Hacking Books



Bookstore > Books > Hacking

Exploring the Data Jungle

FREE EBOOK - Exploring the Data Jungle

by Brian Godsey

Some people like to believe that all data is ready to be used immediately. Not so! Data in the wild is hard to track and harder to understand, and the first job of data scientists to identify and prepare data so it can be used. To find your way through the data jungle successfully, you need the right perspective and guidance. (There's no point hacking at overgrowth with a spoon after all!) Identify and prep...

Publisher:  Manning  |  Release:  2017

Hacking Exposed Malware & Rootkits, 2nd Edition

Hacking Exposed Malware & Rootkits, 2nd Edition

by Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters

Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded ...

Price:  $22.94  |  Publisher:  McGraw-Hill  |  Release:  2016

Hacking Exposed Industrial Control Systems

Hacking Exposed Industrial Control Systems

by Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effec...

Price:  $34.33  |  Publisher:  McGraw-Hill  |  Release:  2016

Hacking Android

Hacking Android

by Srinivasa Rao Kotipalli, Mohammed A. Imran

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.Hacking Android...

Price:  $30.99  |  Publisher:  Packt Publishing  |  Release:  2016

Common Lisp Recipes

Common Lisp Recipes

by Edmund Weitz

Find solutions to problems and answers to questions you are likely to encounter when writing real-world applications in Common Lisp. This book covers areas as diverse as web programming, databases, graphical user interfaces, integration with other programming languages, multi-threading, and mobile devices as well as debugging techniques and optimization, to name just a few. Written by an author who has used...

Price:  $35.13  |  Publisher:  Apress  |  Release:  2016

Mastering Kali Linux Wireless Pentesting

Mastering Kali Linux Wireless Pentesting

by Brian Sak, Jilumudi Raghu Ram

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit.This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration te...

Price:  $49.99  |  Publisher:  Packt Publishing  |  Release:  2016

Penetration Testing with Raspberry Pi

Penetration Testing with Raspberry Pi

by Joseph Muniz, Aamir Lakhani

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyze...

Price:  $17.99  |  Publisher:  Packt Publishing  |  Release:  2015

Network Attacks and Exploitation

Network Attacks and Exploitation

by Matthew Monte

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop d...

Price:  $26.66  |  Publisher:  Wiley  |  Release:  2015

Machine Learning Projects for .NET Developers

Machine Learning Projects for .NET Developers

by Mathias Brandewinder

Machine Learning Projects for .NET Developers shows you how to build smarter .NET applications that learn from data, using simple algorithms and techniques that can be applied to a wide range of real-world problems. You'll code each project in the familiar setting of Visual Studio, while the machine learning logic uses F#, a language ideally suited to machine learning applications in .NET. If you're new to ...

Price:  $49.99  |  Publisher:  Apress  |  Release:  2015

Data Science from Scratch

Data Science from Scratch

by Joel Grus

Data science libraries, frameworks, modules, and toolkits are great for doing data science, but they're also a good way to dive into the discipline without actually understanding data science. In this book, you'll learn how many of the most fundamental data science tools and algorithms work by implementing them from scratch.If you have an aptitude for mathematics and some programming skills, author Joel Gru...

Price:  $29.25  |  Publisher:  O'Reilly Media  |  Release:  2015

Pages: ←Previous | 1, 2, 3, 4, 5 ... 7 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.