Hack Books



Bookstore > Books > Hack

Programming Google Glass, 2nd edition

Programming Google Glass, 2nd edition

by Eric Redmond

This is your all-inclusive guidebook for programming Glassware. You'll learn the nuances of the Mirror API and the recently released GDK as you build example applications: a restaurant finder, blogging app, Glass stats monitor, party animator, QR code reader, video game, and more.You'll jump right in with a fun application that leverages the power of the Mirror API web service, Google's serve...

Publisher:  The Pragmatic Programmers  |  Release:  2015

Anti-Hacker Tool Kit, 4th Edition

Anti-Hacker Tool Kit, 4th Edition

by Mike Shema

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition inclu...

Price:  $32.99  |  Publisher:  McGraw-Hill  |  Release:  2014

Android Hacker's Handbook

Android Hacker's Handbook

by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security arc...

Price:  $12.00  |  Publisher:  Wiley  |  Release:  2014

The Browser Hacker's Handbook

The Browser Hacker's Handbook

by Wade Alcorn, Christian Frichot, Michele Orru

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.The web browser has become the most popular and widely used computer &a...

Price:  $44.99  |  Publisher:  Wiley  |  Release:  2014

Hacking Point of Sale

Hacking Point of Sale

by Slava Gomzin

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of ma...

Price:  $32.99  |  Publisher:  Wiley  |  Release:  2014

Black Hat Python

Black Hat Python

by Justin Seitz

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities - writing network sniffers, manipulating packets, infecting virtual machines, creating s...

Price:  $29.17  |  Publisher:  No Starch Press  |  Release:  2014

iPad and iPhone Kung Fu

iPad and iPhone Kung Fu

by Keir Thomas

A shortcut straight to power-user level with over 300 tips, tricks, hints, and hacks to make your Apple device the one thing you can't live without. Learn the secrets of FaceTime, Maps, Safari, and Mail. Transform your Apple device into a go-to office tool, as well as tighten security to deter theft. Designed to be dipped into, most tips in iPad and iPhone Kung Fu take only a minute to implement, but w...

Price:  $6.99  |  Publisher:  The Pragmatic Programmers  |  Release:  2014

Computer Security Handbook, 6th Edition

Computer Security Handbook, 6th Edition

by Seymour Bosworth, Michel E. Kabay, Eric Whyne

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and co...

Price:  $184.99  |  Publisher:  Wiley  |  Release:  2014

Practical Reverse Engineering

Practical Reverse Engineering

by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, sec...

Price:  $40.99  |  Publisher:  Wiley  |  Release:  2014

Cybersecurity for Executives

Cybersecurity for Executives

by Gregory J. Touhill, C. Joseph Touhill

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business.Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public R...

Price:  $70.81  |  Publisher:  Wiley  |  Release:  2014

Pages: ←Previous | 1 ... 11, 12, 13, 14, 15 ... 21 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.