Norges billigste bøker

Bøker utgitt av No Starch Press,US

Filter
Filter
Sorter etterSorter Populære
  • av Corey J. Ball
    669,-

    Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure. You’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you’ll learn to perform common attacks, like those targeting an API’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You’ll also learn techniques for bypassing protections against these attacks. In the book’s nine guided labs, which target intentionally vulnerable APIs, you’ll practice:Enumerating APIs users and endpoints using fuzzing techniquesUsing Postman to discover an excessive data exposure vulnerabilityPerforming a JSON Web Token attack against an API authentication processCombining multiple API attack techniques to perform a NoSQL injectionAttacking a GraphQL API to uncover a broken object level authorization vulnerability By the end of the book, you’ll be prepared to uncover those high-payout API bugs other hackers aren’t finding and improve the security of applications on the web.

  • - Ace the Coding Interview with Python and Javascript
    av Al Sweigart
    464,-

    An accessible yet rigorous crash course on recursive programming using Python and JavaScript examples.Recursion has an intimidating reputation: it's considered to be an advanced computer science topic frequently brought up in coding interviews. But there's nothing magical about recursion. The Recursive Book of Recursion uses Python and JavaScript examples to teach the basics of recursion, exposing the ways that it's often poorly taught and clarifying the fundamental principles of all recursive algorithms. You'll learn when to use recursive functions (and, most importantly, when not to use them), how to implement the classic recursive algorithms often brought up in job interviews, and how recursive techniques can help solve countless problems involving tree traversal, combinatorics, and other tricky topics. This project-based guide contains complete, runnable programs to help you learn: How recursive functions make use of the call stack, a critical data structure almost never discussed in lessons on recursionHow the head-tail and "leap of faith" techniques can simplify writing recursive functionsHow to use recursion to write custom search scripts for your filesystem, draw fractal art, create mazes, and moreHow optimization and memoization make recursive algorithms more efficient Al Sweigart has built a career explaining programming concepts in a fun, approachable manner. If you've shied away from learning recursion but want to add this technique to your programming toolkit, or if you're racing to prepare for your next job interview, this book is for you.

  • - The Guide to Analyzing Malicious Software
    av Patrick Wardle
    579,-

    A comprehensive guide to the threats facing Apple computers and the foundational knowledge needed to become a proficient Mac malware analyst.Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to Analyzing Malicious Software is a comprehensive handbook to cracking open these malicious programs and seeing what’s inside. Discover the secrets of nation state backdoors, destructive ransomware, and subversive cryptocurrency miners as you uncover their infection methods, persistence strategies, and insidious capabilities. Then work with and extend foundational reverse-engineering tools to extract and decrypt embedded strings, unpack protected Mach-O malware, and even reconstruct binary code. Next, using a debugger, you’ll execute the malware, instruction by instruction, to discover exactly how it operates. In the book’s final section, you’ll put these lessons into practice by analyzing a complex Mac malware specimen on your own.You’ll learn to:Recognize common infections vectors, persistence mechanisms, and payloads leveraged by Mac malwareTriage unknown samples in order to quickly classify them as benign or maliciousWork with static analysis tools, including disassemblers, in order to study malicious scripts and compiled binariesLeverage dynamical analysis tools, such as monitoring tools and debuggers, to gain further insight into sophisticated threatsQuickly identify and bypass anti-analysis techniques aimed at thwarting your analysis attemptsA former NSA hacker and current leader in the field of macOS threat analysis, Patrick Wardle uses real-world examples pulled from his original research. The Art of Mac Malware: The Guide to Analyzing Malicious Software is the definitive resource to battling these ever more prevalent and insidious Apple-focused threats.

  • - The Guide to Finding and Reporting Web Vulnerabilities
    av Vickie Li
    579,-

    Bug bounty programmes are company-sponsored programmes that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry. You''ll learn how to hack mobile apps, find vulnerabilities in APIs, and automate your hacking process. By the end of the book, you''ll have learned the tools and techniques necessary to be a competent web hacker and find bugs on a bug bounty programme.

  • - Master OOP by Building Games and GUIs
    av Irv Kalb
    559,-

    Power up your Python with object-oriented programming and learn how to write powerful, efficient, and re-usable code.Object-Oriented Python is an intuitive and thorough guide to mastering object-oriented programming from the ground up. You’ll cover the basics of building classes and creating objects, and put theory into practice using the pygame package with clear examples that help visualize the object-oriented style. You’ll explore the key concepts of object-oriented programming — encapsulation, polymorphism, and inheritance — and learn not just how to code with objects, but the absolute best practices for doing so. Finally, you’ll bring it all together by building a complex video game, complete with full animations and sounds. The book covers two fully functional Python code packages that will speed up development of graphical user interface (GUI)  programs in Python.

