cover title author rating rating my rating read added Down arrow
 
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
5.00
Jan 29, 2019
Jan 14, 2019
 
Malware Data Science: Attack Detection and Attribution
4.50
Nov 29, 2018
Nov 07, 2018
 
Inside Radio: An Attack and Defense Guide
3.50
not set
Apr 05, 2018
 
Advanced Penetration Testing: Hacking the World's Most Secure Networks
4.23
Nov 08, 2018
Apr 24, 2017
 
Learning Linux Binary Analysis
4.26
Jan 14, 2019
Dec 21, 2016
 
Incident Response & Computer Forensics, Third Edition
4.14
Sep 11, 2017
Sep 18, 2016
 
The Car Hacker's Handbook: A Guide for the Penetration Tester
3.89
Oct 12, 2016
Mar 07, 2016
 
Android Malware and Analysis
4.80
not set
Feb 02, 2016
 
Penetration Tester's Open Source Toolkit
4.00
not set
Feb 02, 2016
 
CISSP All-in-One Exam Guide
4.06
not set
Feb 02, 2016
 
Black Hat Python: Python Programming for Hackers and Pentesters
4.08
not set
Feb 02, 2016
 
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
3.50
not set
Feb 02, 2016
 
Red Team Field Manual (RTFM)
4.23
not set
Feb 02, 2016
 
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
4.37
not set
Feb 02, 2016
 
Android Hacker's Handbook
3.99
not set
Feb 02, 2016
 
Professional NFC Application Development for Android
4.00
not set
Feb 02, 2016
 
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
3.88
not set
Feb 02, 2016
 
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
4.03
not set
Feb 02, 2016
 
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
3.80
not set
Feb 02, 2016
 
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
4.32
not set
Feb 02, 2016
 
Application Security for the Android Platform
3.39
not set
Feb 02, 2016
 
iOS Hacker's Handbook
4.20
not set
Feb 02, 2016
 
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
3.92
not set
Feb 02, 2016
 
Backtrack 5 Wireless Penetration Testing Beginner's Guide
4.00
not set
Feb 02, 2016
 
The Tangled Web: A Guide to Securing Modern Web Applications
4.07
not set
Feb 02, 2016
 
Metasploit: The Penetration Tester's Guide
4.06
not set
Feb 02, 2016
 
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
4.44
not set
Feb 02, 2016
 
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
4.10
not set
Feb 02, 2016
 
A Guide to Kernel Exploitation: Attacking the Core
4.26
not set
Feb 02, 2016
 
Managed Code Rootkits: Hooking Into Runtime Environments
4.00
not set
Feb 02, 2016
Rss infinite
« previous 1 3