Programming Google Glass, 2nd edition
by Eric Redmond
This is your all-inclusive guidebook for programming Glassware. You'll learn the nuances of the Mirror API and the recently released GDK as you build example applications: a restaurant finder, blogging app, Glass stats monitor, party animator, QR code reader, video game, and more.You'll jump right in with a fun application that leverages the power of the Mirror API web service, Google's serve...
Publisher: The Pragmatic Programmers | Release: 2015
Anti-Hacker Tool Kit, 4th Edition
by Mike Shema
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition inclu...
Price: $32.99 | Publisher: McGraw-Hill | Release: 2014
by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security arc...
Price: $12.00 | Publisher: Wiley | Release: 2014
by Wade Alcorn, Christian Frichot, Michele Orru
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods.The web browser has become the most popular and widely used computer &a...
Price: $44.99 | Publisher: Wiley | Release: 2014
by Slava Gomzin
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of ma...
Price: $32.99 | Publisher: Wiley | Release: 2014
by Justin Seitz
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities - writing network sniffers, manipulating packets, infecting virtual machines, creating s...
Price: $29.17 | Publisher: No Starch Press | Release: 2014
by Keir Thomas
A shortcut straight to power-user level with over 300 tips, tricks, hints, and hacks to make your Apple device the one thing you can't live without. Learn the secrets of FaceTime, Maps, Safari, and Mail. Transform your Apple device into a go-to office tool, as well as tighten security to deter theft. Designed to be dipped into, most tips in iPad and iPhone Kung Fu take only a minute to implement, but w...
Price: $6.99 | Publisher: The Pragmatic Programmers | Release: 2014
Computer Security Handbook, 6th Edition
by Seymour Bosworth, Michel E. Kabay, Eric Whyne
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and co...
Price: $184.99 | Publisher: Wiley | Release: 2014
by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sebastien Josse
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, sec...
Price: $40.99 | Publisher: Wiley | Release: 2014
by Gregory J. Touhill, C. Joseph Touhill
Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business.Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; Covers 'What to Do When You Get Hacked?' including Business Continuity and Disaster Recovery planning, Public R...
Price: $70.81 | Publisher: Wiley | Release: 2014