OPNsense Beginner to Professional

OPNsense Beginner to Professional

OPNsense is one of the most powerful open source firewalls and routing platforms available. With OPNsense, you can now protect networks using features that were only previously available to closed source commercial firewalls. This book is a practical guide to building a comprehensive network defense strategy using OPNsense. You’ll start Read more…

How to Hack Like a Legend

How to Hack Like a Legend

Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real life weaknesses in today’s Read more…

CCNP and CCIE Enterprise Core ENCOR 350-401

CCNP and CCIE Enterprise Core ENCOR 350-401

CCNP and CCIE Enterprise Core ENCOR 350-401 Exam Cram is the perfect study guide to help you pass the updated ENCOR 350-401 exam, a core requirement for your CCNP Enterprise, CCIE Enterprise Infrastructure, or CCIE Enterprise Wireless certification. It delivers expert coverage and practice questions for every exam topic, including implementation Read more…

Getting Started Becoming a Master Hacker

Getting Started Becoming a Master Hacker

This tutorial-style book follows upon Occupytheweb’s Best Selling “Linux Basics for Hackers” and takes the reader along the next step to becoming a Master Hacker. Occupytheweb offers his unique style to guide the reader through the various professions where hackers are in high demand (cyber intelligence, pentesting, bug bounty, cyber Read more…

Privilege Escalation Techniques

Privilege Escalation Techniques

Privilege Escalation Techniques is a detailed guide to privilege escalation techniques and tools for both Windows and Linux systems. This is a one-of-a-kind resource that will deepen your understanding of both platforms and provide detailed, easy-to-follow instructions for your first foray into privilege escalation. The book uses virtual environments that Read more…