- 18 книг
DEFCON Computer Reference
18 книг
DEFCON Computer Reference
TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today’s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates ea...
"Thorough and comprehensive coverage from one of the foremost experts in browser security."
Tavis Ormandy, Google Inc.
Modern web applications are built on a tangle ...
Stealing the Network: The Complete Series Collector's Edition
Johnny Long, Ryan Russell, Timothy Mullen
0
(0)This unique and insightful book challenges our prevailing and often fallacious attitudes about schooling. In today’s volatile job market, ideas are more important than tra...
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the ...
Python Essential Reference is the definitive reference guide to the Python programming language — the one authoritative handbook that reliably untangles and explains both ...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Майкл Сикорски, Эндрю Хониг
5
(3)Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and preven...
It's all in the name: Learn You a Haskell for Great Good! is a hilarious, illustrated guide to this complex functional language. Packed with the author's original artwork,...
Este libro esta orientado a personas entusiasmadas con la programacion, especialmente con la programacion web. Puede ver mas informacion en http://www.librosenred.com/libr...
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Man...
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The...
I am not a recruiter. I am a software engineer. And as such, I know what it's like to be asked to whip up brilliant algorithms on the spot and then write flawless code on ...
Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking courses at both the undergraduate and graduate level in Computer Science, Elect...
Compilers: Principles, Techniques, and Tools
Альфред В. Ахо, Моника С. Лам, Рави Сети, Джеффри Дэвид Ульман
4,9
(10)Compilers: Principles, Techniques and Tools, known to professors, students, and developers worldwide as the "Dragon Book," is available in a new edition. Every chapter ha...
Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popula...
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from begin...
Must-have guide for professionals responsible for securing credit and debit card transactions
As recent breaches like Target and Neiman Marcus show, payment card inform...
This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers...


















