The document lists the titles of books that have been downloaded or are available for download related to ethical hacking, penetration testing, and computer security. Some of the downloaded books include "Gray Hat Hacking - The Ethical Hacker’s Handbook", "RTFM: Red Team Field Manual", and "Social Engineering: The Art of Human Hacking". Books available for download include "The IoT Hacker's Handbook", "Hacking with Kali Linux: Practical Guide", and "WiFi Hacking for Beginners". The books cover topics like Linux, network penetration testing, web application hacking, social engineering, anonymity, and ethical hacking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
123 views2 pages
Livros
The document lists the titles of books that have been downloaded or are available for download related to ethical hacking, penetration testing, and computer security. Some of the downloaded books include "Gray Hat Hacking - The Ethical Hacker’s Handbook", "RTFM: Red Team Field Manual", and "Social Engineering: The Art of Human Hacking". Books available for download include "The IoT Hacker's Handbook", "Hacking with Kali Linux: Practical Guide", and "WiFi Hacking for Beginners". The books cover topics like Linux, network penetration testing, web application hacking, social engineering, anonymity, and ethical hacking.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2
BAIXADOS:
Allen Harper | Gray Hat Hacking - The Ethical Hacker’s
Handbook Ben Clark | RTFM: Red Team Field Manual Bruno Fraga | Tecnicas de Invasão Christopher Hadnagy | Social Engineering: The Art of Human Hacking Christopher Negus | Linux A Bíblia Daniel Moreno | Pentest em aplicações Web Daniel Moreno | Pentest em redes sem fio David Kennedy | Metasploit: The Penetration Tester's Guide David Melnichuk | The Hacker's Underground Handbook Gabriel Torres | Redes de Computadores Jeff Simon | Hacking Practical Guide for Beginners Jon Erickson | Hacking: The Art of Exploitation Justin Seitz | Black Hat Python Kevin Mitnick | A Arte de Enganar Kevin Mitnick | A Arte de Invadir Simon Singh | The Code Book Stuart McClure | Hacker Expostos
PARA BAIXAR:
Aditya Gupta | The IoT Hacker's Handbook
| https://ps.3lib.net/book/3717886/b95236?dsource=recommend Dafydd Stuttard | The web application hacker’s handbook | https://ps.3lib.net/book/3401544/518a0b?dsource=recommend Daniel Howard | Hacking with Kali Linux: Practical Guide | https://ps.3lib.net/book/5332594/f36634?dsource=recommend Daniel James Hollins | Dark Psychology Secrets | https://ps.3lib.net/book/5066149/a2a64c?dsource=recommend Daniel Moreno | Introdução ao Pentest | https://pt.br1lib.org/book/3610222/8b15b3?dsource=recommend James Wells | WiFi Hacking for Beginners | https://ps.3lib.net/book/2826275/0a851a?dsource=recommend Kevin James | Computer Hacking for Beginners | https://ps.3lib.net/book/2563260/b2147c?dsource=recommend Kevin Mitnick | The Art of Invisibility | https://ps.3lib.net/book/2867237/08799e?dsource=recommend Lance Henderson | Tor and the Dark Art of Anonymity | https://ps.3lib.net/book/2548624/31bf1f?dsource=recommend Lance Henderson | Tor Darknet Series: Master the Art of Invisibility | https://ps.3lib.net/book/3714746/f2420c?dsource=recommend OccupyTheWeb | Linux Basics for Hacker's | Peter Kim | The Hacker Playbook 2: Penetration Testing | https://ps.3lib.net/book/2951816/c30f27?dsource=recommend Peter Kim | The Hacker Playbook 3: Penetration Testing | https://ps.3lib.net/book/3525893/451b52?dsource=recommend Project Syntax | Python and Hacking Made Simple | https://ps.3lib.net/book/2950584/10f8a1?dsource=recommend Sandro Melo | Exploração de Vulnerabilidades em Redes TCP/IP | https://pt.br1lib.org/book/5304513/1dd5cf?dsource=recommend Sanjib Sinha | Beginning Ethical Hacking with Kali Linux | https://ps.3lib.net/book/3632594/c28006?dsource=recommend Stefano Novelli | Hacklog Volume 1 Anonymity | https://ps.3lib.net/book/3720900/5a1564?dsource=recommend Stefano Novelli | Hacklog Volume 2 Web Hacking | https://ps.3lib.net/book/5960907/4f0e50?dsource=recommend