The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
·
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
3
Ловушка для багов. Полевое руководство по веб-хакингу
·
Ловушка для багов. Полевое руководство по веб-хакингу
7
Becoming the Hacker
·
Becoming the Hacker
1
The Hacker Playbook 2: Practical Guide To Penetration Testing
·
The Hacker Playbook 2: Practical Guide To Penetration Testing
8
The Hacker Playbook 3: Practical Guide To Penetration Testing
·
The Hacker Playbook 3: Practical Guide To Penetration Testing
9
The Hacker Playbook: Practical Guide To Penetration Testing
·
The Hacker Playbook: Practical Guide To Penetration Testing
18
Attacking Network Protocols
·
Attacking Network Protocols
8
Introduction to Web Hacking: Cross-site Scripting
·
Introduction to Web Hacking: Cross-site Scripting
4
NoSQL Injection for Elasticsearch
·
NoSQL Injection for Elasticsearch
9
A Bug Hunter's Diary
·
A Bug Hunter's Diary
4