THELIB
Category Rules Rules Log in
  • Books
  • Tag: vulnerability exploitation

Books — vulnerability exploitation

EN
Penetration Testing: A Hands-On Introduction to Hacking

Penetration Testing: A Hands-On Introduction to Hacking

A

Georgia Weidman

Cybersecurity
RU
Ethical Hacking. A Practical Guide to Penetration Testing

Ethical Hacking. A Practical Guide to Penetration Testing

A

Дэниел Г. Грэм

Cybersecurity
RU
Penetration Testing

Penetration Testing

A

А.Н. Бегаев, С.Н. Бегаев, В.А. Федотов

Cybersecurity
RU
OWASP Juice Shop: A Guide to Exploiting Vulnerabilities and Learning Web Application Security

OWASP Juice Shop: A Guide to Exploiting Vulnerabilities and Learning Web Application Security

A

Автор не указан в предоставленном фрагменте

Cybersecurity
RU
Protocol-Level Network Attacks. A Hacker's Guide to Intercepting and Analyzing Network Traffic and Exploiting Vulnerabilities

Protocol-Level Network Attacks. A Hacker's Guide to Intercepting and Analyzing Network Traffic and Exploiting Vulnerabilities

A

Джеймс Форшоу

Cybersecurity
EN
The Art of Network Penetration Testing: How to Take Over Any Company in the World

The Art of Network Penetration Testing: How to Take Over Any Company in the World

A

Royce Davis

Cybersecurity
RU
Kali Linux: The Pentester's Bible

Kali Linux: The Pentester's Bible

A

Гас Хаваджа

Cybersecurity
THELIB

IT book library with translation into 8 languages.

Catalog

  • Books
  • Categories
  • Rules
  • Agreement

Account

  • Register
  • Log in
  • Support

Info

  • thelib.cc
  • v0.1
© 2026 THELIB 8 languages · AI translation on the fly