Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate e…
Shelve Penetration Testing: A Hands-On Introduction to Hacking
This book is meant to help the reader learn how to program in C. It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a wor…
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
Shelve The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides the…
Shelve The Hacker Playbook 2: Practical Guide To Penetration Testing
In his first book since the bestselling Fermat’s Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, n…
Shelve The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Jus…
Shelve Black Hat Python: Python Programming for Hackers and Pentesters
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-…
Shelve Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Python's simplicity lets you become productive quickly, but this often means you aren't using everything it has to offer. With this hands-on guide, you'll learn how to write effective, idiomatic Pytho…
Shelve Fluent Python: Clear, Concise, and Effective Programming
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
A landmark volume in science writing by one of the great minds of our time, Stephen Hawking’s book explores such profound questions as: How did the universe begin—and what made its start possible? Doe…
This visually stunning book with over 250 full-color illustrations, many of them never before published, is based on Carl Sagan’s thirteen-part television series. Told with Sagan’s remarkable ability …
Foundation and Empire tells the incredible story of a new breed of man who create a new force for galactic government. Thus, the Foundation hurtles into conflict with the decadent, decrepit First Empi…
So far the Foundation was safe. But there was a hidden Second Foundation to protect the first. The Mule has yet to find it, but he was getting closer all the time. The men of the Foundation sought it,…
Isaac Asimov's I, Robot launches readers on an adventure into a not-so-distant future where man and machine , struggle to redefinelife, love, and consciousness—and where the stakes are nothing less th…
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hack…
Shelve The Pentester BluePrint: Starting a Career as an Ethical Hacker
Winner of the Hugo, Nebula, and Philip K. Dick Awards, Neuromancer is a science fiction masterpiece—a classic that ranks as one of the twentieth century’s most potent visions of the future.
The New York Times bestselling series that inspired the international hit video game: The Witcher Geralt is a witcher: guardian of the innocent; protector of those in need; a defender, in d…