When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Jus…
Shelve Black Hat Python: Python Programming for Hackers and Pentesters
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.…
Shelve Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
This book is meant to help the reader learn how to program in C. It is the definitive reference guide, now in a second edition. Although the first edition was written in 1978, it continues to be a wor…
Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and autom…
Shelve Black Hat Go: Go Programming For Hackers and Pentesters
Attacking Network Protocols is a deep dive into network protocol security from James -Forshaw, one of the world's leading bug -hunters. This comprehensive guide looks at networking from an attacker's …
Shelve Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you?
In "Automate…
Shelve Automate the Boring Stuff with Python: Practical Programming for Total Beginners
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Shelve Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic…
Shelve Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Python Crash Course is a fast-paced, thorough introduction to programming with Python that will have you writing programs, solving problems, and making things that work in no time.
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us the ingenious ways we manipulate language and invent new means of communicating with…
Shelve Code: The Hidden Language of Computer Hardware and Software
Rootkits and Bootkits delivers a master class in malware evolution that will give you the techniques and tools necessary to counter sophisticated, advanced threats. We're talking hard stuff - attacks …
Shelve Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
Data is at the center of many challenges in system design today. Difficult issues need to be figured out, such as scalability, consistency, reliability, efficiency, and maintainability. In addition, w…
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
Shelve The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painl…
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface—the interface employed by nearly every application that runs on a Linux or UNIX system.
In thi…
Shelve The Linux Programming Interface: A Linux and UNIX System Programming Handbook
An algorithm is nothing more than a step-by-step procedure for solving a problem. The algorithms you'll use most often as a programmer have already been discovered, tested, and proven. If you want to …
Shelve Grokking Algorithms An Illustrated Guide For Programmers and Other Curious People
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teac…
Shelve Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
The definitive guide to incident response--updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensic…
Shelve Incident Response & Computer Forensics, Third Edition
Straight from the programming trenches, The Pragmatic Programmer cuts through the increasing specialization and technicalities of modern software development to examine the core process--taking a …
Shelve The Pragmatic Programmer: From Journeyman to Master
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
If they were a hall of fame or shame for computer hackers, a Kevin Mitnick plaque would be mounted the near the entrance. While other nerds were fumbling with password possibilities, this adept break-…
Shelve Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
In the digital age, where web applications form the crux of our interconnected existence, Web Hacking A Practical Guide To Modern Web Pentesting emerges as an essential guide to mastering the art …
Shelve Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/…
Shelve The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate e…
Shelve Penetration Testing: A Hands-On Introduction to Hacking
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hack…
Shelve The Pentester BluePrint: Starting a Career as an Ethical Hacker
Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP…
Written by hackers for hackers, this hands-on book teaches penetration testers how to identify vulnerabilities in apps that use GraphQL, a data query and manipulation language for APIs adopted by majo…
Shelve Black Hat GraphQL: Attacking Next Generation APIs
Deep learning is applicable to a widening range of artificial intelligence problems, such as image classification, speech recognition, text classification, question answering, text-to-speech, and opti…