Backsecurity

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

Hide / Expand icon

kali linuxThis web page features the top technology books in the Kali Linux category. Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It comes preinstalled with over 600 penetration-testing programs. The 400-600 word description would highlight the key features of Kali Linux, the types of books available in this category like Learn Computer Forensics, Industrial Cybersecurity, iOS Forensics for Investigators, etc., and the key things readers can learn from these books like analyzing malware, securing IoT devices, performing mobile forensics, and more. The description would be optimized for relevant keywords related to Kali Linux, penetration testing, cybersecurity, etc.

Bestsellers

A range of our top selling security products from the last year.

(1-1 of 10) 
CompTIA Security+: SY0-601 Certification Guide
CompTIA Security+: SY0-601 Certification ...
Dec 2020Ellipse550 Pages

$24.99
Learn Computer Forensics – 2nd edition
Learn Computer Forensics – 2nd edition
Jul 2022Ellipse434 Pages

$39.99
Industrial Cybersecurity
Industrial Cybersecurity
Oct 2021Ellipse800 Pages

$43.99
Mastering Defensive Security
Mastering Defensive Security
Jan 2022Ellipse528 Pages

$43.99
Operationalizing Threat Intelligence
Operationalizing Threat Intelligence
Jun 2022Ellipse460 Pages

$37.99
iOS Forensics for Investigators
iOS Forensics for Investigators
May 2022Ellipse316 PagesEllipseHalf Star 5

$37.99
Building a Next-Gen SOC with IBM QRadar
Building a Next-Gen SOC with IBM QRadar
Jun 2023Ellipse198 Pages

$35.99
Ghidra Software Reverse Engineering for Beginners
Ghidra Software Reverse Engineering for ...
Jan 2021Ellipse322 Pages

$26.99
Windows and Linux Penetration Testing from Scratch
Windows and Linux Penetration Testing fr ...
Aug 2022Ellipse510 Pages

$37.99
Hands-On AWS Penetration Testing with Kali Linux
Hands-On AWS Penetration Testing with Ka ...
Apr 2019Ellipse508 Pages

$35.99

Rising Stars

Recently released security books which are getting a lot of attention.

(1-1 of 10) 
Attacking and Exploiting Modern Web Applications
Attacking and Exploiting Modern Web Appl ...
Aug 2023Ellipse338 PagesEllipseHalf Star 5

$31.99
Automotive Cybersecurity Engineering Handbook
Automotive Cybersecurity Engineering Han ...
Oct 2023Ellipse392 PagesEllipseHalf Star 5

$43.99
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Official Google Cloud Certified Professi ...
Aug 2023Ellipse496 Pages

$47.99
Cloud Penetration Testing for Red Teamers
Cloud Penetration Testing for Red Teamer ...
Nov 2023Ellipse298 Pages

$39.99
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide
ISACA Certified in Risk and Information ...
Sep 2023Ellipse316 Pages

$43.99
Burp Suite Cookbook
Burp Suite Cookbook
Oct 2023Ellipse450 PagesEllipseHalf Star 5

$39.99
Building and Automating Penetration Testing Labs in the Cloud
Building and Automating Penetration Test ...
Oct 2023Ellipse562 Pages

$39.99
Ethical Hacking Workshop
Ethical Hacking Workshop
Oct 2023Ellipse220 Pages

$43.99
Windows Forensics Analyst Field Guide
Windows Forensics Analyst Field Guide
Oct 2023Ellipse318 PagesEllipseHalf Star 5

$39.99
Implementing DevSecOps Practices
Implementing DevSecOps Practices
Dec 2023Ellipse258 Pages

$27.99

Audience Favourites

Our most rated security products by our Customers.

(1-1 of 1) 
iOS Forensics for Investigators
iOS Forensics for Investigators
May 2022Ellipse316 Pages

$37.99

Quick Learns

Our security books which are under 200 pages long.

(1-1 of 4) 
Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing ...
Jul 2015Ellipse164 Pages

$29.99
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints
Jul 2014Ellipse190 Pages

$23.99
Python for Offensive PenTest
Python for Offensive PenTest
Apr 2018Ellipse176 Pages

$25.99
Building a Next-Gen SOC with IBM QRadar
Building a Next-Gen SOC with IBM QRadar
Jun 2023Ellipse198 Pages

$35.99

Beginner's Corner

Our top picks for starting your security journey.

(1-1 of 10) 
Kali Linux - Assuring Security by Penetration Testing
Kali Linux - Assuring Security by Penetr ...
Apr 2014Ellipse454 Pages

$28.99
Web Penetration Testing with Kali Linux 2.0, Second Edition
Web Penetration Testing with Kali Linux ...
Nov 2015Ellipse312 Pages

$43.99
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux
Sep 2013Ellipse342 Pages

$32.99
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
Advanced Penetration Testing for Highly- ...
May 2012Ellipse414 Pages

$39.99
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints
Jul 2014Ellipse190 Pages

$23.99
Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetr ...
Jun 2014Ellipse356 Pages

$36.99
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
Kali Linux: Wireless Penetration Testing ...
Mar 2015Ellipse214 Pages

$39.99
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing
Oct 2016Ellipse298 Pages

$39.99
Kali Linux 2 - Assuring Security by Penetration Testing
Kali Linux 2 - Assuring Security by Pene ...
Sep 2016Ellipse572 Pages

$39.99
Advanced Penetration Testing for Highly-Secured Environments, Second Edition
Advanced Penetration Testing for Highly- ...
Mar 2016Ellipse428 Pages

$51.99

Express Tutorials

Learn core security skills and be productive within two hours.

