The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users... Zobraziť viac
This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out... Zobraziť viac
An accessible, comic book-like, illustrated introduction to how the internet works under the hood, designed to give people a basic understanding of the technical aspects of the Internet that they need in order to advocate for digital rights... Zobraziť viac
This revised and expanded second edition of the bestselling The Game Console contains brand new content, with coverage of 50 more consoles, variants, and accessories in 50 added pages... Zobraziť viac
Engineering in Plain Sight is a beautifully illustrated field guide to the infrastructure around us.Engineering in Plain Sight extends the field guide genre from natural phenomena to human-made structures... Zobraziť viac
PoC or GTFO, Volume 2 follows-up the wildly popular first volume with issues 9-13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays... Zobraziť viac
Scientific progress depends on good research, and good research needs good statistics. But statistical analysis is tricky to get right, even for the best and brightest of us. You'd be surprised how many scientists are doing it wrong... Zobraziť viac
It's all in the name: Learn You a Haskell for Great Good! is a hilarious, illustrated guide to this complex functional language. Packed with the author's original artwork, pop culture references, and most importantly, useful example code, this ... Zobraziť viac
It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network? ... Zobraziť viac
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, ... Zobraziť viac
The Game Console is a tour through the evolution of video game hardware, with gorgeous full-color photos of 86 consoles. You'll start your journey with legendary consoles like the Magnavox Odyssey, Atari 2600, Nintendo Entertainment System, .... Zobraziť viac
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book... Zobraziť viac
Take your creations to the next level with The LEGO Architecture Idea Book! These clever building tips will give you endless inspiration for making your own amazing mansions, castles, houses, spooky shacks, and more. Every chapter includes ideas for creat Zobraziť viac
If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you? In Automate the Boring Stuff with Python, you'll learn how to ... Zobraziť viac
Far from child's play. An astonishing collection." -Publishers Weekly Mix hundreds of thousands of LEGO bricks with dozens... Zobraziť viac