Hack Books



Bookstore > Books > Hack

Securing PHP Apps

Securing PHP Apps

by Ben Edmunds

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.Is your PHP app truly secure? Let's make sure you get home on time and sleep well at night. Learn the security basics that a senior developer usu...

Price:  $22.99  |  Publisher:  Apress  |  Release:  2016

Foundations for Analytics with Python

Foundations for Analytics with Python

by Clinton Brownley

If you're like many of Excel's 750 million users, you want to do more with your data - like repeating similar analyses over hundreds of files, or combining data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale the processing and analysis of data in different formats - by using Python.After author Clinton Brownley takes you throu...

Price:  $35.99  |  Publisher:  O'Reilly Media  |  Release:  2016

Raspberry Pi Cookbook, 2nd Edition

Raspberry Pi Cookbook, 2nd Edition

by Simon Monk

With millions of new users and several new models, the Raspberry Pi ecosystem continues to expand - along with a lot of new questions about the Pi's capabilities. The second edition of this popular cookbook provides more than 240 hands-on recipes for running this tiny low-cost computer with Linux, programming it with Python, and hooking up sensors, motors, and other hardware - including Arduino and the...

Price:  $8.76  |  Publisher:  O'Reilly Media  |  Release:  2016

Mastering Kali Linux Wireless Pentesting

Mastering Kali Linux Wireless Pentesting

by Brian Sak, Jilumudi Raghu Ram

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit.This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration te...

Price:  $49.99  |  Publisher:  Packt Publishing  |  Release:  2016

The Antivirus Hacker's Handbook

The Antivirus Hacker's Handbook

by Joxean Koret, Elias Bachaalany

The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering p...

Price:  $44.32  |  Publisher:  Wiley  |  Release:  2015

Hack and HHVM

Hack and HHVM

by Owen Yamauchi

A couple of years ago, Facebook switched its production servers from a PHP-to-C++ compiler to their own HipHop Virtual Machine (HHVM) and then launched a new version of PHP to run on HHVM called Hack. This comprehensive guide - written by a member of the core HHVM and Hack teams at Facebook - shows you how to get up and running with both HHVM and Hack.What makes them useful? The HHVM engine is faster and mo...

Price:  $7.00  |  Publisher:  O'Reilly Media  |  Release:  2015

Penetration Testing with Raspberry Pi

Penetration Testing with Raspberry Pi

by Joseph Muniz, Aamir Lakhani

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyze...

Price:  $24.99  |  Publisher:  Packt Publishing  |  Release:  2015

Machine Learning in Python

Machine Learning in Python

by Michael Bowles

Machine Learning in Python shows you how to successfully analyze data using only two core machine learning algorithms, and how to apply them using Python. By focusing on two algorithm families that effectively predict outcomes, this book is able to provide full descriptions of the mechanisms at work, and the examples that illustrate the machinery with specific, hackable code. The algorithms are explained in...

Price:  $25.97  |  Publisher:  Wiley  |  Release:  2015

Network Attacks and Exploitation

Network Attacks and Exploitation

by Matthew Monte

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop d...

Price:  $26.66  |  Publisher:  Wiley  |  Release:  2015

Machine Learning Projects for .NET Developers

Machine Learning Projects for .NET Developers

by Mathias Brandewinder

Machine Learning Projects for .NET Developers shows you how to build smarter .NET applications that learn from data, using simple algorithms and techniques that can be applied to a wide range of real-world problems. You'll code each project in the familiar setting of Visual Studio, while the machine learning logic uses F#, a language ideally suited to machine learning applications in .NET. If you'...

Price:  $49.99  |  Publisher:  Apress  |  Release:  2015

Pages: ←Previous | 1 ... 9, 10, 11, 12, 13 ... 21 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.