By: Peter Kim
Format: 398 pages, Kindle Edition
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. …
Want to Read $ 19.95If you liked the nonfiction plot in The Hacker Playbook 3: Practical Guide To Penetration Testing by Peter Kim , here is a list of 16 books like this:
By: Daniel H. Pink
Format: 242 pages, Hardcover
The New York Times bestseller that gives readers a paradigm-shattering new way to think about motiv… read more
Want to Read $ 14.99Similar categories in Daniel H. Pink's Drive: The Surprising Truth About What Motivates Us book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
"Lawyers often face intense demands but have relatively little “decision latitude."-Daniel H. Pink, Drive: The Surprising Truth About What Motivates Us
"Motivation is deeply personal and only you know what words or images will resonate with you."-Daniel H. Pink, Drive: The Surprising Truth About What Motivates Us
"Dan Ariely, author of Predictably Irrational, a book that offers an entertaining and engaging overview of behavioral economics."-Daniel H. Pink, Drive: The Surprising Truth About What Motivates Us
"Greatness and nearsightedness are incompatible. Meaningful achievement depends on lifting one's sights and pushing toward the horizon."-Daniel H. Pink, Drive: The Surprising Truth About What Motivates Us
By: C.G. Jung , Sonu Shamdasani , Mark Kyburz , John Peck
Format: 371 pages, Hardcover
When Carl Jung embarked on an extended self-exploration he called it his “confrontation with the un… read more
Want to Read $ 28.99Similar categories in C.G. Jung's The Red Book: Liber Novus book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
"You are a slave to what you need in your soul."-C.G. Jung, The Red Book: Liber Novus
"La verdad suprema es una y la misma con lo contrario al sentido."-C.G. Jung, The Red Book: Liber Novus
"Los antiguos vivían sus signos porque el mundo aún no se les había vuelto real."-C.G. Jung, The Red Book: Liber Novus
"¿No sabes aún que el camino hacia la verdad sólo está abierto para el que carece de intenciones?"-C.G. Jung, The Red Book: Liber Novus
By: Nassim Nicholas Taleb
Format: 426 pages, Hardcover
From the bestselling author of The Black Swan and one of the foremost philosophers of our time, Nas… read more
Want to Read $ 15.99Similar categories in Nassim Nicholas Taleb's Antifragile: Things That Gain from Disorder book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
"Only the autodidacts are free."-Nassim Nicholas Taleb, Antifragile: Things That Gain from Disorder
"More data means more information, but it also means more false information."-Nassim Nicholas Taleb, Antifragile: Things That Gain from Disorder
"Convincing - and confident - disciplines, say, physics, tend to use little statistical backup, while political science and economics, which have never produced anything of note, are full of elaborate…"-Nassim Nicholas Taleb, Antifragile: Things That Gain from Disorder
"Further, in writing, I feel corrupt and unethical if I have to look up a subject in a library as part of the writing itself. This acts as a filter--it is the only filter. If the subject is not intere…"-Nassim Nicholas Taleb, Antifragile: Things That Gain from Disorder
By: Justin Seitz
Format: 171 pages, Paperback
When it comes to creating powerful and effective hacking tools, Python is the language of choice fo… read more
Want to Read $ 25.99Similar categories in Justin Seitz's Black Hat Python: Python Programming for Hackers and Pentesters book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Kevin D. Mitnick , William L. Simon , Steve Wozniak
Format: None pages, Hardcover
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and n… read more
Want to ReadSimilar categories in Kevin D. Mitnick's Ghost in the Wires: My Adventures as the World's Most Wanted Hacker book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Jon Erickson
Format: 192 pages, Paperback
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods… read more
Want to ReadSimilar categories in Jon Erickson's Hacking: The Art of Exploitation book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: None
Format: 416 pages, Audio CD
How will Artificial Intelligence affect crime, war, justice, jobs, society and our very sense of be… read more
Want to ReadSimilar categories in None's Life 3.0: Being Human in the Age of Artificial Intelligence book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Dafydd Stuttard , Marcus Pinto
Format: 142 pages, Paperback