(1-1 of 1) 
WiFi Hacking: Wireless Penetration Testing for Beginners
WiFi Hacking: Wireless Penetration Testi ...
May 2018Ellipse103 minutes

$188.99

Career Pathways

A collection of reading lists made by our expert authors to help get you your next job.
Mastering CybersecurityMastering CybersecurityMastering Cybersecurity
Mastering CybersecurityThis comprehensive reading list is curated for those looking to get started with Cybersecurity. It offers unique insights on the evolution of the threat landscape, providing expert tips and techniques to help you develop defense strategies against th ...
How to Become an Ethical HackerHow to Become an Ethical HackerHow to Become an Ethical Hacker
How to Become an Ethical HackerExplore this reading list to learn legal hacking, enterprise defense testing, and penetration techniques in a controlled environment. It covers practicing ethical hacking, intermediate-level penetration testing, web app vulnerability exploitation, an ...
Become a Kali Linux NinjaBecome a Kali Linux NinjaBecome a Kali Linux Ninja
Become a Kali Linux NinjaMaster the art of ethical hacking with the ins and outs of pentesting with Kali Linux. It leads from advanced to complex penetration testing methods, covering wireless devices, web, and AWS cloud.
Kickstart Your CyberSecurity CareerKickstart Your CyberSecurity CareerKickstart Your CyberSecurity Career
Kickstart Your CyberSecurity CareerCybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started. This reading list consistss of books wr ...
Digital Forensics and Incident Response MasterclassDigital Forensics and Incident Response MasterclassDigital Forensics and Incident Response Masterclass
Digital Forensics and Incident Response MasterclassLearn digital forensics and incident response with real-life scenarios. Ideal for cybersecurity enthusiasts and business security professionals.

Certification Prep

Essential study guides and materials to ace your certification exams.

(1-1 of 1) 
CompTIA Security+: SY0-601 Certification Guide
CompTIA Security+: SY0-601 Certification ...
Dec 2020Ellipse550 Pages

$24.99

Popular Authors (5)

(1 -1 of 5) 

Ms. Vandana Verma Sehgal
LinkedinGithub
1. https://www.linkedin.com/in/vandana-verma/?originalSubdomain=in 2. https://infosecvandana.com/ 2. https://github.com/vermava 3. https://twitter.com/infosecvandana 4. https://www.youtube.com/channel/UCyr-gas4Un-3YBEDIUQtNjg 5. https://www.youtube.com/watch?v=MIyM6JKv7pQ 6. https://www.youtube.com/watch?v=FHKG3b07PtA 7. https://pl-pl.facebook.com/bloggersmeetup/videos/vandana-verma-sehgal-of-owasp-explains-why-app-modernization-is-so-critical-to-l/490587351941275/ 8. https://www.rsaconference.com/experts/vandana-verma-sehgal 9. https://owasp.o...
Most popular book by Ms. Vandana Verma Sehgal
Implementing DevSecOps Practices
Kamil Mrzygłód
LinkedinGithub
Kamil Mrzygłód is a skilled software developer, architect, and Microsoft Azure MVP. He is focused on delivering fast, reliable, and flexible cloud solutions based on the Microsoft Azure platform. He has spoken at multiple conferences and meetups, working on open source software (OSS) projects and driving workshops for different people and companies. In recent years, he has developed an interest in Azure serverless architectures, data analysis, and big data components. Currently, he works as an independent cloud consultant for various clients. H...
Most popular book by Kamil Mrzygłód
Hands-On Azure for Developers
Stian Thorgersen
LinkedinGithub
Stian Thorgersen started his career at Arjuna Technologies building a cloud federation platform, years before most companies were even ready for a single-vendor public cloud. He later joined Red Hat, looking for ways to make developers' lives easier, which is where the idea of Keycloak started. In 2013, Stian co-founded the Keycloak project with another developer at Red Hat. Today, Stian is the Keycloak project lead and is also the top contributor to the project. He is still employed by Red Hat as a senior principal software engineer focusing o...
Most popular book by Stian Thorgersen
Keycloak - Identity and Access Management for Modern Applications
José Manuel Ortega
LinkedinGithub
Jos Manuel Ortega is a software engineer, focusing on new technologies, open source, security, and testing. His career goal has been to specialize in Python and security testing projects. In recent years, he has developed an interest in security development, especially in pentesting with Python. Currently, he is working as a security tester engineer and his functions in the role involves the analysis and testing of the security of applications in both web and mobile environments. He has taught at university level and collaborated with the offic...
Most popular book by José Manuel Ortega
Mastering Python for Networking and Security
Viktor Hedberg
LinkedinGithub
Viktor is a Cyber Security Consultant / Security Advisor for Truesec, based in Sweden. Specializing in Microsoft technologies whether on-premises or in the cloud, Viktor strives to secure all workloads as well as taking part in Incident Response to help organizations respond, recover, and rebuild from an attack. He has 10 years of experience in the IT industry, during this time he has worked for a number of government entities and as a consultant helped a number of global organizations with designing and implementing various Microsoft workloads...
Most popular book by Viktor Hedberg
Microsoft Information Protection Administrator SC-400 Certification Guide