Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 14,20
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 14,98
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 18,71
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
EUR 18,76
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 16,69
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 17,54
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 17,68
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 20,17
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 18,59
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 21,24
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 22,77
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 22,94
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: Ria Christie Collections, Uxbridge, Regno Unito
EUR 16,94
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 18,24
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 19,03
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 20,67
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 20,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 20,49
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 21,36
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: Rarewaves USA United, OSWEGO, IL, U.S.A.
EUR 20,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. LEARN AUTOPSY Master Digital Forensics, Evidence Recovery, and System InvestigationThis book is ideal for professionals and students who want to master Autopsy in real-world digital forensic environments. With a direct technical focus, it covers everything from forensic image ingestion to artifact correlation across multiple sources and platforms.You will learn to apply Autopsy in operations with Kali Linux, Windows, Android, corporate networks, and Linux systems, integrating tools such as The Sleuth Kit, Volatility, Guymager, Cellebrite, YARA, SQLite, ExifTool, and modules for timeline, email, web artifacts, hashsets, and logs.Includes: - Installation and configuration with Java, PostgreSQL, and TSK- Processing of E01, AFF, DD, RAW, and VMDK images- Analysis of browser artifacts, EXIF, emails, logs, and metadata- Mobile device investigation using ADB and iOS dumps- Integration with external modules in Python and Groovy- Generation of technical reports with hashes, evidence, and maps- Chain of custody preservation with DC3DD, BitLocker, and forensic exportsMaster Autopsy and conduct digital investigations with technical validation, legal traceability, and full integration of forensic tools.autopsy, sleuth kit, volatility, cellebrite, yara, exiftool, guymager, adb, digital forensics, forensic investigation, kali linux This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. LEARN OpenVAS Master Detection, Automation, and Vulnerability Management in Real EnvironmentsThis book is recommended for students and professionals who want to master OpenVAS and GVM in corporate, public cloud, and hybrid infrastructure environments. You will learn how to implement automated vulnerability detection with integration to leading platforms such as AWS, Azure, and Google Cloud, as well as explore risk management, task automation, technical analysis, and report export for compliance.The content covers professional installation on Linux and cloud, orchestration via scripts, integration with DevSecOps, user management, API usage, and support for distributed environments.Includes: - Installation and configuration on AWS, Azure, Google Cloud, and Linux- Automated scanning in corporate, cloud, and hybrid environments- Integration of Python, Bash, Ansible scripts, and APIs for automation- Management of policies, users, RBAC, LDAP, and centralized authentication- Report export in PDF, CSV, XML, and integration with SIEM/SOAR- Zero-day vulnerability detection, plugin updates, compliance- Task orchestration and continuous monitoring across multiple platformsMaster OpenVAS and GVM in multicloud scenarios and boost your performance in security, automation, auditing, and regulatory projects.openvas, kali linux, gvm, aws, azure, google cloud, automation, devsecops, ci/cd, auditing, risk management, hybrid infrastructure, compliance This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. LEARN OWASP ZAP Master Security Testing and Automated ScanningThis book is ideal for students and professionals in offensive security, vulnerability analysts, and DevSecOps specialists who want to apply OWASP ZAP in technical audits and security pipelines. With a direct, functional, and tested approach, the content covers everything from basic usage to full automation strategies in CI/CD environments.You will learn to configure proxies, intercept requests, perform fuzzing, simulate authenticated attacks, analyze HTTP responses, and generate high-impact technical reports with validated evidence.Includes: - Use of Spider, Active Scanner, and Passive Analysis- Tests for XSS, SQLi, CSRF, and Privilege Escalation- Integration with Jenkins, Docker, CLI scripts, and REST API- Validation of headers, cookies, tokens, and authentication- Technical checklists, advanced logging, and continuous securityMaster OWASP ZAP as a tool for applied security analysis and automation, and strengthen your technical role in professional, regulated, and auditable environments.owasp zap, devsecops, automated scanning, vulnerability analysis, offensive security, fuzzing, rest api, continuous integration, web scanning, security pipelines This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. LEARN AIRCRACK-NG Master Wi-Fi Network Auditing and ExplorationThis book is intended for students and professionals seeking practical expertise in wireless auditing with Aircrack-ng. Learn how to capture WPA/WPA2 handshakes, exploit vulnerabilities in WEP and WPA3 networks, automate attacks and processes using Bash and Python, and apply bypass techniques in environments protected by IDS/IPS.Includes operational integration with tools such as Airodump-ng, Aireplay-ng, Wireshark, Hashcat, Hcxdumptool, and Burp Suite, as well as strategies for forensic analysis, evidence documentation, and technical report generation.