Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
-
Nowość
Designed for security professionals and aspiring pentesters, this book equips you with the skills and knowledge to exploit vulnerabilities, gain access, and navigate post-exploitation scenarios across diverse platforms.- PDF + ePub pkt
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Burp Suite is an immensely powerful and popular tool for web application security testing. This book provides a collection of recipes that address vulnerabilities in web applications and APIs. It offers guidance on how to configure Burp Suite, make the most of its tools, and explore into its extensions.
- PDF + ePub pkt
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud environments running on AWS, Azure, and GCP. In addition to these, you will explore a number of practical strategies on how to manage the complexity, cost, and security risks involved when setting up vulnerable cloud lab environments.
- PDF + ePub pkt
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
Shellcode is code that is used to execute a command within software memory to take control of or exploit a target computer. Offensive Shellcode from Scratch helps you to understand what shellcode is, along with its components, the tools used to build shellcode, and how shellcode can be used within Linux and Windows.
- PDF + ePub pkt
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition provides you with an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers.
- PDF + ePub pkt
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.
- PDF + ePub pkt
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Penetration Testing Azure for Ethical Hackers provides in-depth explanations of common security issues in Azure environments and tutorials on how to set up a pentesting lab and execute attacks on Azure assets. It will help you gain a deeper understanding of how Azure environments are configured, and more importantly, how they can be misconfigured.
- PDF + ePub + Mobi pkt
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps penetration testers set up persistence and facilitates lateral movement. This book is a one-of-a-kind resource that covers both the theoretical foundations and a range of privilege escalation techniques and tools for both Windows and Lin
- PDF + ePub + Mobi pkt
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Get hands-on with practical ethical hacking from scratch using Python. With the help of step-by-step instructions and practical exercises, you'll develop tools that provide detailed insights into the ethical hacking thought process. This book also covers aspects of network and system hacking along with defense techniques.
- PDF + ePub + Mobi pkt
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Hardware security has become a major concern in recent times making it crucial for companies and end users to focus on protecting hardware. If you’re a security practitioner who is more familiar with software and binary hacking or someone looking to repurpose devices, this book will demonstrate how to approach hardware hacking of embedded de
- PDF + ePub + Mobi pkt
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.
- PDF + ePub + Mobi pkt
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.
- PDF + ePub + Mobi pkt
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication.
- PDF + ePub + Mobi pkt
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
This Learning Path is your easy reference to know all about penetration testing or ethical hacking. With more than 100 recipes, you'll become a master of the most widely used penetration testing framework and easily tackle command injection flaws, crypto implementation layers, and web application security holes.
- PDF + ePub + Mobi pkt
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
-
This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure your i
- PDF + ePub + Mobi pkt
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). This book teaches you various penetration testing techniques in order to become
- PDF + ePub + Mobi pkt
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Mastering Distributed Tracing provides comprehensive coverage of the tracing field. Solve problems through code instrumentation with open standards, and learn how to profile complex systems. The book will also prepare you to operate and enhance your own tracing infrastructure.
- PDF + ePub + Mobi pkt
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concepts that will come in handy when making robust cybersecurity tools and custom exploits.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Mastering Kali Linux for Advanced Penetration Testing, Third Edition will guide you through proven techniques to test your infrastructure security using Kali Linux. From selecting the most effective tools to carrying out advanced pentesting in highly secure environments, this book will help you gain the expertise you need to advance in your career.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Selenium WebDriver is a platform-independent API for automating testing of both browser and mobile applications. It is also a core technology in many other browser automation tools, APIs and frameworks. This book will guide you through the WebDriver APIs that are used in automation tests.
- PDF + ePub + Mobi pkt
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3 Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
This second edition of Kali Linux 2: Windows Penetration Testing provides approaches and solutions to the issues of modern penetration testing for a Microsoft Windows environment. As a pen tester, you need to be able to understand and use the best available tools - this book addresses these needs with maximum in a cost and time efficient way.
- PDF + ePub + Mobi pkt
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Java is one of the most commonly used software languages by programmers and developers. Are you from a non-technical background looking to master Java for your automation needs? Then Hands-On Automation Testing with Java for Beginners is for you.
