Search results for ""No Starch Press,US""
No Starch Press,US The Android Malware Handbook: Using Manual Analysis and ML-Based Detection
This comprehensive guide to Android malware introduces current threats facing the world's most widely used operating system. After exploring the history of attacks seen in the wild since the time Android first launched, including several malware families previously absent from the literature, you'll practice static and dynamic approaches to analysing real malware specimens. Next, you'll examine the machine-learning techniques used to detect malicious apps, the types of classification models that defenders can use, and the various features of malware specimens that can become input to these models. You'll then adapt these machine-learning strategies to the identification of malware categories like banking trojans, ransomware, and SMS fraud. You'll learn: How historical Android malware can elevate your understanding of current threats; How to manually identify and analyse current Android malware using static and dynamic reverse-engineering tools; How machine-learning algorithms can anal
£43.19
No Starch Press,US Hacks, Leaks, And Revelations: The Art of Analyzing Hacked and Leaked Data
In the age of hacking and whistleblowing, the internet contains massive troves of leaked information containing goldmines of newsworthy revelations in the public interest - if you know how to unravel them. For investigative journalists or amateur researchers with or without prior programming knowledge, this book gives you the technical expertise to find and interrogate complex datasets, transforming unintelligible files into ground-breaking reports. Through hands-on assignments and examples that highlight real-world cases, information security expert and well-known investigative journalist Micah Lee guides you through the process of analysing leaked datasets from governments, companies, and political groups. You'll dig into hacked files from the BlueLeaks dataset of law enforcement records, analyse social media traffic from those behind the 2021 insurrection at the US Capitol, hear the exclusive story of privately leaked data from the anti-vaccine group America's Frontline Doctors, an
£43.19
No Starch Press,US The Book Of I2c
If you work with embedded systems, you're bound to encounter the ubiquitous Inter-Integrated Circuit bus (IIC, I2C, or I2C) - a serial protocol for connecting integrated circuits in a computer system. In The Book of I2C, the first comprehensive guide to this bus, bestselling author Randall Hyde draws on 40 years of industry experience to get you started designing and programming I2C systems.
£43.19
No Starch Press,US Engineering in Plain Sight: An Illustrated Field Guide to the Constructed Environment
Engineering in Plain Sight is a beautifully illustrated field guide to the infrastructure around us. Engineering in Plain Sight extends the field guide genre from natural phenomena to human-made structures, making them approachable and understandable to non-engineers. It transforms readers' perspectives of the built environment, converting the act of looking at infrastructure from a mundane inevitability into an everyday diversion and joy. Each section of this accessible, informative book features colorful illustrations revealing the fascinating details of how the human-made world works. An ideal road trip companion, this book offers a fresh perspective on the parts of the environment that often blend into the background. Readers will learn to identify characteristics of the electrical grid, roadways, railways, bridges, tunnels, waterways, and more. Engineering in Plain Sight inspires curiosity, interest, and engagement in how the infrastructure around us is designed and constructed.
£30.59
No Starch Press,US Javascript Crash Course
JavaScript is the programming language of the internet - the secret sauce that makes websites dynamic, responsive, and all-around awesome. This fast-paced tutorial quickly teaches total beginners how to code in this popular, easy-to-learn language. Light-hearted and hands-on, the book introduces you to programming essentials through fun examples, hands-on exercises, and cool projects like building a Pong-style computer game. You''ll discover all of the important aspects of the language (without delving into expert-level nitty-gritty details or confusing jargon) as you develop a fast knack for programming with JavaScript. Learn fundamental JS coding concepts, including objects, functions, arrays, and loops, explore key web programming topics, like interactivity and drawing graphics with Canvas, use JavaScript to make games, apps, and even create music.
£43.19
No Starch Press,US The Art Of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime
Today, companies find themselves targeted by sophisticated nation state cyber attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players, the techniques they use, and the process of analysing their advanced attacks. Whether you're an individual researcher or part of a team within a Security Operations Center (SoC), you'll learn to approach, track, and attribute attacks to these advanced actors. Jon DiMaggio demonstrates some of the techniques he has employed to uncover crucial information about the 2021 Colonial Pipeline attacks, among others.
