Ethical Hacking The Practical Guide for Pentesting and Red Teaming
ISBN 978-1-4932-2842-3 850 pages, 2026
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2843-0 850 pages, 2026, Print edition paperback
E-book formats: EPUB, PDF, online
ISBN 978-1-4932-2844-7
- Get a deep dive into ethical hacking and professional pentesting
- Learn key techniques: reconnaissance, scanning, enumeration, cryptography, and password cracking, and more
- Create a hacking lab to simulate real threat scenarios and put theory into practice
In this book, you'll learn about:
-
The Hacking Lifecycle
From reconnaissance and scanning to exploitation, privilege escalation, and report writing, walk through the phases of a professional penetration test. Understand the ethical and legal foundations of white hat hacking and pentesting.
-
Models, Frameworks, and Standards
Get a thorough grounding in information security models and frameworks such as MITRE ATT&CK and zero trust. Learn about professional pentesting standards like PTES, NIST, OWASP, and more.
-
Hacking Challenges
Test your skills with real-world scenarios! Gather intelligence through open-source research, exploit vulnerabilities such as XSS and SQL injection, perform password cracking and cryptographic analysis, and understand social engineering, malware, and covert communication.
You may also like:
-
Cyber Threat Intelligence
600 pages, paperback
A strong cybersecurity program needs to stay informed. With this all-in-one guide, master cyber threat intelligence (CTI) techniques and understand its practical applications. Walk through the intelligence lifecycle, and then get up to speed on the latest tools and technologies … More about the bookapprox. $74.99
Pre-order now
Available on 06/25/2026E-book | Print edition | Bundle -
Configuring SAP Business Technology Platform –
The Practical Guide for Administrators450 pages, hardcover
Get everything you need to know to set up SAP BTP! Learn how to structure accounts and authenticate users, and then dive into SAP BTP license models and cloud connector installation and configuration. You will learn how to set up … More about the bookfrom $84.99
Available
E-book | Print edition | Bundle -
Implementing SAP Code Vulnerability Analyzer in SAP BTP
82 pages
Get SAP Code Vulnerability Analyzer up and running—now in the cloud! Start by preparing your SAP BTP environment and then walk step by step through the implementation, from assigning roles and creating system connections to configuring RFC destinations. Learn to … More about the book$29.99
Available
E-Bite


