bars
📋
A Journey From IT to IT Security
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
Resources
Literature
Essential literature.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Amazon.com
chevron-right
Hacking: The Art of Exploitation, 2nd Edition
Amazon.com
chevron-right
Metasploit: The Penetration Tester's Guide
Amazon.com
chevron-right
Rtfm: Red Team Field Manual
Amazon.com
chevron-right
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Amazon.com
chevron-right
Previous
The Security Development Lifecycle (SDL)
chevron-left
Next
Useful Tool Tutorials
chevron-right
Last updated
4 years ago