£34.19
No Starch Press,US Lego Technic Non-electric Models: Compelling Contraptions
Get inspired by the fun, creative projects found in LEGO Technic Non-Electric Models: Compelling Contraptions. Each project uses colour-coded pieces and is illustrated with photographs taken from multiple angles, making it easy to see how the models are assembled.Compelling Contraptions features a variety of interesting mechanisms, including drawing devices, spinning tops, measuring tools, and stands for your phone or tablet. This visual guide is the brainchild of master builder Yoshihito Isogawa and is designed to fire the imaginations of LEGO builders young and old.
£21.59
No Starch Press,US Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you ll explore the darker side of Python s capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You ll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate comèmon malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend th
£38.69
No Starch Press,US Practical Social Engineering: A Primer for the Ethical Hacker
Readers learn how to leverage human psychology and publicly available information to attack a target. The book includes sections on how to evade detection, spear phish, generate reports, and protect victims to ensure their well-being. Readers learn how to collect information about a target and how to exploit that information to make their attacks more effective. They also learn how to defend themselves or their workplace against social engineering attacks.
£30.59
No Starch Press,US Practical Deep Learning: A Python-Based Introduction
Deep Learning for Complete Beginners: A Python-Based Introduction is for complete beginners in machine learning. It introduces fundamental concepts such as classes and labels, building a dataset, and what a model is and does before presenting classic machine learning models, neural networks, and modern convolutional neural networks. Experiments in Python - working with leading open-source toolkits and standard datasets - give the reader hands-on experience with each model and help them build intuition about how to transfer the examples in the book to their own projects.
£51.29
No Starch Press,US The Game Console 2.0: A Photographic History From Atari to Xbox
This revised and expanded second edition of the bestselling The Game Console contains brand new content, with coverage of 50 more consoles, variants, and accessories in 50 added pages. The Game Console 2.0 is a gorgeous coffee table book for geeks and gamers that brings together highly detailed photos of more than 100 video game consoles and their electronic interiors spanning nearly five decades.
£34.19
No Starch Press,US Write Great Code, Volume 2, 2nd Edition
The second edition of the second volume in the highly-regarded Write Great Code series, teachinh readers how to produce better machine code by directing the actions of their chosen compiler. This second edition has been updated to cover high-level programming languages (such as Swift and Java) as well as code generation on 64-bit CPUsARM, the Java Virtual Machine, and the Microsoft Common Runtime.
£43.19
No Starch Press,US Build A Lego Mustang
Detailed, step-by-step instructions for recreating a classic 1960s Mustang with LEGO elements. The build, designed by famous Technic inventor Sariel, includes working steering, and operable doors and hood, as well as plenty of ideas for customisation.
£17.09
No Starch Press,US Poc || Gtfo
This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out. PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide. Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like 'Reliable Code Execution on a Tamagotchi,' 'ELFs are Dorky, Elves are Cool,' 'Burning a Phone,' 'Forget Not the Humble Timing Attack,' and 'A Sermon on Hacker Privilege.' Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.
£34.19
No Starch Press,US The Manga Guide To Microprocessors
Hailed as stimulus for the next generation of scientists by Scientific Computing, each volume in the highly acclaimed Manga Guide series teaches complex math and science topics with the aid of authentic Japanese manga comics. The latest in the series, The Manga Guide to Microprocessors, tackles microprocessors (the brain inside all computers), binary, microprocessor architecture, digital operations, even basic, low-level programming. Perfect for beginners, computer science students, or simply the computer-aficionado who wants a deeper understanding of the inner workings of microprocessors.
