No Starch (9 kníh )
-
Al Sweigart Automate the Boring Stuff with Python EN
If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you? In Automate the Boring Stuff with Python, you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand-no prior programming experience required. Once you've mastered the basics of…
-
Jon Erickson Hacking EN
While other books merely show how to run existing exploits, Hacking: The Art of Exploitation broke ground as the first book to explain how hacking and software exploits work and how readers could develop and implement their own. In the extensively updated and expanded second edition, author Jon Erickson again uses practical examples to illustrate the most common computer security issues in three related fields:…
-
Miran Lipovača Learn You a Haskell for Great Good! EN
It's all in the name: Learn You a Haskell for Great Good! is a hilarious, illustrated guide to this complex functional language. Packed with the author's original artwork, pop culture references, and most importantly, useful example code, this book teaches functional fundamentals in a way you never thought possible. You'll start with the kid stuff: basic syntax, recursion, types and type classes. Then once you've…
-
David Kennedy, Jim O'gorman Metasploit EN
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you've…
-
Georgia Weidman Penetration Testing EN
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that…
-
Chris Sanders Practical Packet Analysis EN
It’s easy to capture packets with Wireshark, the world’s most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what’s happening on your network? Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You’ll find added coverage…
-
Evan Amos The Game Console
The Game Console is a tour through the evolution of video game hardware, with gorgeous full-color photos of 86 consoles. You'll start your journey with legendary consoles like the Magnavox Odyssey, Atari 2600, Nintendo Entertainment System, ....
-
Alice Finch The Lego Architecture Idea Book
Take your creations to the next level with The LEGO Architecture Idea Book! These clever building tips will give you endless inspiration for making your own amazing mansions, castles, houses, spooky shacks, and more. Every chapter includes ideas for creat
-
Williams E. Shotts The Linux Command Line
No Starch Press: You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus:…