• Penetration Testing: A Hands-On Introduction to Hacking

    Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the... [Read More]

    • ASIN: 1593275641
    • UPC: 884600461290
    • ASIN: 1593275641
    • ISBN: 1593275641
    • Brand: No Starch Press
    • Manufacturer: No Starch Press

  • Alfa AWUS036NHA Wireless B/G/N USB Adaptor - 802.11n - 150 Mbps - 2.4 GHz - 5 dBi Antenna - Long Range - Atheros Chipset - Windows XP/Vista 64-Bit/128-Bit Windows 7 Compatible

    Compatible with any brand 802.11g or 802.11n router using 2.4ghz wavelength and supports mimo (multiple input multiple output) high speed transfer TX data rate up to 150 mbps. awus036nha is an ieee 802.11b/g/n wireless USB adapter. It provides users to launch ieee 802.11b/g/n wireless network at 150 mbps in the 2.4 Ghz band, which is also compatible with ieee 802.11b/g wireless devices at 54 mbps. Awus036nha is compatible to higher-performance, multi-stream, mimo-based 802.11n and are available in reference designs to serve the networking, PC and consumer electronics markets. Awus036nha includ... [Read More]

    • ASIN: B004Y6MIXS
    • UPC: 780746843115
    • ASIN: B004Y6MIXS
    • Brand: Alfa
    • Manufacturer: Alfa

  • The Hacker Playbook 2: Practical Guide To Penetration Testing

    Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—... [Read More]

    • ASIN: B01072WJZE
    • ASIN: B01072WJZE

  • Blue Team Field Manual (BTFM) (RTFM)

    Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

    • ASIN: 154101636X
    • ASIN: 154101636X
    • ISBN: 154101636X
    • Manufacturer: CreateSpace Independent Publishing Platform

  • Nrf24l01+pa+lna SMA Antenna Wireless Transceiver Communication Module 2.4g 1100m

    Description This wireless Transceiver module is an easy and suitable module if you want to setup your wireless communication system with low cost!! It can achieve a good balance between wireless transition performance and cost! You can easily add it with your own MCU/ARM/PIC/AVR/STM32 system! What\'s more, this nRF24L01+ module is designed with Power amplifier and SMA antenna This allowed you to use the wireless communication up to 1000 meters! (No barrier) Specifications: Frequence: 2.4GHz~2.5GHz Operating voltage: 3 ~ 3.6V Max Current: 115mA Multi-frequency: 125 frequency Support up ... [Read More]

    • ASIN: B00OIQ8FS6
    • UPC: 697313323997
    • ASIN: B00OIQ8FS6
    • Brand: Generic
    • Manufacturer: sheena

  • Rtfm: Red Team Field Manual

    The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations an... [Read More]

    • ASIN: 1494295504
    • ASIN: 1494295504
    • ISBN: 1494295504
    • Brand: CreateSpace Independent Publishing Platform
    • Manufacturer: CreateSpace Independent Publishing Platform

  • Vortexgear Pok3r 60% Ultra Compact Mechanical Gaming Keyboard - KBC Poker 3-61 Keys PBT Laser Etched Keycaps - PC/Mac/Linux - Programmable [Metal Casing] Clicky (Cherry Mx Blue, Black)

    The Vortexgear POK3R is the perfect solution for limited spaces in situations. Built up 3 kinds of layout, it features individually programmable keys with 3 layers customization options, all easily set through what you want. Main Specification: - Tiny size keyboard with 61 keys - Cherry MX Switches - Arbitrary programming - PBT Keycaps - Individual LED coding (Backlit version only) - 3 layers customization - Metal bezel - Built-up 3 kind of layout (Qwerty, Dvorak, Colemak) Programming Instruction Note: The POK3R built in 4-layers. The default layer can not be programmed. Only layer 2... [Read More]

    • ASIN: B00OFM51L2
    • UPC: 799665794019
    • ASIN: B00OFM51L2
    • Brand: Vortexgear
    • Size: Cherry Mx Blue
    • Manufacturer: Vortexgear

  • The Hacker Playbook 3: Practical Guide To Penetration Testing

    Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ... [Read More]

    • ASIN: 1980901759
    • ASIN: 1980901759
    • ISBN: 1980901759
    • Manufacturer: Independently published

