Tag: Pentesting

Practical Hardware Pentesting Learn attack and defense techniques for embedded systems in IoT and other devices


Free Download Practical Hardware Pentesting: Learn attack and defense techniques for embedded systems in IoT and other devices, 2nd Edition by Jean-Georges Valle
English | June 10, 2025 | ISBN: 1803249323 | 398 pages | PDF | 5.09 Mb
Get up to speed with the latest attack techniques and patterns to pentest and secure all your devices

(more…)

All About Pentesting and Understanding It


Free Download All About Pentesting and Understanding It: A Comprehensive Guide to Ethical Hacking and Cybersecurity Assessments: Penetration Testing Techniques, Tools, and Lesser-Known Facts
by Mehul Kothari

English | December 16, 2024 | ASIN: B0DQQ9WNGK | 192 pages | PDF | 56 Mb

(more…)

Practical Hardware Pentesting, Second Edition (Early Access)


Free Download Practical Hardware Pentesting, Second Edition (Early Access)
English | 2024 | ASIN : B0B5GYP5S7 | 702 Pages | True EPUB | 13 MB
Throughout the book, you’ll explore the functional and security aspects of a device and learn how a system senses and communicates with the outside world. You’ll set up a lab from scratch and gradually work towards an advanced hardware lab.

(more…)

Pentesting APIs


Free Download Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs
English | 2024 | ISBN: 1837633169 | 469 Pages | EPUB (True) | 12.3 MB
Understanding API security is crucial as APIs form the backbone of modern interconnected applications, making them prime targets for cyberattacks. Drawing on nearly 30 years of cybersecurity experience and an extensive background in network security and forensic analysis, this book provides the knowledge and tools to strengthen your API security practices and protect against cyber threats comprehensively.

(more…)

Hardware & Security Werkzeuge, Pentesting, Prävention


Free Download Hardware & Security: Werkzeuge, Pentesting, Prävention
Deutsch | 2022 | ISBN: 3836279029 | 1221 Seiten | PDF | 97 MB
Manipulierte USB-Sticks, unscheinbare Keylogger, falsche Access-Points – die Gefahren für Ihre IT-Infrastruktur beschränken sich nicht auf Attacken von Viren und Trojanern. Dieses Handbuch zeigt Ihnen, wie Sie Ihre Rechnersysteme und Netzwerke umfassend vor Hardware-Angriffen schützen. Sorgen Sie proaktiv für Sicherheit, indem Sie Ihre Mitarbeiter*innen für die Bedrohungen sensibilisieren und die Werkzeuge der Angreifer detailliert kennenlernen. Denn nur mit einem ganzheitlichen Blick auf die Bedrohungslage gelingt es Ihnen, Industriespionage, Ransomware-Angriffe und andere Attacken richtig zu bekämpfen.

(more…)