Marknadens största urval
Snabb leverans

Böcker utgivna av No Starch Press,US

Filter
Filter
Sortera efterSortera Populära
  • - The Guide to Finding and Reporting Web Vulnerabilities
    av Vickie Li
    566,-

    Bug bounty programmes are company-sponsored programmes that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry. You''ll learn how to hack mobile apps, find vulnerabilities in APIs, and automate your hacking process. By the end of the book, you''ll have learned the tools and techniques necessary to be a competent web hacker and find bugs on a bug bounty programme.

  • - Master OOP by Building Games and GUIs
    av Irv Kalb
    520,-

    Power up your Python with object-oriented programming and learn how to write powerful, efficient, and re-usable code.Object-Oriented Python is an intuitive and thorough guide to mastering object-oriented programming from the ground up. You’ll cover the basics of building classes and creating objects, and put theory into practice using the pygame package with clear examples that help visualize the object-oriented style. You’ll explore the key concepts of object-oriented programming — encapsulation, polymorphism, and inheritance — and learn not just how to code with objects, but the absolute best practices for doing so. Finally, you’ll bring it all together by building a complex video game, complete with full animations and sounds. The book covers two fully functional Python code packages that will speed up development of graphical user interface (GUI)  programs in Python.

  • - A Hands-on Introduction to Breaking In
    av Daniel Graham
    560,-

    A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you’ll use to traverse a private network. You’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: Deploying the Metasploit framework’s reverse shells and embedding them in innocent-seeming filesCapturing passwords in a corporate Windows network using MimikatzScanning (almost) every device on the internet to find potential victimsInstalling Linux rootkits that modify a victim’s operating systemPerforming advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you’ll be able to think like an ethical hacker⁠: someone who can carefully analyze systems and creatively gain access to them.

  • - A Hands-On Guide
    av Sam Grubb
    304,99

  • - Creative Coding with Processing.py
    av Tristan Bunn
    566,-

  • - Real Threats, Practical Defense
    av Malcolm McDonald
    352,-

    Website security made easy! Covers the most common ways websites get hacked and how web developers can defend themselves.

  • - Build Your Own Mini Medieval World
    av Jeff Friesen
    336,-

    Build beautiful, microscale-sized LEGO castles complete with surrounding miniature medieval realms.

  • - 30 Clever Coding and Electronics Projects for Kids
    av Simon Monk
    326,-

    28 mad scientist themed projects and experiments to teach STEM topics and coding with the BBC micro:bit.

  • - 50 Easy-to-Build Animals
    av Jody Padulano
    266,-

    A children's book that shows how to build 50 simple models of LEGO animals using only standard LEGO parts that every LEGO fan has in their collection.The LEGO Zoo book shows kids of any age how to build 50 simple animal models using only standard LEGO parts that are already likely to be in their collection. You'll learn how to build models of animals like crocodiles, zebras, wolves, lions, flamingos, plus many more. Projects are ordered by increasing difficulty making it easy to jump in without getting in over your head. The animals are so cute and goofy, whether building as a family or solo The LEGO Zoo is sure to deliver a roaring good time!

  • av Matt Timmons-Brown
    326,-

    Learn how to build your own robots with just the Raspberry Pi microcomputer and a few easy-to-get components. No prior experience necessary!

  • - Reversing Modern Malware and Next Generation Threats
    av Alex Matrosov
    566,-

    A master class in malware evolution that will give you the techniques and tools necessary to counter sophisticated, advanced threats.

  • av Bruce Nikkel
    566,-

    Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.You'll learn how to:-Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies-Protect attached evidence media from accidental modification-Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal-Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping-Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt-Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others-Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged mediaWith its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

  • av Masaaki Mitani
    326,-

    The latest release in the best-selling Manga Guide series explains how cryptographic ciphers work and how to crack them.

  • - An Introduction to Building and Breaking Ciphers
    av Al Sweigart
    386,-

    Learn to program with Python by making and hacking ciphers - no experience required!

  • av Shin Takahashi
    320,-

    The Manga Guide to Regression Analysis is a cartoon guide that makes mastering simple, multiple, and binomial logistic regression analysis fun and straightforward.

  • av Oyvind Nydal Dahl
    336,-

    Full of fun examples and color illustrations, Electronics for Kids is a playful introduction to circuits that will help any beginner get started.

  • av Tilman M. Davies
    686,-

    The Book of R teaches statistics and programming in R for beginners.

  • av Marina Umaschi Bers
    270,-

    The Official ScratchJr Book is an easy-to-use interactive hands on guide for parents and teachers, written by the creators of ScratchJr.

  • av Mattia Zamboni
    340,-

    Eye-catching photography and instructions for building tiny, imaginative models of vehicles, ships, aircraft, a space shuttle, and more using a minimum of parts

  • av Justin Seitz
    390,-

    Black Hat Python explores the darker side of Python's capabilities, helping you test your systems and improve your security posture.

  • av Pawel Sariel Kmiec
    386,-

    Incredible Technic showcases spectacular models built with the LEGO Technic system, complete with diagrams and design notes.

  • av Carlos Bueno
    210,-

    Lauren Ipsum introduces kids to computer science through a whimsical story that never once mentions computers!

  • av Laurens Valk
    407,-

    The LEGO MINDSTORMS EV3 Discovery Book is a complete beginner's guide to the EV3 kit from bestselling author and robotics expert Laurens Valk.

  • av Alex Reinhart
    320,-

    Statistics Done Wrong describes how researchers often go wrong and teaches you the best practices for avoiding their mistakes

  • av Shin Takahashi
    326,-

  • av Daniel Higginbotham
    460,-

    Clojure for the Brave and True is an epic introduction to functional programming with Clojure.

  • av Georgia Weidman
    596,-

    In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs.

  • av Norman Matloff
    460,-

    R is the world's most popular language for developing statistical software: Archaeologists use it to track the spread of ancient civilizations, drug companies use it to discover which medications are safe and effective, and actuaries use it to assess financial risks and keep economies running smoothly.The Art of R Programming takes you on a guided tour of software development with R, from basic types and data structures to advanced topics like closures, recursion, and anonymous functions. No statistical knowledge is required, and your programming skills can range from hobbyist to pro.Along the way, you'll learn about functional and object-oriented programming, running mathematical simulations, and rearranging complex data into simpler, more useful formats. You'll also learn to:-Create artful graphs to visualize complex data sets and functions-Write more efficient code using parallel R and vectorization-Interface R with C/C++ and Python for increased speed or functionality-Find new R packages for text analysis, image manipulation, and more-Squash annoying bugs with advanced debugging techniquesWhether you're designing aircraft, forecasting the weather, or you just need to tame your data, The Art of R Programming is your guide to harnessing the power of statistical computing.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.