Library

Explore 200,000 online courses/books/problem sets in over 2,050 subjects. From Computer Science, Business, and Personal Development to Arts, STEM, and more. Find your perfect MOOC.

Library

Learning Product
Subject
Difficulty
Cost
Certificate
Provider
Publisher
University
Institution
Tag

Publisher : 20 ×

The Android Malware Handbook

This groundbreaking guide to Android malware distills years of research by machine learning experts in academia and members of Meta and Google’s Android Security teams into a comprehensive...

Books No Starch Press 💰 Information Security

The Android Malware Handbook

This groundbreaking guide to Android malware distills years of research by machine learning experts in academia and members of Meta and Google’s Android Security teams into a...

The Art of Mac Malware

Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide to...

Books No Starch Press 💰 Information Security

The Art of Mac Malware

Defenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. The Art of Mac Malware: The Guide...

The Ghidra Book

The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency’s most challenging reverse-engineering problems. With...

Books No Starch Press 💰 Information Security

The Ghidra Book

The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency’s most challenging reverse-engineering problems....

Rootkits and Bootkits

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware.With the aid of numerous case studies and...

Books No Starch Press 💰 Information Security

Rootkits and Bootkits

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware.With the aid of numerous case studies...

Practical Binary Analysis

As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us...

Books No Starch Press 💰 Information Security

Practical Binary Analysis

As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep...

Malware Data Science

"Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant...

Books No Starch Press 💰 Information Security

Malware Data Science

"Security has become a ""big data"" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of...

Friends with Benefits

The rules of marketing have changed. Savvy marketing professionals know that they must engage with individuals directly on the Web, and smart businesses know that customers can become friends—with...

Books No Starch Press 💰 Business

Friends with Benefits

The rules of marketing have changed. Savvy marketing professionals know that they must engage with individuals directly on the Web, and smart businesses know that customers can...

Math for Security

Explore the intersection of mathematics and computer security with this engaging and accessible guide.Math for Security will equip you with essential tools to tackle complex security problems head...

Books No Starch Press 💰 Mathematics

Math for Security

Explore the intersection of mathematics and computer security with this engaging and accessible guide.Math for Security will equip you with essential tools to tackle complex security problems...

The Shape of Data

Whether you’re a mathematician, seasoned data scientist, or marketing professional, you’ll find The Shape of Data to be the perfect introduction to the critical interplay between the geometry of...

Books No Starch Press 💰 Mathematics

The Shape of Data

Whether you’re a mathematician, seasoned data scientist, or marketing professional, you’ll find The Shape of Data to be the perfect introduction to the critical interplay between the geometry...

Hardcore Programming for Mechanical Engineers

This book will teach you how to solve engineering problems with Python. The “hardcore” approach means that you will learn to get the correct results by coding everything from scratch. Forget...

Books No Starch Press 💰 Engineering

Hardcore Programming for Mechanical Engineers

This book will teach you how to solve engineering problems with Python. The “hardcore” approach means that you will learn to get the correct results by coding everything from scratch....

AVR Workshop

AVR Workshop is a comprehensive introduction to working with the Microchip AVR 8-bit family of microcontrollers – made famous through their use in Arduino and other compatible boards. Whether...

Books No Starch Press 💰 Computer Science

AVR Workshop

AVR Workshop is a comprehensive introduction to working with the Microchip AVR 8-bit family of microcontrollers – made famous through their use in Arduino and other compatible boards....

The Book of I2C

If you work with embedded systems, youâ??re bound to encounter the ubiquitous Inter-Integrated Circuit bus (IIC, I2C, or I²C)â??a serial protocol for connecting integrated circuits in a computer...

Books No Starch Press 💰 Computer Science

The Book of I2C

If you work with embedded systems, youâ??re bound to encounter the ubiquitous Inter-Integrated Circuit bus (IIC, I2C, or I²C)â??a serial protocol for connecting integrated circuits in a...

Pentesting Azure Applications

"Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies....

Books No Starch Press 💰 Programming

Pentesting Azure Applications

"Pentesting Azure Applications is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous...

Coding with Minecraft

You’ve mined for diamonds, crafted dozens of tools, and built all sorts of structures—but what if you could program robots to do all of that for you in a fraction of the time?In Coding with...

Books No Starch Press 💰 Education & Teaching

Coding with Minecraft

You’ve mined for diamonds, crafted dozens of tools, and built all sorts of structures—but what if you could program robots to do all of that for you in a fraction of the time?In Coding...

Practical Doomsday

As a leading security engineer, Michal Zalewski has spent his career methodically anticipating and planning for cyberattacks. In Practical Doomsday, Zalewski applies the same thoughtful, rational...

Books No Starch Press 💰 Social Sciences

Practical Doomsday

As a leading security engineer, Michal Zalewski has spent his career methodically anticipating and planning for cyberattacks. In Practical Doomsday, Zalewski applies the same thoughtful,...

My New iPad 2

The iPad is cute, lovable, fun to play with, and a bit mysterious. This new edition of the best-selling My New iPad removes the mystery, showing every user how to get the most from their new iPad. A...

Books No Starch Press 💰 Social Sciences

My New iPad 2

The iPad is cute, lovable, fun to play with, and a bit mysterious. This new edition of the best-selling My New iPad removes the mystery, showing every user how to get the most from their new iPad....

My New iPad, 2nd Edition

The iPad is cute, lovable, fun to play with, and a bit mysterious. This second edition of the best-selling My New iPad removes the mystery, showing every user how to get more from their new iPad....

Books No Starch Press 💰 Social Sciences

My New iPad, 2nd Edition

The iPad is cute, lovable, fun to play with, and a bit mysterious. This second edition of the best-selling My New iPad removes the mystery, showing every user how to get more from their new...

The Complete Developer

Whether you’ve been in the developer kitchen for decades or are just taking the plunge to do it yourself, The Complete Developer will show you how to build and implement every component of a modern...

Books No Starch Press 💰 Programming

The Complete Developer

Whether you’ve been in the developer kitchen for decades or are just taking the plunge to do it yourself, The Complete Developer will show you how to build and implement every component of a...

The Book of Audacity

The Book of Audacity shows you how to complete fun and useful projects with Audacity, the cross-platform, open source audio editor and recorder. You'll learn how to digitize your vinyl record...

Books No Starch Press 💰 Art & Design

The Book of Audacity

The Book of Audacity shows you how to complete fun and useful projects with Audacity, the cross-platform, open source audio editor and recorder. You'll learn how to digitize your vinyl...

MySQL Crash Course

MySQL Crash Course is a fast-paced, no-nonsense introduction to relational database development. It’s filled with practical examples and expert advice that will have you up and running...

Books No Starch Press 💰 Programming

MySQL Crash Course

MySQL Crash Course is a fast-paced, no-nonsense introduction to relational database development. It’s filled with practical examples and expert advice that will have you up and...

Records : 240 of 354 | Page : of 18