- Environment setup for Wi-Fi auditing- Handshake collection and PMKID exploitation- Attack automation with practical scripts- Bypass techniques and detection evasion- Integration with Nmap, Burp Suite, and Hashcat- Forensic analysis and evidence management- Case study with a complete pentest cycle- Best practices, compliance, and incident response- Mesh network and corporate environment exploration- Workflow optimization and professional documentationBy the end, you will be prepared to conduct wireless audits, apply professional practices, and generate real impact in security projects.airodump-ng, aireplay-ng, wireshark, hashcat, hcxdumptool, burp suite, nmap, wireless pentest, python automation, network analysis This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. LEARN Burp Suite is a complete and progressive technical guide to mastering Burp Suite with practical depth, offensive focus, and professional application in real-world environments. Developed for offensive security professionals, vulnerability analysts, and pentest specialists, the content covers everything from installation and initial configuration to advanced automation operations, extensions, and security analysis in modern web applications.Structured according to the TECHWRITE 2.2 Protocol, each chapter delivers direct learning, common error resolution, best practices, and immediate application with integrated tools. The book explores the entire Burp Suite structure and intensive use of modules such as Repeater, Intruder, Scanner, Decoder, and Extender, emphasizing techniques like fuzzing, brute-force, logic flaw detection, authentication bypass, and encrypted traffic analysis.It also includes integration with custom scripts, analysis of REST and GraphQL APIs, token manipulation, automation with Burp Suite Professional, and extensions in Java or Python (via Jython), in addition to strategies for mapping attack surfaces and preparing professional reports.Whether to enhance your exploitation skills, automate repetitive tasks, or raise the technical level of offensive audits, Learn Burp Suite provides a complete path focused on real-world performance for cybersecurity professionals.Burp Suite, Offensive Security, Pentest, Web Application Security, Scanner, Repeater, Intruder, Vulnerabilities, Automation, Fuzzing, Web Security, HTTP Traffic, API Security, Burp Extensions, Exploit Development. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. LEARN SQLMapMaster SQL Injection Testing From Basics to AdvancedThis book is ideal for information security professionals and students seeking to master SQLMap with practical application. You will learn to perform SQL injection tests from basic to advanced, integrating tools like Nmap, Burp Suite, OWASP ZAP, and CI/CD pipelines. The content covers injections in SQL databases (MySQL, PostgreSQL, MSSQL, Oracle), NoSQL (MongoDB), automation with Hydra, custom scripts, and WAF evasion.Includes: - Installation, configuration, and basic execution of SQLMap- Enumeration of databases, tables, and columns- Automation with batch, logs, and multiple targets- Integration with Nmap, Burp Suite, Jenkins, GitLab, GitHub Actions- Injection in REST APIs, GraphQL, JSON, XML, and SPA- Authenticated testing with cookies, sessions, and tokens- Exploration of Blind SQL Injection and WAF bypass- Advanced use of tamper scripts and proxying with OWASP ZAPMaster SQLMap to operate precisely in audits, pentests, bug bounties, and strengthen corporate defenses, turning technical knowledge into a strategic advantage. sqlmap, nmap, burp suite, ci/cd, sql injection, nosql, hydra, blind sql injection, tamper scripts, devsecops This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Paperback. Condizione: new. Paperback. This book is a direct technical guide to the Metasploit Framework, the leading penetration testing platform used by offensive security professionals. The content presents, in a progressive and applied manner, everything from environment setup and configuration to advanced techniques in exploitation, post-exploitation, evasion, and offensive automation.You will learn: - Full structure of Metasploit and its modules (exploit, payload, auxiliary, post)- Operations with msfconsole, msfvenom, and integration with Nmap- Real-world exploitation using exploits like EternalBlue (MS17-010)- Post-exploitation techniques, credential harvesting, and persistence- Lab creation, social engineering, fuzzing, and technical report generationThe content is 100% focused on professional practice, with an emphasis on controlled labs, ethical simulations, and operational application in real penetration tests. Each chapter follows the TECHWRITE 2.2 protocol, prioritizing technical clarity, error resolution, and execution validated through real-world flows.Metasploit Framework, pentest, offensive security, vulnerability exploitation, post-exploitation, msfconsole, social engineering, msfvenom, Red Team. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: California Books, Miami, FL, U.S.A.
EUR 16,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand.
Da: California Books, Miami, FL, U.S.A.
EUR 16,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand.
Da: California Books, Miami, FL, U.S.A.
EUR 16,50
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand.