (LCCN): 2015038297
- All ISBNs: 1593277032 - 9781593277031
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The car hacker's handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.