£21.59
No Starch Press,US The Smart Girl's Guide To Privacy
The whirlwind of social media, online dating, and mobile apps can make life a dream or a nightmare. For every trustworthy website, there are countless jerks, bullies, and scam artists who want to harvest your personal information for their own purposes. But you can fight back, right now. In The Smart Girl s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue s practical, user-friendly advice will teach you how to: Delete personal content from websites Use website and browser privacy controls effectively Recover from and prevent identity theft Figure out where the law protects you and where it doesn t Set up safe online profiles Remove yourself from people-finder websites Even if your privacy has already been compromised, don t panic. It s not too late to take control. Let The Smart Girl s Guide to Privacy help you cut through the confusion and start protecting your online life
£15.29
No Starch Press,US Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You'll learn how to: Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases
£51.29
No Starch Press,US The Lego Technic Idea Book: Wheeled Wonders
The LEGO® Technic Idea Book: Wheeled Wonders is a collection of hundreds of mechanisms for cars, trucks, motorcycles, and other vehicles that you can build based on their pictures alone. Each project uses color-coded pieces and is photographed from multiple angles, making it easy to see how the models are assembled without the need for step-by-step instructions. Every model illustrates a different principle, concept, or mechanism that will inspire your own original creations. You're encouraged to use these elements as building blocks to create your own masterpieces. The Technic models in Wheeled Wonders spin or move things, drag race, haul heavy gear, bump off walls, wind up and go, and much more. You'll discover how to build differential gears, implement steering and suspension, and design clutch and transmission systems to use in your own vehicles. This visual guide, the second in the three-volume LEGO Technic Idea Book series, is the brainchild of master builder Yoshihito Isogawa o
£17.09
No Starch Press,US Devops For The Desperate: A Hands-On Survival Guide
This book introduces fundamental concepts software developers need to know to flourish in a modern DevOps environment including infrastructure as code, configuration management, security, containerization and orchestration, monitoring and alerting, and troubleshooting. Readers will follow along with hands-on examples to learn how to tackle common DevOps tasks.
£26.09
No Starch Press,US The LEGO (R) Engineer
LEGO (R) bricks meet The Way Things Work in this fun, informative tour of the world of engineering, from the creative mind of expert LEGO (R) builder Jeff Friesen. In The LEGO (R) Engineer, you'll explore how some of humanity's greatest feats of engineering work, from towering skyscrapers to powerful rockets to speeding bullet trains. Then follow step-by-step instructions to build these marvels with LEGO (R) bricks as you experience the world of engineering in a fun new way. How do diesel and electric engines work together to drive massive freight trains? How does a container ship's bow shape contribute to its fuel efficiency? How do cable-stayed bridges distribute weight differently than suspension bridges? You'll learn the answers to these engineering questions and more as you build your way through over 30 models, all designed by LEGO (R) expert Jeff Friesen. Understanding the engineering principles behind these structures will not only help you better appreciate the world around you, but will also help you make your own LEGO (R) builds more realistic.
£21.59
No Starch Press,US Practical Linux Forensics: A Guide for Digital Investigators
Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. You'll learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, reconstruct past activity from incidents, how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments.
£51.29
No Starch Press,US Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities
Bug bounty programmes are company-sponsored programmes that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry. You'll learn how to hack mobile apps, find vulnerabilities in APIs, and automate your hacking process. By the end of the book, you'll have learned the tools and techniques necessary to be a competent web hacker and find bugs on a bug bounty programme.
£43.19
No Starch Press,US Designing Secure Software: A Guide for Developers
Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written for a wide range of software professionals, it emphasizes building security into software design early and involving the entire team in the process. The book begins with a discussion of core concepts. The second part, perhaps this book's most important contribution, covers the process of designing and reviewing a software design with security considerations in mind. The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written in C and Python to illustrate implementation vulnerabilities.
£43.19
No Starch Press,US How To Hack Like A Ghost: Breaching the Cloud
How to Hack Like a Ghost takes readers deep inside the mind of a hacker as they carry out a fictionalised attack against a tech company, teaching cutting-edge hacking techniques along the way. Readers shadow a hacker as they describe, with detailed code, how they might hack a tech company and escape detection. While the account is fictional, the tech company's vulnerabilities are drawn from real-life weaknesses common in today's corporate, cloud-based systems. By following along and studying the code, the reader learns practical, cutting-edge hacking techniques.
£30.59
No Starch Press,US Foundations Of Information Security: A Straightforward Introduction
Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.
£34.19
No Starch Press,US How Linux Works, 3rd Edition: What Every Superuser Should Know
In this third edition of the best selling How Linux Works, author Brian Ward peels back the layers of this well-loved operating system to make Linux internals accessible. Readers learn how Linux boots, how the kernel manages devices and device drivers, and how processes, networking, interfaces, firewalls, and servers work. They also learn how Linux-based development tools work, how to use shared libraries, and how to write effective shell scripts. This edition has been thoroughly updated and expanded with added coverage of Logical Volume Manager (LVM), virtualisation, and containers.
