Machine Learning for Hackers
If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …
iOS 5 Programming Cookbook
Now you can overcome the vexing, real-life issues you confront when creating apps for the iPhone, iPad, or iPod Touch. By making use of more than 100 new recipes in this …
CompTIA Network+ Lab Manual
Think of the most common and challenging tasks that network administrators face, then read this book and find out how to perform those tasks, step by step. CompTIA Network + …
Programming Perl, 4th Edition
Adopted as the undisputed Perl bible soon after the first edition appeared in 1991, Programming Perl is still the go-to guide for this highly practical language. Perl began …
CompTIA Security+ SY0-301 Authorized Cert Guide, 2nd Edition
Learn, prepare, and practice for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT Certification …
The CERT Guide to Insider Threats
Since 2001, the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than …
Low Tech Hacking: Street Smarts for Security Professionals
When talking about hacking, many of us primarily think about software vulnerabilities, exploits, malware and coding. But as social engineering began to grab headlines, the …
The Internet of Things: Key Applications and Protocols
The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and …
Practical Malware Analysis
Malware. You know what it is. Perhaps you’ve even fought a malware infection or two. Wouldn’t it be nice if the good guys finally had one really complete guide to …
Microsoft Windows Operating System Essentials
Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System …
Inside Cyber Warfare, 2nd Edition
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare – without truly realizing the scope …
Making Embedded Systems
Embedded systems control many devices in common use today, from digital watches and iPods to traffic lights and the systems controlling nuclear power plants. Since …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility