Library

Explore 200,000 online courses/books/problem sets in over 2,050 subjects. From Computer Science, Business, and Personal Development to Arts, STEM, and more. Find your perfect MOOC.

Library

Learning Product
Subject
Difficulty
Cost
Certificate
Provider
Publisher
University
Institution
Tag

Publisher : 20 ×

Nagios, 2nd Edition

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution...

Books No Starch Press 💰 Programming

Nagios, 2nd Edition

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most...

Androids

In 2004, Android was two people who wanted to build camera software but couldn't get investors interested. Today, Android is a large team at Google, delivering an operating system (including camera...

Books No Starch Press 💰 Programming

Androids

In 2004, Android was two people who wanted to build camera software but couldn't get investors interested. Today, Android is a large team at Google, delivering an operating system (including...

Learn to Program with App Inventor

Build a mobile phone app!You've swiped and tapped your way through countless apps, but have you ever created one? Now you can, thanks to Learn to Program with App Inventor. In less than an hour,...

Books No Starch Press 💰 Programming

Learn to Program with App Inventor

Build a mobile phone app!You've swiped and tapped your way through countless apps, but have you ever created one? Now you can, thanks to Learn to Program with App Inventor. In less than an...

Coding iPhone Apps for Kids, 1st Edition

Apple's Swift is a powerful, beginner-friendly programming language that anyone can use to make cool apps for the iPhone or iPad. In Coding iPhone Apps for Kids, you'll learn how to use Swift to...

Books No Starch Press 💰 Programming

Coding iPhone Apps for Kids, 1st Edition

Apple's Swift is a powerful, beginner-friendly programming language that anyone can use to make cool apps for the iPhone or iPad. In Coding iPhone Apps for Kids, you'll learn how to use Swift...

Attacking Network Protocols

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's...

Books No Starch Press 💰 Computer Science

Attacking Network Protocols

Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an...

The Book of PF, 2nd Edition

This second edition of The Book of PF is an up-to-date, no-nonsense guide to harnessing the power of PF. Author Peter Hansteen covers NAT (network address translation) and redirection, wireless...

Books No Starch Press 💰 Computer Science

The Book of PF, 2nd Edition

This second edition of The Book of PF is an up-to-date, no-nonsense guide to harnessing the power of PF. Author Peter Hansteen covers NAT (network address translation) and redirection,...

Windows Security Internals

Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level implementations, whether to discover new vulnerabilities or protect against known...

Books No Starch Press 💰 Computer Science

Windows Security Internals

Windows Security Internals is a must-have for anyone needing to understand the Windows operating system's low-level implementations, whether to discover new vulnerabilities or protect against...

Evading EDR

Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these...

Books No Starch Press 💰 Computer Science

Evading EDR

Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how...

Cybersecurity for Small Networks

This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on exercises,...

Books No Starch Press 💰 Computer Science

Cybersecurity for Small Networks

This book is a straightforward series of projects that will teach you how to secure different facets of household or small-business networks from cyber attacks. Through guided, hands-on...

The Practice of Network Security Monitoring

Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate...

Books No Starch Press 💰 Computer Science

The Practice of Network Security Monitoring

Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies...

Network Know-How

Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group of computers...

Books No Starch Press 💰 Computer Science

Network Know-How

Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group...

The Manga Guide to Databases

Want to learn about databases without the tedium? With its unique combination of Japanese-style comics and serious educational content, The Manga Guide to Databases is just the book for you.Princess...

Books No Starch Press 💰 Programming

The Manga Guide to Databases

Want to learn about databases without the tedium? With its unique combination of Japanese-style comics and serious educational content, The Manga Guide to Databases is just the book...

The Book of PF

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher....

Books No Starch Press 💰 Programming

The Book of PF

OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a...

Practical Packet Analysis, 3rd Edition

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your...

Books No Starch Press 💰 Computer Science

Practical Packet Analysis, 3rd Edition

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on...

Practical Packet Analysis

It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you...

Books No Starch Press 💰 Computer Science

Practical Packet Analysis

It's easy enough to install Wireshark and begin capturing packets off the wire--or from the air. But how do you interpret those packets once you've captured them? And how can those packets help...

Hacks, Leaks, and Revelations

Unlock the internet’s treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends real-world...

Books No Starch Press 💰 Information Security

Hacks, Leaks, and Revelations

Unlock the internet’s treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends...

How to Hack Like a Legend

Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and...

Books No Starch Press 💰 Information Security

How to Hack Like a Legend

Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust...

Hacking APIs

An Application Programming Interface (API) is a software connection that allows applications to communicate and share services. Hacking APIs will teach you how to test web APIs for security...

Books No Starch Press 💰 Information Security

Hacking APIs

An Application Programming Interface (API) is a software connection that allows applications to communicate and share services. Hacking APIs will teach you how to test web APIs for...

Go H*ck Yourself

Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by...

Books No Starch Press 💰 Information Security

Go H*ck Yourself

Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked...

Ethical Hacking

A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial...

Books No Starch Press 💰 Information Security

Ethical Hacking

A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore...

Records : 260 of 354 | Page : of 18