£40.49
No Starch Press,US ScratchJr Coding Cards: Creative Coding Activities
The ScratchJr Coding Cards are a deck of 75 activity cards covering fun and exciting projects designed to educate young children with the visual programming language, ScratchJr.ScratchJr is a free, introductory computer programming language that runs on iPads, Android tablets, Amazon tablets, and Chromebooks. Derived from Scratch, the wildly popular programming language used by millions of kids worldwide, ScratchJr helps even younger children (5 to 7 years old) create their own playful animations, interactive stories, and dynamic games.The ScratchJr Coding Cards encourage kids to think creatively and systematically while developing computational thinking skills. Kids will learn powerful ideas about computer science by using ScratchJr programming blocks to make characters move, jump, dance, sing, and more. As they work through the deck, they will become creative thinkers and problem solvers.Written by the ScratchJr co-creator, Prof. Marina Umaschi Bers, and Dr. Amanda Sullivan, the exercises in ScratchJr Coding Cards will encourage kids to develop coding skills as well as foundational concepts for literacy, math, planning, and problem-solving, all while having fun. The cards are created using the pedagogical approach developed by Prof. Bers to teach coding in a playful way to young children.
£19.51
No Starch Press,US Think Like A Programmer
The real challenge of programming isn't learning a language's syntax it's learning to creatively solve problems so you can build something great. In this one-of-a-kind text, author V. Anton Spraul breaks down the ways that programmers solve problems and teaches you what other introductory books often ignore: how to Think Like a Programmer. Each chapter tackles a single programming concept, like classes, pointers, and recursion, and open-ended exercises throughout challenge you to apply your knowledge. You'll also learn how to: Split problems into discrete components to make them easier to solve Make the most of code reuse with functions, classes, and libraries Pick the perfect data structure for a particular job Master more advanced programming tools like recursion and dynamic memory Organize your thoughts and develop strategies to tackle particular types of problems Although the book's examples are written in C++, the creative problem-solving concepts they illustrate go beyond a
£29.69
No Starch Press,US Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sysètem. Elenkov describes Android security archiètecture from the bottom up, delving into the impleèmentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. You ll learn: How Android permissions are declared, used, and enforced How Android manages application packages and employs code signing to verify their authenticity How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks About Android s credential storage system and APIs, which let applications store cryptographic ke
£43.19
No Starch Press,US Learn You A Haskell For Great Good
It's all in the name: Learn You a Haskell for Great Good! is a hilarious, illustrated guide to this complex functional language. Packed with the author's original artwork, pop culture references, and most importantly, useful example code, this book teaches functional fundamentals in a way you never thought possible. You'll start with the kid stuff: basic syntax, recursion, types and type classes. Then once you've got the basics down, the real black belt master-class begins: you'll learn to use applicative functors, monads, zippers, and all the other mythical Haskell constructs you've only read about in storybooks. As you work your way through the author's imaginative (and occasionally insane) examples, you'll learn to: Laugh in the face of side effects as you wield purely functional programming techniques Use the magic of Haskell's 'laziness' to play with infinite sets of data Organize your programs by creating your own types, type classes, and modules Use Haskell's elegant input/
£38.69
No Starch Press,US Learn To Code By Solving Problems: A Python Programming Primer
Learn to Program by Solving Problems is a practical introduction to programming using Python, one of the world's most popular programming languages. The book emphasises problem-solving strategies that teach readers not only the mechanics of coding, but how to think like savvy programmers. Teaches readers how to use Python to solve short, situational problems (for example, how to predict when a gambler will run out of money while playing slot machines; how to create a programme to track cell phone data usage; how to set up a system of identifying the popularity of berths in a parking lot).
£30.59
No Starch Press,US The Lego Adventure Book, Vol. 2
Join Megs and Brickbot on another exciting tour of LEGO building in this second volume of The LEGO Adventure Book series. As they track the Destructor and rebuild the models he destroys, you ll follow along and meet some of the world s best builders. Learn to create sleek spaceships, exotic pirate hideaways, fi re-breathing dragons, fast cars, and much more. With nearly 40 step-by-step breakdowns and 100 example models, The LEGO Adventure Book is sure to spark your imagination and keep you building!