This book is a practical guide to discovering and exploiting security flaws in web applications. Th… read more
Want to ReadSimilar categories in Dafydd Stuttard's The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Robert Greene , Joost Elffers
Format: 318 pages, Paperback
This amoral, cunning, ruthless, and instructive book synthesizes the philosophies of Machiavelli, S… read more
Want to ReadSimilar categories in Robert Greene's The 48 Laws of Power book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Robert T. Kiyosaki
Format: None pages, Paperback
Personal finance author and lecturer Robert T. Kiyosaki developed his unique economic perspective f… read more
Want to ReadSimilar categories in Robert T. Kiyosaki's Rich Dad, Poor Dad book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Gene Kim , George Spafford , Kevin Behr
Format: 200 pages, Hardcover
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bi… read more
Want to ReadSimilar categories in Gene Kim's The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Edward Snowden
Format: 339 pages, Hardcover
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveill… read more
Want to Read $ 11.99Similar categories in Edward Snowden's Permanent Record book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
"The government should be afraid of the people, the people shouldn't be afraid of the government."-Edward Snowden, Permanent Record
"This was the ultimate leap of faith, in a way: I could hardly trust anyone, so I had to trust everyone."-Edward Snowden, Permanent Record
"A little bit of math can accomplish what all the guns and barbed wire can't: a little bit of math can keep a secret."-Edward Snowden, Permanent Record
"The reason you're reading this book is that I did a dangerous thing for a man in my position: I decided to tell the truth."-Edward Snowden, Permanent Record
By: Noah Kagan
Format: 240 pages, Hardcover
The founder and CEO of AppSumo.com, Noah Kagan, knows how to launch a seven-figure business in a si… read more
Want to Read $ 15.99Similar categories in Noah Kagan's Million Dollar Weekend: The Surprisingly Simple Way to Launch a 7-Figure Business in 48 Hours book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Julie Zhuo
Format: 288 pages, Hardcover
Instant Wall Street Journal Bestseller! Congratulations, you're a manager! After you pop the ch… read more
Want to Read $ 16.99Similar categories in Julie Zhuo's The Making of a Manager: What to Do When Everyone Looks to You book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Maxie Reynolds
Format: 304 pages, Paperback
Take on the perspective of an attacker with this insightful new resource for ethical hackers, pente… read more
Want to Read $ 18.00Similar categories in Maxie Reynolds's The Art of Attack: Attacker Mindset for Security Professionals book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: James Forshaw
Format: 336 pages, Paperback
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one … read more
Want to Read $ 29.99Similar categories in James Forshaw's Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Peter Kim
Format: 398 pages, Kindle Edition
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. … read more
Want to Read $ 19.95Similar categories in Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Peter Yaworski
Format: 264 pages, Paperback
Learn how people break websites and how you can, too. Real-World Bug Hunting is the premier field … read more
Want to Read $ 23.99Similar categories in Peter Yaworski's Real-World Bug Hunting: A Field Guide to Web Hacking book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Gus Khawaja
Format: 489 pages, Kindle Edition
Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distributio… read more
Want to Read $ 25.00Similar categories in Gus Khawaja's Kali Linux Penetration Testing Bible book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Michael Bazzell
Format: 566 pages, Paperback
Completely rewritten Second Edition (2020) presents the definitive 565-page privacy manual. Michael… read more
Want to ReadSimilar categories in Michael Bazzell's Extreme Privacy: What It Takes to Disappear book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing
By: Ben Clark
Format: 242 pages, Kindle Edition
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by… read more
Want to Read $ 9.99Similar categories in Ben Clark's RTFM: Red Team Field Manual v2 book and Peter Kim's The Hacker Playbook 3: Practical Guide To Penetration Testing