The book provides a comprehensive guide to establishing and managing a penetration testing lab, essential for identifying security vulnerabilities in computer networks. It covers critical aspects such as planning, metrics, methodologies, and detailed procedures for conducting tests, including vulnerability identification and verification. Additionally, it addresses archiving, reporting, and management practices, making it a valuable resource for both beginners and advanced practitioners in the field of information security.
Thomas-Wilhelm Becker Book order







- 2025
- 2024
A Military Dictionary and Gazetteer
- 668 pages
- 24 hours of reading
Featuring a reprint of a classic first published in 1881, this book offers readers a glimpse into the themes and narratives of its time. The original work captures the essence of its historical context, reflecting societal norms and challenges of the era. Through its engaging prose and vivid characters, it invites readers to explore the intricacies of human experience and the enduring relevance of its messages. This edition preserves the authenticity of the original while making it accessible to contemporary audiences.
- 2023
The book offers a comprehensive collection of military terminology and historical accounts, covering both ancient and modern military concepts, as well as detailed information about North American Indian tribes and notable battles throughout history. It includes explanations of heraldic terms and geographical insights, compiled from reputable sources worldwide. An appendix features the Articles of War, enhancing its value as a reference. This republished edition has been meticulously retyped and redesigned for clarity, ensuring its accessibility for future generations.
- 2010
Focusing on innovative security strategies, the book introduces a unique approach to penetration testing by adopting a "ninja" mindset. Readers will explore unconventional techniques that emphasize stealth, disguise, and espionage to gain faster access to a company's assets. It covers practical methods such as impersonating employees, evading alarm systems, identifying vulnerabilities, and utilizing spyware. By rethinking traditional pen testing methods, the author aims to equip security professionals with creative tools to outsmart potential hackers effectively.