📋
A Journey From IT to IT Security
Ctrl
k
Copy
Resources
Literature
Essential literature.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Amazon.com
Hacking: The Art of Exploitation, 2nd Edition
Amazon.com
Metasploit: The Penetration Tester's Guide
Amazon.com
Rtfm: Red Team Field Manual
Amazon.com
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Amazon.com
Previous
The Security Development Lifecycle (SDL)
Next
Useful Tool Tutorials
Last updated
4 years ago