Hack Books



Bookstore > Books > Hack

Hacking For Dummies, 6th Edition

Hacking For Dummies, 6th Edition

In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that i...
Gray Hat Hacking, 5th Edition

Gray Hat Hacking, 5th Edition

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-t...
Hacking Product Design

Hacking Product Design

Understand how designing a technology product in a startup environment is markedly different from product design at established companies. This book teaches product designers how to think and frame problems in the dynamic context of startups. You will discover how to enhance your soft skills that are often not taught, but are crucial to y...
JavaScript on Things

JavaScript on Things

JavaScript on Things is your first step into the exciting and downright entertaining world of programming for small electronics. If you know enough JavaScript to hack a website together, you'll be making things go bleep, blink, and spin faster than you can say "nodebot".Are you ready to make things move? If you can build a web a...
Learn Ethical Hacking from Scratch

Learn Ethical Hacking from Scratch

This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi net...
Web Penetration Testing with Kali Linux, 3rd Edition

Web Penetration Testing with Kali Linux, 3rd Edition

Web Penetration Testing with Kali Linux - 3rd Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-si...
Python For Offensive PenTest

Python For Offensive PenTest

Python is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script.This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is di...
Open Source Intelligence Methods and Tools

Open Source Intelligence Methods and Tools

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring in...
Practical Video Game Bots

Practical Video Game Bots

Develop and use bots in video gaming to automate game processes and see possible ways to avoid this kind of automation. This book explains how bots can be very helpful in games such as multiplayer online games, both for training your character and for automating repetitious game processes in order to start a competition with human opponen...
Firewalls Don't Stop Dragons

Firewalls Don't Stop Dragons

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself - step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and...
Learning Perl 6

Learning Perl 6

If you're ready to get started with Perl 6, this is the book you want, whether you're a programmer, system administrator, or web hacker. Perl 6 is a new language - a modern reinvention of Perl suitable for almost any task, from short fixes to complete web applications. This hands-on tutorial gets you started.Author brian d foy (Mastering ...
Learning Kali Linux

Learning Kali Linux

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capabilities and helps you identify the tools...
Cracking Codes with Python

Cracking Codes with Python

Learn how to program in Python while making and breaking ciphers - algorithms used to create and send secret messages!After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple program...
PoC||GTFO, Volume 2

PoC||GTFO, Volume 2

The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This 2nd collected volume holds all of the articles from releases nine to thirteen.Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary aud...
Secret Recipes of the Python Ninja

Secret Recipes of the Python Ninja

This book covers the unexplored secrets of Python, delve into its depths, and uncover its mysteries.You'll unearth secrets related to the implementation of the standard library, by looking at how modules actually work. You'll understand the implementation of collections, decimals, and fraction modules. If you haven't used decorators, coro...
Learn Social Engineering

Learn Social Engineering

This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages ...
Kali Linux Web Penetration Testing Cookbook, 2nd Edition

Kali Linux Web Penetration Testing Cookbook, 2nd Edition

Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing.Kali Linux Web...
Mastering Python for Networking and Security

Mastering Python for Networking and Security

It's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident, usually carried out by just hacking a simple network line. Increasing your network's security helps step up your defenses against cyber attacks. Meanwhile, Python is being used for increasingly advanced...
Java Deep Learning Projects

Java Deep Learning Projects

Java is one of the most widely used programming languages. With the rise of deep learning, it has become a popular choice of tool among data scientists and machine learning experts.Java Deep Learning Projects starts with an overview of deep learning concepts and then delves into advanced projects. You will see how to build several project...
The Hardware Hacker

The Hardware Hacker

For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in ma...

Pages: 1, 2, 3 ... 7 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.