Books on the topic 'Penetration testing (Computer security)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Penetration testing (Computer security).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Wolf, Halton, ed. Computer security and penetration testing. Boston: Thomson, 2008.
Find full textCrest. Procuring penetration testing services. Ely, Cambridge, UK: IT Governance Pub., 2014.
Find full textTedi, Heriyanto, and ebrary Inc, eds. BackTrack 4: Assuring security by penetration testing : master the art of penetration testing with BackTrack. Birmingham, U.K: Packt Open Source, 2011.
Find full textCrest, ed. Penetration testing services procurement guide. Ely, Cambridgeshire, UK: IT Governance Pub., 2014.
Find full textW, Bayles Aaron, ed. Penetration tester's open source toolkit. Burlington, MA: Syngress Publishing, 2007.
Find full textJames, Broad, ed. The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy. Waltham, MA: Syngress, 2011.
Find full textVacca, John R. Computer and information security handbook. Amsterdam: Elsevier, 2009.
Find full textKennedy, David. Metasploit: The penetration tester's guide. San Francisco, Calif: No Starch Press, 2011.
Find full textservice), ScienceDirect (Online, ed. Professional penetration testing: Creating and operating a formal hacking lab. Rockland, Mass: Syngress, 2010.
Find full textMaynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA: Syngress, 2007.
Find full textMaynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA: Syngress, 2007.
Find full textLong, Johnny. Google hacking for penetration testers. Burlington, MA: Syngress Pub., 2008.
Find full textBasta, Alfred, and Wolf Halton. Computer Security and Penetration Testing. Cengage Delmar Learning, 2007.
Find full textAhmad, Raheel. Penetration Testing Essentials: A Practical Apprach for Executing Penetration Testing Projects. Taylor & Francis Group, 2012.
Find full textOriyano, Sean-Philip. Penetration Testing Essentials. Wiley & Sons, Incorporated, John, 2016.
Find full textYermalkar, Swaroop. Learning IOS Penetration Testing. Packt Publishing, Limited, 2016.
Find full textNewman, Daniel, and Andrew Whitaker. Penetration Testing and Network Defense. Pearson Education, Limited, 2005.
Find full textNewman, Daniel, and Andrew Whitaker. Penetration Testing and Network Defense. Pearson Education, Limited, 2016.
Find full textSingh, Abhinav. Metasploit Penetration Testing Cookbook. Packt Publishing, Limited, 2012.
Find full textHacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security! Createspace Independent Publishing Platform, 2016.
Find full textHacking: Computer Hacking, Security Testing, Penetration Testing, and Basic Security! Createspace Independent Publishing Platform, 2016.
Find full textHacking Computer Hacking Security Testing Penetration Testing and Basic Security. Independently Published, 2020.
Find full textRogers, Russ, Chris Hurley, Brian Baker, Daniel Connelly, and Frank Thornton. Wardriving & Wireless Penetration Testing. Syngress, 2006.
Find full textMartorella, Christian. Learning Python Web Penetration Testing: Automate web penetration testing activities using Python. Packt Publishing, 2018.
Find full textBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Taylor & Francis Group, 2017.
Find full textEngebretson, Patrick. Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. Elsevier Science & Technology Books, 2011.
Find full textEngebretson, Patrick. Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. Elsevier Science & Technology Books, 2013.
Find full textTiller, James S. Ciso's Guide to Penetration Testing. Taylor & Francis Group, 2020.
Find full textBeggs, Robert W. Mastering Kali Linux for Advanced Penetration Testing. Packt Publishing, Limited, 2014.
Find full textGupta, Aditya, and Aaron Guzman. IoT Penetration Testing Cookbook. Packt Publishing, Limited, 2017.
Find full textBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Auerbach Publishers, Incorporated, 2017.
Find full textBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Auerbach Publishers, Incorporated, 2017.
Find full textBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Auerbach Publishers, Incorporated, 2017.
Find full textBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Taylor & Francis Group, 2014.
Find full textBaloch, Rafay. Ethical Hacking and Penetration Testing Guide. Auerbach Publishers, Incorporated, 2017.
Find full textRogers, Russ, Chris Hurley, Brian Baker, and Frank Thornton. WarDriving and Wireless Penetration Testing. Elsevier Science & Technology Books, 2006.
Find full textBasics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. Elsevier Science & Technology Books, 2013.
Find full textHurley, Chris, and Jeremy Faircloth. Penetration Tester's Open Source Toolkit. Elsevier Science & Technology Books, 2007.
Find full textFaircloth, Jeremy. Penetration Tester's Open Source Toolkit. Elsevier Science & Technology Books, 2011.
Find full textCardwell, Kevin. Building Virtual Pentesting Labs for Advanced Penetration Testing. Packt Publishing, Limited, 2014.
Find full textBuilding Virtual Pentesting Labs for Advanced Penetration Testing. Packt Publishing, 2014.
Find full textPublishing, IT Governance. Penetration Testing: Protecting Networks and Systems. IT Governance Ltd, 2012.
Find full text