📋
A Journey From IT to IT Security
Ctrlk
  • IT Training Resources
  • IT Security Roles
  • Resources
    • IT Basics
    • Literature
    • Useful Tool Tutorials
    • Useful Online Tools
    • Exploits
  • Unsorted
    • Gitlab-ci with docker-compose
Powered by GitBook
On this page
  1. Resources

Literature

Essential literature.

LogoViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security EngineersAmazon.com

LogoHacking: The Art of Exploitation, 2nd EditionAmazon.com
LogoMetasploit: The Penetration Tester's GuideAmazon.com
LogoRtfm: Red Team Field ManualAmazon.com
LogoNmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security ScanningAmazon.com

PreviousThe Security Development Lifecycle (SDL)NextUseful Tool Tutorials

Last updated 4 years ago