📋
A Journey From IT to IT Security
search
⌘Ctrlk
📋
A Journey From IT to IT Security
  • IT Training Resources
  • IT Security Roles
  • Resources
    • IT Basics
    • Literature
    • Useful Tool Tutorials
    • Useful Online Tools
    • Exploits
  • Unsorted
    • Gitlab-ci with docker-compose
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Resources

Literature

Essential literature.

LogoViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security EngineersAmazon.comchevron-right

LogoHacking: The Art of Exploitation, 2nd EditionAmazon.comchevron-right
LogoMetasploit: The Penetration Tester's GuideAmazon.comchevron-right
LogoRtfm: Red Team Field ManualAmazon.comchevron-right
LogoNmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security ScanningAmazon.comchevron-right

PreviousThe Security Development Lifecycle (SDL)chevron-leftNextUseful Tool Tutorialschevron-right

Last updated 4 years ago