{"id":542,"count":2,"description":"In this category, you will find all the books related to Ethical Hacking, White Hat Hacking, Penetration Testing and Network Security to learn all about IT Security!\u00a0We will feature hacking books of all learning levels. This will include beginner, intermediate and professional.","link":"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/","name":"Ethical Hacking Books","slug":"ethical-hacking-books","taxonomy":"category","parent":0,"meta":[],"yoast_head":"\nEthical Hacking Books - SecuredYou<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethical Hacking Books - SecuredYou\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/\" \/>\n<meta property=\"og:site_name\" content=\"SecuredYou\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@secured_you\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":\"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/\",\"url\":\"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/\",\"name\":\"Ethical Hacking Books - SecuredYou\",\"isPartOf\":{\"@id\":\"https:\/\/www.securedyou.com\/#website\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/#breadcrumb\"},\"inLanguage\":\"en-US\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.securedyou.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ethical Hacking Books\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.securedyou.com\/#website\",\"url\":\"https:\/\/www.securedyou.com\/\",\"name\":\"SecuredYou\",\"description\":\"Cyber Security Tips - Guides - How-tos\",\"publisher\":{\"@id\":\"https:\/\/www.securedyou.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.securedyou.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.securedyou.com\/#organization\",\"name\":\"SecuredYou\",\"url\":\"https:\/\/www.securedyou.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png\",\"contentUrl\":\"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png\",\"width\":430,\"height\":82,\"caption\":\"SecuredYou\"},\"image\":{\"@id\":\"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/securedyou\/\",\"https:\/\/twitter.com\/secured_you\",\"https:\/\/www.instagram.com\/securedyou\/\",\"https:\/\/www.linkedin.com\/company\/secured-you\/\",\"https:\/\/www.pinterest.com\/securedyou\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ethical Hacking Books - SecuredYou","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/","og_locale":"en_US","og_type":"article","og_title":"Ethical Hacking Books - SecuredYou","og_url":"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/","og_site_name":"SecuredYou","twitter_card":"summary_large_image","twitter_site":"@secured_you","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"CollectionPage","@id":"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/","url":"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/","name":"Ethical Hacking Books - SecuredYou","isPartOf":{"@id":"https:\/\/www.securedyou.com\/#website"},"breadcrumb":{"@id":"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/#breadcrumb"},"inLanguage":"en-US"},{"@type":"BreadcrumbList","@id":"https:\/\/www.securedyou.com\/category\/ethical-hacking-books\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.securedyou.com\/"},{"@type":"ListItem","position":2,"name":"Ethical Hacking Books"}]},{"@type":"WebSite","@id":"https:\/\/www.securedyou.com\/#website","url":"https:\/\/www.securedyou.com\/","name":"SecuredYou","description":"Cyber Security Tips - Guides - How-tos","publisher":{"@id":"https:\/\/www.securedyou.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.securedyou.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.securedyou.com\/#organization","name":"SecuredYou","url":"https:\/\/www.securedyou.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png","contentUrl":"https:\/\/www.securedyou.com\/wp-content\/uploads\/2018\/03\/securedyou-logo.png","width":430,"height":82,"caption":"SecuredYou"},"image":{"@id":"https:\/\/www.securedyou.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/securedyou\/","https:\/\/twitter.com\/secured_you","https:\/\/www.instagram.com\/securedyou\/","https:\/\/www.linkedin.com\/company\/secured-you\/","https:\/\/www.pinterest.com\/securedyou\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/categories\/542"}],"collection":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/taxonomies\/category"}],"wp:post_type":[{"href":"https:\/\/www.securedyou.com\/wp-json\/wp\/v2\/posts?categories=542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}