- PDF + ePub + Mobi pkt
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Real-World SRE is a practical guide for surviving a system outage. Nat Welch’s step-by-step framework will help you to navigate a crisis when the stakes are high.
- PDF + ePub + Mobi pkt
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
Python's built-in unittest module is showing it's age; hard to extend, debug and track what's going on. The pytest framework overcomes these problems and simplifies testing your Python software. Many users love to use pytest and the improvement in their testing shows! This book is the ideal introduction to pytest, teaching you how to write tests of
- PDF + ePub + Mobi pkt
pytest Quick Start Guide. Write better Python code with simple and maintainable tests pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.
- PDF + ePub + Mobi pkt
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
With constantly changing business requirements and technical environments, the code needs to evolve too. Building applications using test-driven development process ensures that they work properly irrespective of such changes. In this book, you will learn to make such robust and production-ready applications with C# and .NET.
- PDF + ePub + Mobi pkt
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
IT Asset Management (ITAM) supports life cycle management and strategic decision making for an IT environment.This book is a detailed IT Asset Management (ITAM) guidebook with real-world templates that can be converted into working ITAM documents. It is a step-by-step IT asset management manual for the newbies as well as the seasoned ITAM veterans,
- PDF + ePub + Mobi pkt
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Test-Driven Development (TDD) is a methodology that helps you to write as little as code as possible to satisfy the software requirements, and that what you've written does what its supposed to do. If you're looking for a practical resource on Test-Driven Development this is the book for you. You've found a practical end to end guide that will help
- PDF + ePub + Mobi pkt
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Jira Software is an agile project management tool that supports any agile methodology, be it scrum, Kanban, or your own unique flavor. From agile boards to reports, you can plan, track, and manage all your agile software development projects from a single tool. Jira Software brings the power of agile methodology to Atlassian Jira.With this practica
- PDF + ePub + Mobi pkt
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
The Selenium WebDriver 3.x Technology is an open source API available to test both Browser and Mobile applications. It is completely platform independent in that tests built for 1 browser or mobile device will also work on all other browsers and mobile devices. The technology supports all major development languages which allows it to be tied direc
- PDF + ePub + Mobi pkt
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
A step-by-step guide to quickly set up Jenkins across various platforms and create a Continuous Integration and Continuous Delivery pipeline using all the new features introduced in Jenkins 2.x such as Pipeline as a Code, Multibranch pipeline, Blue Ocean Plugin, and more.
- PDF + ePub + Mobi pkt
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
This book will focus on the most latest release of Jenkins that is 2.32, with the latest features such as pipeline as code, new setup experience, and improved UI. With all new pipeline as code you will be able to build simple or advanced pipeline easily and rapidly, hence improving your teams productivity.
- PDF + ePub + Mobi pkt
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
JMeter is a Java application designed to load and test performance for a web application. JMeter extends to improve the functioning of various other static and dynamic resources. This book is a great starting point to learn about JMeter. It covers the new features introduced with JMeter 3 and enables you to dive deep into the new techniques neede
- PDF + ePub + Mobi pkt
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Software testing is a crucial aspect of any development process if one wants to build a high-quality product. With the increase in app usage, the need for testing has only grown leaps and bounds.
- PDF + ePub + Mobi pkt
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
- PDF + ePub + Mobi pkt
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
Christopher Duffy, Mohit Raj, Cameron Buchanan, Andrew Mabbitt, Terry Ip, Dave Mound, Benjamin May
-
- PDF + ePub + Mobi pkt
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0 Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
- PDF + ePub + Mobi pkt
Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests
-
- PDF + ePub + Mobi pkt
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
- PDF + ePub + Mobi pkt
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
Benjamin May, Cameron Buchanan, Andrew Mabbitt, Dave Mound, Terry Ip
-
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
- PDF + ePub + Mobi pkt
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
-
- PDF + ePub + Mobi pkt
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
- PDF + ePub + Mobi pkt
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual
-
- PDF + ePub + Mobi pkt
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
- PDF + ePub + Mobi pkt
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
- PDF + ePub + Mobi pkt
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
- PDF + ePub + Mobi pkt
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
- PDF + ePub + Mobi pkt
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
- PDF + ePub + Mobi pkt
Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox