Hack Books



Bookstore > Books > Hack

Gray Hat Hacking, 5th Edition

Gray Hat Hacking, 5th Edition

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-t...
JavaScript on Things

JavaScript on Things

JavaScript on Things is your first step into the exciting and downright entertaining world of programming for small electronics. If you know enough JavaScript to hack a website together, you'll be making things go bleep, blink, and spin faster than you can say "nodebot".Are you ready to make things move? If you can build a web a...
Python For Offensive PenTest

Python For Offensive PenTest

Python is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script.This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is di...
Open Source Intelligence Methods and Tools

Open Source Intelligence Methods and Tools

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring in...
Cracking Codes with Python

Cracking Codes with Python

Learn how to program in Python while making and breaking ciphers - algorithms used to create and send secret messages!After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple program...
PoC||GTFO, Volume 2

PoC||GTFO, Volume 2

The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This 2nd collected volume holds all of the articles from releases nine to thirteen.Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary aud...
Secret Recipes of the Python Ninja

Secret Recipes of the Python Ninja

This book covers the unexplored secrets of Python, delve into its depths, and uncover its mysteries.You'll unearth secrets related to the implementation of the standard library, by looking at how modules actually work. You'll understand the implementation of collections, decimals, and fraction modules. If you haven't used decorators, coro...
Learn Social Engineering

Learn Social Engineering

This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates.Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages ...
Java Deep Learning Projects

Java Deep Learning Projects

Java is one of the most widely used programming languages. With the rise of deep learning, it has become a popular choice of tool among data scientists and machine learning experts.Java Deep Learning Projects starts with an overview of deep learning concepts and then delves into advanced projects. You will see how to build several project...
The Hardware Hacker

The Hardware Hacker

For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in ma...
Raspberry Pi For Dummies, 3rd Edition

Raspberry Pi For Dummies, 3rd Edition

With the invention of the unique credit card-sized single-board computer comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities with the Raspberry Pi - and this is the perfect guide to get you started. With this down-to-earth book, you'll quickly discover why the Raspberry Pi is in high demand!T...
C# 7.0 All-in-One For Dummies

C# 7.0 All-in-One For Dummies

C# know-how is a must if you want to be a professional Microsoft developer. It's also good to know a little C# if you're building tools for the web, mobile apps, or other development tasks. C# 7.0 All-in-One For Dummies offers a deep dive into C# for coders still learning the nuances of the valuable programming language. Pop it open to ge...
Learning HTTP/2

Learning HTTP/2

What can your organization gain by adopting HTTP/2? How about faster, simpler, and more robust websites and applications? This practical guide demonstrates how the latest version of the Hypertext Transfer Protocol can dramatically improve website and application performance. You'll take a deep dive into HTTP/2 details, and learn how this ...
Attacking Network Protocols

Attacking Network Protocols

Attacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world's leading bug ­hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately protect vulnerabilities.You'll start with a rundown of networking basics and proto...
Gray Hat C#

Gray Hat C#

Learn to use C#'s powerful set of core ­libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices.After a crash course in C# and some of its a...
Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. D...
Hacking Exposed Industrial Control Systems

Hacking Exposed Industrial Control Systems

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused...
Slack Hacks

Slack Hacks

We're surrounded with a myriad of communication tools: email, Skype, Twitter, Facebook, and Snapchat, to name a few. Slack is a newer communication tool, borrowing IRC concepts and transcending them with an intuitive interface that allows countless customizations and integrations - from other communication tools to bots, Kayak, Google, Ha...
Hacking Android

Hacking Android

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and sec...
Common Lisp Recipes

Common Lisp Recipes

Find solutions to problems and answers to questions you are likely to encounter when writing real-world applications in Common Lisp. This book covers areas as diverse as web programming, databases, graphical user interfaces, integration with other programming languages, multi-threading, and mobile devices as well as debugging techniques a...

Pages: 1, 2, 3 ... 7 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.