  • - A Hands-on Introduction to Breaking In
    av Daniel Graham
    579,-

    A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans.A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you’ll use to traverse a private network. You’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: Deploying the Metasploit framework’s reverse shells and embedding them in innocent-seeming filesCapturing passwords in a corporate Windows network using MimikatzScanning (almost) every device on the internet to find potential victimsInstalling Linux rootkits that modify a victim’s operating systemPerforming advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you’ll be able to think like an ethical hacker⁠: someone who can carefully analyze systems and creatively gain access to them.

  • - A Hands-On Guide
    av Sam Grubb
    324,-

  • - Creative Coding with Processing.py
    av Tristan Bunn
    619,-

    An accessible, visual, and creative approach to teaching Python programming using the software literacy-focused Processing development environment. Readers learn the foundations of programming as they write code that produces creative, intriguing, and aesthetically-pleasing results.An accessible, visual, and creative approach to teaching Python programming using the Processing development environment. Readers learn the theoretical and technical workings of computer programming as they write code that produces intriguing and aesthetically-pleasing results. Based on a decade's worth of lecturing experience, the author covers what works best for those looking to learn programming fundamentals in a visual context. These skills provide an entry point into the world of code art, making video games, web development, and other creative technologies.Among the topics covered in the book, readers will learn how computers manage color, how to draw and animate with code, how to add randomness to programs, some data visualization techniques, and handling mouse and keyboard interaction.

  • - Real Threats, Practical Defense
    av Malcolm McDonald
    385,-

    Website security made easy! Covers the most common ways websites get hacked and how web developers can defend themselves.

  • - Build Your Own Mini Medieval World
    av Jeff Friesen
    343,-

    Build beautiful, microscale-sized LEGO castles complete with surrounding miniature medieval realms.

  • - 30 Clever Coding and Electronics Projects for Kids
    av Simon Monk
    282,-

    28 mad scientist themed projects and experiments to teach STEM topics and coding with the BBC micro:bit.

  • - 50 Easy-to-Build Animals
    av Jody Padulano
    227,-

    A children's book that shows how to build 50 simple models of LEGO animals using only standard LEGO parts that every LEGO fan has in their collection.The LEGO Zoo book shows kids of any age how to build 50 simple animal models using only standard LEGO parts that are already likely to be in their collection. You'll learn how to build models of animals like crocodiles, zebras, wolves, lions, flamingos, plus many more. Projects are ordered by increasing difficulty making it easy to jump in without getting in over your head. The animals are so cute and goofy, whether building as a family or solo The LEGO Zoo is sure to deliver a roaring good time!

  • av Matt Timmons-Brown
    344,-

    Learn how to build your own robots with just the Raspberry Pi microcomputer and a few easy-to-get components. No prior experience necessary!

  • - Reversing Modern Malware and Next Generation Threats
    av Alex Matrosov
    534,-

    A master class in malware evolution that will give you the techniques and tools necessary to counter sophisticated, advanced threats.

  • av Bruce Nikkel
    579,-

    Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.You'll learn how to:-Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies-Protect attached evidence media from accidental modification-Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal-Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping-Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt-Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others-Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged mediaWith its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

  • av Masaaki Mitani
    329,-

    The latest release in the best-selling Manga Guide series explains how cryptographic ciphers work and how to crack them.

  • - An Introduction to Building and Breaking Ciphers
    av Al Sweigart
    339,-

    Learn to program with Python by making and hacking ciphers - no experience required!

  • av Shin Takahashi
    344,-

    The Manga Guide to Regression Analysis is a cartoon guide that makes mastering simple, multiple, and binomial logistic regression analysis fun and straightforward.

  • av Oyvind Nydal Dahl
    246,-

    Full of fun examples and color illustrations, Electronics for Kids is a playful introduction to circuits that will help any beginner get started.

  • av Tilman M. Davies
    739,-

    The Book of R teaches statistics and programming in R for beginners.

  • av Marina Umaschi Bers
    200,-

    The Official ScratchJr Book is an easy-to-use interactive hands on guide for parents and teachers, written by the creators of ScratchJr.

  • av Mattia Zamboni
    324,-

    Eye-catching photography and instructions for building tiny, imaginative models of vehicles, ships, aircraft, a space shuttle, and more using a minimum of parts

  • av Justin Seitz
    434,-

    Black Hat Python explores the darker side of Python's capabilities, helping you test your systems and improve your security posture.

  • av Pawel Sariel Kmiec
    384,-

    Incredible Technic showcases spectacular models built with the LEGO Technic system, complete with diagrams and design notes.

  • av Carlos Bueno
    224,-

    Lauren Ipsum introduces kids to computer science through a whimsical story that never once mentions computers!

  • av Laurens Valk
    432,-

    The LEGO MINDSTORMS EV3 Discovery Book is a complete beginner's guide to the EV3 kit from bestselling author and robotics expert Laurens Valk.

  • av Alex Reinhart
    324,-

    Statistics Done Wrong describes how researchers often go wrong and teaches you the best practices for avoiding their mistakes

  • av Shin Takahashi
    324,-

  • av Daniel Higginbotham
    484,-

    Clojure for the Brave and True is an epic introduction to functional programming with Clojure.

  • av Georgia Weidman
    579,-

    In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.