  • Yubico YubiKey 5 Nano - Two Factor Authentication USB Security Key, Fits USB-A Ports - Protect Your Online Accounts with More Than a Password, FIDO Certified USB Password Key, Extra Compact Size

    The YubiKey 5 Nano is the world's most protective USB security key that works with more online services and applications than any other security key. Usernames and passwords are not enough to protect your accounts. Using a Yubico security key as a form of two-factor authentication is a simple and proven method for keeping your accounts secure. Secure your login and protect hundreds of services like Gmail, Facebook, Outlook, LastPass and more. This YubiKey delivers strong 2 factor authentication via USB-A ports. For business and personal use, Yubico USB password protecting products are designed... [Read More]

    • ASIN: B07HBDX2CM
    • ASIN: B07HBDX2CM
    • Brand: Yubico
    • Size: YubiKey 5 Nano
    • Manufacturer: Yubico

  • Linux Administration: A Beginner's Guide, Seventh Edition

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Now with a virtual machine showcasing the book's test system configuration, Linux Administration: A Beginner's Guide, Seventh Edition teaches system administrators how to set-up and configure Linux quickly and easily.Effectively set up and manage any version of Linux on individual servers or entire networks using this practical resource. Fully updated to cover the latest tools and techniques, Linux Administr... [Read More]

    • ASIN: 0071845364
    • ASIN: 0071845364
    • ISBN: 0071845364
    • Brand: MCGRAW-HILL Professional
    • Manufacturer: McGraw-Hill Education

  • Mastering Python: Machine Learning, Data Structures, Django, Object Oriented Programming and Software Engineering (Including Programming Interview Questions) [2nd Edition]

    Unlike some guides that give you just the basics that you need to get started, this book teaches you everything you need to know about using Python, including what you can use it for. Python is a diverse language and is the foundation of much of what we use in the world today. The reader will be happy to know that this programming language is relatively easy to learn. The book is divided into five sections to make the journey easy for the student:Part 1 – Data Structures and AlgorithmsPart 2 – Machine LearningPart 3– DjangoPart 4 – ArcGIS ProgrammingPart 5 – Software Development and ... [Read More]

    • ASIN: B07JDC79VK
    • ASIN: B07JDC79VK

  • Wifi With Antenna For Raspberry Pi - Instructions Included - PLUG and PLAY

    Plug and play (no software installation needed) with Wheezy, Raspbmc, OpenElec XBMC/KODI, OSMC, Xbian, Jessie, Arch Linux, Ubuntu, Fedora, Pidora, Snappy Ubuntu + other distros. Easy to follow getting started instructions included (installing Wifi on Raspberry Pi )- for Wheezy OS, OpenELEC XBMC and Raspbmc XBMC. **The KODI, XBMC, OSMC, Debian, OpenELEC, Rapbmc logos are registered trademarks. Detroit DIY Electronics is in no way affiliated with these organizations; the logos are displayed in our product advertisement image simply show our customers that our product is compatible with the assoc... [Read More]

    • ASIN: B00H95C0A2
    • UPC: 041250691662
    • ASIN: B00H95C0A2
    • Brand: Detroit DIY Electronics
    • Manufacturer: Detroit DIY Electronics

  • Firewalla Red: Cyber Security Firewall for Home & Business, Protect Network from Viruses & Malware | Parental Control | Block Ads | Free VPN Server | Connects to Router | No Monthly Fee | 100Mb IPS

    Firewalla RED is an all-in-one, simple, and intelligent shield that connects to your router and protects your devices from cyber attacks. It's an advanced solution to safeguard your personal data, monitor and control your kids' internet usage, block ads, and continue protecting your information from threats when you're using your device on the road.  There is no monthly fee!Simple to Use Plug and play installation, multiple ways to connect. App supporting iOS and Android Devices. Cyber-security as simple as tapping on a few buttons. Major Functions Cyber Security, protect all devices Parental... [Read More]

    • ASIN: B079TNMKKY
    • UPC: 710560413843
    • ASIN: B079TNMKKY
    • Brand: Firewalla
    • Manufacturer: Firewalla LLC

  • Thetis FIDO U2F Security Key with Bluetooth ENBL, Two-Factor Authentication [Extra Protection] Compatible with Windows/Linux/MacOS, Gmail, Facebook, Dropbox, SaleForce, GitHub and More