£21.59
No Starch Press,US Evading Edr: The Definitive Guide to Defeating Endpoint Detection Systems.
Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you'll learn that EDR is not a magical black box - it's just a complex software application built around a few easy-to-understand components. The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
£51.29
No Starch Press,US The Rust Programming Language: 2nd Edition
With over 50,000 copies sold, The Rust Programming Language is the quintessential guide to programming in Rust. Thoroughly updated to Rust's latest version, this edition is considered the language's official documentation. The Rust Programming Language, 2nd Edition is the official language guide for Rust 2021, and the best way to get started with Rust. The new edition includes a quick-reference section on organizing code with modules, and improved closure examples of captures, the move keyboard, and Fn traits. From web apps to operating systems, Rust is the safe, fast, reliable programming language used for an expansive variety of applications. Revised and updated by the original authors, the second edition of The Rust Programming Language shows readers how to take full advantage of Rust 2021 features, from installation to creating robust and scalable programs. It begins with the basics, like creating functions and binding variables, then moves on to more advanced concepts, like error
£43.19
No Starch Press,US The Complete Developer
This book is an easy, hands-on introduction to the creation of web applications from the ground up. Each chapter covers a particular part of an application, introducing you to modern techniques and architectural patterns for achieving it - with a practical focus on the most popular tools, libraries, and frameworks used by today''s full-stack developers. You''ll learn to build an entire application from start to finish, from creating a Node.js server, to developing a front-end interface with React.js components and Next.js pages. You''ll then expand your web application by writing REST and GraphQL APIs, implementing middleware, and connecting your application to a MongoDB database on the back end. Finally, you''ll learn how to add OAuth authorization to your application, write automated tests with Jest, and deploy your project as microservices using Docker.You''ll learn:Contemporary best practices, like the use of a microservice architecture and test-driven development techniques, essen
£43.19
No Starch Press,US Math For Deep Learning: What You Need to Know to Understand Neural Networks
With Math for Deep Learning, you'll learn the essential mathematics used by and as a background for deep learning. You'll work through Python examples to learn key deep learning related topics in probability, statistics, linear algebra, differential calculus, and matrix calculus as well as how to implement data flow in a neural network, backpropagation, and gradient descent. You'll also use Python to work through the mathematics that underlies those algorithms and even build a fully-functional neural network. In addition you'll find coverage of gradient descent including variations commonly used by the deep learning community: SGD, Adam, RMSprop, and Adagrad/Adadelta.
£43.19
No Starch Press,US Cybersecurity For Small Networks: A No-Nonsense Guide for the Reasonably Paranoid
This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You'll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion.
£34.19
No Starch Press,US Automate The Boring Stuff With Python, 2nd Edition: Practical Programming for Total Beginners
In this second edition of Automate the Boring Stuff with Python, you'll learn the basics of programming in Python, the fastest growing programming language today, before moving on to create Python programs that effortlessly perform useful and impressive feats of automation. This updated edition is full of step-by-step instructions that walk through each programme. Practice projects at the end of each chapter challenge you to improve those programmes and use your newfound skills to automate similar tasks.
£34.19
No Starch Press,US Write Great Code, Volume 3: Engineering Software
This third volume in the Write Great Code series addresses the issues of creating readable and maintainable code that will generate awe from fellow programmers. No matter how efficient your code is, if it isn't readable and maintainable by others, then it's not great code. Great code must have a great design and must adhere to good coding standards. In this book, you'll learn things like coding styles, commenting, code layout, and other crucial coding tasks.
£43.19
No Starch Press,US Beyond The Basic Stuff With Python: Best Practices for Writing Clean Code
You're a student who wants to jumpstart their career with practical skills, or you're a self-taught beginner who has learned all you can from beginner programmer books and coding bootcamps. Now you're looking for the next step to becoming a real-world professional programmer so you can create your own apps and get started with your career. If that fits, then this book is for you! This book is perfect for self-taught programmers looking for the stuff intro books don't teach you and students wanting to get practical information before getting started with applying their new programming skills.
