Application Pen Testing

Application Pen-Testing: Introduction and Tools  eBooks & eLearning

Posted by naag at Feb. 15, 2017
Application Pen-Testing: Introduction and Tools

Application Pen-Testing: Introduction and Tools
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | 314 MB
Genre: eLearning | Language: English

Application Pen-Testing: Putting Your Skills to Work  eBooks & eLearning

Posted by naag at Feb. 23, 2017
Application Pen-Testing: Putting Your Skills to Work

Application Pen-Testing: Putting Your Skills to Work
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | 400 MB
Genre: eLearning | Language: English

Application Pen-Testing: The OWASP Top 10  eBooks & eLearning

Posted by naag at Sept. 13, 2017
Application Pen-Testing: The OWASP Top 10

Application Pen-Testing: The OWASP Top 10
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 396 MB
Genre: eLearning | Language: English

Web App Pen Testing: Reconnaissance  eBooks & eLearning

Posted by IrGens at Dec. 1, 2023
Web App Pen Testing: Reconnaissance

Web App Pen Testing: Reconnaissance
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 14m | 334 MB
Instructor: Tim Tomes

Ethical Hacking Mastery: Cybersecurity & Pen Testing  eBooks & eLearning

Posted by ELK1nG at Oct. 11, 2023
Ethical Hacking Mastery: Cybersecurity & Pen Testing

Ethical Hacking Mastery: Cybersecurity & Pen Testing
Published 10/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.61 GB | Duration: 14h 39m

Become an Expert Ethical Hacker: Master Cybersecurity, Penetration Testing, and Vulnerability Assessment.
Vulnerability Assessment and Penetration Testing (VAPT): Detailed guide with highlighted threats, risk exposure

Vulnerability Assessment and Penetration Testing (VAPT)
by Bhardwaj, Rishabh;

English | 2025 | ISBN: 936589266X | 358 pages | True EPUB | 40.88 MB

Pen Testing from Contract to Report  eBooks & eLearning

Posted by IrGens at Dec. 18, 2024
Pen Testing from Contract to Report

Pen Testing from Contract to Report by Alfred Basta, Nadine Basta, Waqar Anwar
English | February 28, 2024 | ISBN: 1394176783 | True EPUB/PDF | 672 pages | 46.1/31.7 MB

Pen Testing from Contract to Report  eBooks & eLearning

Posted by Free butterfly at May 31, 2025
Pen Testing from Contract to Report

Pen Testing from Contract to Report by Alfred Basta, Nadine Basta, Waqar Anwar
English | February 28, 2024 | ISBN: 1394176783 | 672 pages | MOBI | 54 Mb

Learn Ethical Hacking / Pen Testing & Bug Bounty Hunting A:Z  eBooks & eLearning

Posted by ELK1nG at Feb. 20, 2023
Learn Ethical Hacking / Pen Testing & Bug Bounty Hunting A:Z

Learn Ethical Hacking / Pen Testing & Bug Bounty Hunting A:Z
Last updated 11/2020
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.13 GB | Duration: 5h 46m

Learn ethical hacking:Become a Pro ethical hacker that can hack computer systems like black hat hackers.

Professional Pen Testing for Web Applications  eBooks & eLearning

Posted by Alexpal at Jan. 22, 2007
Professional Pen Testing for Web Applications

Professional Pen Testing for Web Applications (Programmer to Programmer) by Andres Andreu
Publisher: Wrox (July 5, 2006) | ISBN-10: 0471789666 | CHM | 20 Mb | 522 pages

There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.
After a review of the basics of web applications, you'll be introduced to web application hacking concepts and techniques such as vulnerability analysis, attack simulation, results analysis, manuals, source code, and circuit diagrams. These web application hacking concepts and techniques will prove useful information for ultimately securing the resources that need your protection.