    Thetis FIDO U2F Security key with aluminum folding design provides strong authentication and ultimate security to all your online accounts. Platform and OS Support: The key can only be used with websites that support U2F protocol via Chrome, Opera browser (version 40 and later) on Windows, macOS and Linux. Currently, websites that support U2F protocol include Google G-suite, Facebook, Dropbox, GitHub, SalesForce, Dashlane, GitLab, BitBucket, and FastMail. To use it on your iPhone or Android phone, your phone should be compatible with Bluetooth Low Energy (BLE). For iPhone users, smart lock ap... [Read More]

    • ASIN: B07HHLPFFZ
    • UPC: 600231107419
    • ASIN: B07HHLPFFZ
    • Brand: Thetis
    • Manufacturer: Thetis

  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

    Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's original author suits all levels of security and networking professionals. The reference guide documents every Nmap feature and option, while the remainder demonstrates how to apply them to quickly solve real-world tasks. Examples and diagrams show actual communic... [Read More]

    • ASIN: 0979958717
    • ASIN: 0979958717
    • ISBN: 0979958717
    • Brand: Brand: Nmap Project
    • Manufacturer: Nmap Project

  • Linux Server Hacks

    This unique and valuable collection of tips, tools, and scripts provides direct, hands-on solutions that can be used by anyone running a network of Linux

    • UPC: 25242444
    • Rating: 4.5

  • Linux Server Hacks - eBook

    A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only

    • UPC: 978340466
    • Rating: 4.5

  • Strong : A Runner's Guide to Boosting Confidence and Becoming the Best Version of You

    Women's Health Magazine: "Strong is the ultimate guide to dreaming big and reaching your goals ―whether that's qualifying for the Boston Marathon or scoring the big promotion at work." ― Liz Plosser Editor-in-Chief, Women's Health

    • UPC: 799369613
    • Rating: 5.0

  • Ubuntu Hacks : Tips & Tools for Exploring, Using, and Tuning Linux

    Featuring 100 quick tips and tricks for users of all technical levels, this guide offers beginners installation advice and tips on getting the most out of the free applications packaged with Ubuntu, while intermediate and

    • UPC: 38541483
    • Rating: 4.0

  • Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux - eBook

    Hacking will demand your full dedication and interest and also a desire and a craving for knowledge and constant advancement. If your goal is to be a hacker, this is the book to start with!.This

    • UPC: 714450542

  • Ubuntu Linux 100 Success Secrets, Tips, Tricks, Hints and Hacks Toolbox and Practical Guide - eBook

    This book is set up for both newbie and guru alike, crammed with tips and tricks, arranged in a way that you can just browse and pick, or use it kind of like a Ubuntu

    • UPC: 536457168

  • The Empowered Mind Diet Equation : Get to the Best Version of Yourself Via Diet & Mind

    The Empowered Mind Diet Equation: Get To The Best Version Of Yourself Via Diet &

    • UPC: 320685857

  • Bass Recorded Versions: Best of Yes for Bass (Paperback)

    (Bass Recorded Versions Persona). Note-for-note transciptions of Chris Squire's superb bass lines from 13 Yes classics: And You and I * Close to the Edge * The Fish (Schindleria Praematurus) * Heart of the Sunrise

    • UPC: 26665794

  • kali linux ile hack - eBook

    Hack işlemleri ülkemizde her geçen gün daha da popüler oluyor. Özellikle gençlerin ilgisini daha da çok çekiyor. Bu kitap da anlatacaklarım tamamen savunma amaçlı öğrenilmesi gereken bilgilerdir. Bu kitabı Hackırların bizim sistemimizi nasıl ele geçirdikleri,

    • UPC: 304922626

  • Guitar Recorded Versions: The Best of Fleetwood Mac (Paperback)

    (Guitar Recorded Versions). Guitar transcriptions for 14 Fleetwood Mac classics, including: Don't Stop * Dreams * Gypsy * Hold Me * Landslide * Little Lies * Rhiannon * Sara * You Make Lovin' Fun *

    • UPC: 4082429

  • Best Linux Distros For Ethical Hacking And Penetration Testing

    KALI LINUX : THE BEST DISTRO FOR HACKING!

    Best OS For Hacking Beginners / Best Linux Distro For Hacking Beginners