Filter
Datasikkerhet
Filter
In the age of hacking and whistleblowing, the internet contains massive troves of leaked information containing goldmines of newsworthy revelations in the public interest - if you …
PoC or GTFO, Volume 2 follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format …
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration …
Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics in an accessible way. After an introduction on the basics of binary formats, …
This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out. PoC||GTFO follows in the …
In Black Hat Go, you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction …
Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world …
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious …
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an …
Readers learn how to leverage human psychology and publicly available information to attack a target. The book includes sections on how to evade detection, spear phish, generate …