📋
A Journey From IT to IT Security
Search...
Ctrl
K
Resources
Literature
Previous
The Security Development Lifecycle (SDL)
Next
Useful Tool Tutorials
Last updated
4 years ago
Essential literature.
Hacking: The Art of Exploitation, 2nd Edition
Rtfm: Red Team Field Manual
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Metasploit: The Penetration Tester's Guide
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning