Hack Books



Bookstore > Books > Hack

Gray Hat C#

Gray Hat C#

by Brandon Perry

Learn to use C#'s powerful set of core ­libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices.After a crash course in C# and some of its advanced features, you'll learn how to: Generate shellco...

Price:  $17.99  |  Publisher:  No Starch Press  |  Release:  2017

Exploring the Data Jungle

FREE EBOOK - Exploring the Data Jungle

by Brian Godsey

Some people like to believe that all data is ready to be used immediately. Not so! Data in the wild is hard to track and harder to understand, and the first job of data scientists to identify and prepare data so it can be used. To find your way through the data jungle successfully, you need the right perspective and guidance. (There's no point hacking at overgrowth with a spoon after all!) Identify and...

Publisher:  Manning  |  Release:  2017

Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate...

Price:  $6.00  |  Publisher:  McGraw-Hill  |  Release:  2016

Hacking Exposed Industrial Control Systems

Hacking Exposed Industrial Control Systems

by Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effec...

Price:  $35.87  |  Publisher:  McGraw-Hill  |  Release:  2016

Slack Hacks

Slack Hacks

by Troy Mott

We're surrounded with a myriad of communication tools: email, Skype, Twitter, Facebook, and Snapchat, to name a few. Slack is a newer communication tool, borrowing IRC concepts and transcending them with an intuitive interface that allows countless customizations and integrations - from other communication tools to bots, Kayak, Google, Hacker News, and more. Slack glues together all of your favorite ap...

Publisher:  O'Reilly Media  |  Release:  2016

Hacking Android

Hacking Android

by Srinivasa Rao Kotipalli, Mohammed A. Imran

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.Hacking Android...

Price:  $30.99  |  Publisher:  Packt Publishing  |  Release:  2016

Common Lisp Recipes

Common Lisp Recipes

by Edmund Weitz

Find solutions to problems and answers to questions you are likely to encounter when writing real-world applications in Common Lisp. This book covers areas as diverse as web programming, databases, graphical user interfaces, integration with other programming languages, multi-threading, and mobile devices as well as debugging techniques and optimization, to name just a few. Written by an author who has used...

Price:  $35.13  |  Publisher:  Apress  |  Release:  2016

Junk Box Arduino

Junk Box Arduino

by James Strickland

We all hate to throw electronics away. Use your 5 volt Arduino and have fun with them instead! Raid your electronics junk box to build the Cestino (Arduino compatible) board and nine other electronics projects, from a logic probe to a microprocessor explorer, and learn some advanced, old-school techniques along the way. Don't have a well-stocked junk box? No problem. Nearly all the components used in t...

Price:  $38.77  |  Publisher:  Apress  |  Release:  2016

Building a Comprehensive IT Security Program

Building a Comprehensive IT Security Program

by Jeremy Wittkop

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing ...

Price:  $39.99  |  Publisher:  Apress  |  Release:  2016

Cyber-Physical Attack Recovery Procedures

Cyber-Physical Attack Recovery Procedures

by Luis Ayala

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those...

Price:  $44.99  |  Publisher:  Apress  |  Release:  2016

Pages: ←Previous | 1 ... 8, 9, 10, 11, 12 ... 21 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.