£29.69
No Starch Press,US Real-world Bug Hunting: A Field Guide to Web Hacking
Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualises them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google, Uber, and Starbucks. As you read each report, you'll gain deeper insight into how the vulnerabilities work and how you might find similar ones.
£34.19
No Starch Press,US The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
The Hardware Hacking Handbook is a deep dive into embedded security, perfect for readers interested in designing, analysing, and attacking devices. You'll start with a crash course in embedded security and hardware interfaces and learn how to set up a test lab. Real-world examples and hands-on labs throughout allow you to explore hardware interfaces and practice various attacks.
£43.19
No Starch Press,US Linux Basics For Hackers: Getting Started with Networking, Scripting, and Security in Kali
Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux. Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. As you progress, you'll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.
£34.19
No Starch Press,US Clojure For The Brave And True
For weeks, months nay! from the very moment you were born, you ve felt it calling to you. At long last you ll be united with the programming language you ve been longing for: Clojure! As a Lisp-style functional programming language, Clojure lets you write robust and elegant code, and because it runs on the Java Virtual Machine, you can take advantage of the vast Java ecosystem. Clojure for the Brave and True offers a 'dessert-first' approach: you ll start playing with real programs immediately, as you steadily acclimate to the abstract but powerful features of Lisp and functional programming. Inside you ll find an offbeat, practical guide to Clojure, filled with quirky sample programs that catch cheese thieves and track glittery vampires. Learn how to: Wield Clojure s core functions Use Emacs for Clojure development Write macros to modify Clojure itself Use Clojure s tools to simplify concurrency and parallel programming Clojure for the Brave and True assumes no prior experience w
£34.19
No Starch Press,US The Linux Programming Interface
The Linux Programming Interface (TLPI) is the definitive guide to the Linux and UNIX programming interface the interface employed by nearly every application that runs on a Linux or UNIX system. In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls and library functions that you need in order to master the craft of system programming, and accompanies his explanations with clear, complete example programs. You'll find descriptions of over 500 system calls and library functions, and more than 200 example programs, 88 tables, and 115 diagrams. You'll learn how to: Read and write files efficiently Use signals, clocks, and timers Create processes and execute programs Write secure programs Write multithreaded programs using POSIX threads Build and use shared libraries Perform interprocess communication using pipes, message queues, shared memory, and semaphores Write network applications with the sockets API While The L
£85.49
No Starch Press,US How Ai Works: From Sorcery to Science
Artificial intelligence is everywhere - from self-driving cars, to image generation from text, to the unexpected power of language systems like ChatGPT - yet few people seem to know how it all really works. How AI Works unravels the mysteries of artificial intelligence, without the complex math and unnecessary jargon. You'll learn: the relationship between artificial intelligence, machine learning, and deep learning; the history behind AI and why the artificial intelligence revolution is happening now; how decades of work in symbolic AI failed and opened the door for the emergence of neural networks; what neural networks are, how they are trained, and why all the wonder of modern AI boils down to a simple, repeated unit that knows how to multiply input numbers to produce an output number, and the implications of large language models, like ChatGPT and Bard, on our society - nothing will be the same again. AI isn't magic. If you've ever wondered how it works, what it can do, or why the
£26.09
No Starch Press,US Mastering Lego (r) Mindstorms: Build Better Robots with Python and Word Blocks
You've learned the basics of LEGO robotics, and now you're ready for more. Mastering LEGO MINDSTORMS teaches you everything you need to know to level up your robotics engineering skills, using examples compatible with the LEGO MINDSTORMS Robot Inventor and SPIKE Prime sets. In no time, you'll be programming autonomous robot vehicles, interactive games, LEGO musical instruments, and more.
£17.09
No Starch Press,US Python For Kids, 2nd Edition: A Playful Introduction to Programming
Python for Kids brings Python to life and brings kids (and their parents) into the wonderful world of programming. Author Jason R. Briggs guides readers through the basics, experimenting with unique (and often hilarious) example programs that feature ravenous monsters, secret agents, thieving ravens, and more. Full-colour illustrations keep things fun and engaging throughout! This second edition has been completely updated and revised to reflect the latest Python version and programming practices, with new puzzles to inspire readers to take their code farther than ever before.
£30.59