by Ben Edmunds
Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.Is your PHP app truly secure? Let's make sure you get home on time and sleep well at night. Learn the security basics that a senior developer usu...
Price: $22.99 | Publisher: Apress | Release: 2016
Foundations for Analytics with Python
by Clinton Brownley
If you're like many of Excel's 750 million users, you want to do more with your data - like repeating similar analyses over hundreds of files, or combining data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale the processing and analysis of data in different formats - by using Python.After author Clinton Brownley takes you throu...
Price: $35.99 | Publisher: O'Reilly Media | Release: 2016
Raspberry Pi Cookbook, 2nd Edition
by Simon Monk
With millions of new users and several new models, the Raspberry Pi ecosystem continues to expand - along with a lot of new questions about the Pi's capabilities. The second edition of this popular cookbook provides more than 240 hands-on recipes for running this tiny low-cost computer with Linux, programming it with Python, and hooking up sensors, motors, and other hardware - including Arduino and the...
Price: $8.76 | Publisher: O'Reilly Media | Release: 2016
Mastering Kali Linux Wireless Pentesting
by Brian Sak, Jilumudi Raghu Ram
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit.This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration te...
Price: $49.99 | Publisher: Packt Publishing | Release: 2016
The Antivirus Hacker's Handbook
by Joxean Koret, Elias Bachaalany
The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering p...
Price: $44.32 | Publisher: Wiley | Release: 2015
by Owen Yamauchi
A couple of years ago, Facebook switched its production servers from a PHP-to-C++ compiler to their own HipHop Virtual Machine (HHVM) and then launched a new version of PHP to run on HHVM called Hack. This comprehensive guide - written by a member of the core HHVM and Hack teams at Facebook - shows you how to get up and running with both HHVM and Hack.What makes them useful? The HHVM engine is faster and mo...
Price: $7.00 | Publisher: O'Reilly Media | Release: 2015
Penetration Testing with Raspberry Pi
by Joseph Muniz, Aamir Lakhani
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyze...
Price: $24.99 | Publisher: Packt Publishing | Release: 2015
by Michael Bowles
Machine Learning in Python shows you how to successfully analyze data using only two core machine learning algorithms, and how to apply them using Python. By focusing on two algorithm families that effectively predict outcomes, this book is able to provide full descriptions of the mechanisms at work, and the examples that illustrate the machinery with specific, hackable code. The algorithms are explained in...
Price: $25.97 | Publisher: Wiley | Release: 2015
Network Attacks and Exploitation
by Matthew Monte
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop d...
Price: $26.66 | Publisher: Wiley | Release: 2015
Machine Learning Projects for .NET Developers
by Mathias Brandewinder
Machine Learning Projects for .NET Developers shows you how to build smarter .NET applications that learn from data, using simple algorithms and techniques that can be applied to a wide range of real-world problems. You'll code each project in the familiar setting of Visual Studio, while the machine learning logic uses F#, a language ideally suited to machine learning applications in .NET. If you'...
Price: $49.99 | Publisher: Apress | Release: 2015