Library

Explore 200,000 online courses/books/problem sets in over 2,050 subjects. From Computer Science, Business, and Personal Development to Arts, STEM, and more. Find your perfect MOOC.

Library

Learning Product
Subject
Difficulty
Cost
Certificate
Provider
Publisher
University
Institution
Tag

Publisher : 20 ×

Designing Secure Software

Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products. Written...

Books No Starch Press 💰 Programming

Designing Secure Software

Designing Secure Software consolidates Loren Kohnfelder's more than twenty years of experience into a concise, elegant guide to improving the security of technology products....

Web Security for Developers

The world has changed. Today, every time you make a site live, you’re opening it up to attack.A first-time developer can easily be discouraged by the difficulties involved with properly securing a...

Books No Starch Press 💰 Information Security

Web Security for Developers

The world has changed. Today, every time you make a site live, you’re opening it up to attack.A first-time developer can easily be discouraged by the difficulties involved with properly securing...

Foundations of Information Security

In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining...

Books No Starch Press 💰 Information Security

Foundations of Information Security

In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to...

The IDA Pro Book, 2nd Edition

IDA Pro is a commercial disassembler and debugger used by reverse engineers to dissect compiled computer programs, and is the industry standard tool for analysis of hostile code. The IDA Pro Book...

Books No Starch Press 💰 Information Security

The IDA Pro Book, 2nd Edition

IDA Pro is a commercial disassembler and debugger used by reverse engineers to dissect compiled computer programs, and is the industry standard tool for analysis of hostile code. The IDA Pro...

Hacking: The Art of Exploitation, 2nd Edition

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves...

Books No Starch Press 💰 Information Security

Hacking: The Art of Exploitation, 2nd Edition

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call...

Steal This Computer Book 4.0, 4th Edition

This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of...

Books No Starch Press 💰 Information Security

Steal This Computer Book 4.0, 4th Edition

This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition...

Silence on the Wire

There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks...

Books No Starch Press 💰 Information Security

Silence on the Wire

There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these...

The Art of Cyberwarfare

Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective...

Books No Starch Press 💰 Information Security

The Art of Cyberwarfare

Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily...

How Cybersecurity Really Works

You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out the...

Books No Starch Press 💰 Information Security

How Cybersecurity Really Works

You don’t need a technical background to understand core cybersecurity concepts and their practical applications – all you need is this book. It covers all the important stuff and leaves out...

PoC||GTFO

"This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.PoC||GTFO follows in the tradition of Phrack and...

Books No Starch Press 💰 Programming

PoC||GTFO

"This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.PoC||GTFO follows in the tradition of Phrack...

Wicked Cool Shell Scripts, 2nd Edition

Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But...

Books No Starch Press 💰 Programming

Wicked Cool Shell Scripts, 2nd Edition

Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do....

Wicked Cool Ruby Scripts

Wicked Cool Ruby Scripts is a compendium of scripts that will make your life easier by saving you time and solving problems. If you find yourself wasting effort and time on a task a trained monkey...

Books No Starch Press 💰 Programming

Wicked Cool Ruby Scripts

Wicked Cool Ruby Scripts is a compendium of scripts that will make your life easier by saving you time and solving problems. If you find yourself wasting effort and time on a task a...

Wicked Cool Shell Scripts

Fun and functional Linux, Mac OS X and UNIX shell scripts The UNIX shell is the main scripting environment of every Linux, Mac OS X and UNIX system, whether a rescued laptop or a million-dollar...

Books No Starch Press 💰 Programming

Wicked Cool Shell Scripts

Fun and functional Linux, Mac OS X and UNIX shell scripts The UNIX shell is the main scripting environment of every Linux, Mac OS X and UNIX system, whether a rescued laptop or...

Practical Social Engineering

Social engineering is the art of capitalizing on human psychology rather than technical vulnerabilities to compromise systems. It’s an effective method of attack because even the most advanced...

Books No Starch Press 💰 Social Sciences

Practical Social Engineering

Social engineering is the art of capitalizing on human psychology rather than technical vulnerabilities to compromise systems. It’s an effective method of attack because even the most...

Growing Software

As the technology leader at a small software company, you need to focus on people, products, processes, and technology as you bring your software to market, while doing your best to put out fires and...

Books No Starch Press 💰 Programming

Growing Software

As the technology leader at a small software company, you need to focus on people, products, processes, and technology as you bring your software to market, while doing your best to put out fires...

Natural Language Processing with Python and spaCy

Natural Language Processing with Python and spaCy will show you how to create NLP applications like chatbots, text-condensing scripts, and order-processing tools quickly and easily. You’ll learn...

Books No Starch Press 💰 Programming

Natural Language Processing with Python and spaCy

Natural Language Processing with Python and spaCy will show you how to create NLP applications like chatbots, text-condensing scripts, and order-processing tools quickly and easily. You’ll...

The IDA Pro Book

No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with...

Books No Starch Press 💰 Programming

The IDA Pro Book

No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you...

Practical SQL, 2nd Edition

Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases....

Books No Starch Press 💰 Programming

Practical SQL, 2nd Edition

Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational...

Practical SQL

"Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The...

Books No Starch Press 💰 Programming

Practical SQL

"Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases....

Statistics Done Wrong

Scientific progress depends on good research, and good research needs good statistics. But statistical analysis is tricky to get right, even for the best and brightest of us. You'd be surprised how...

Books No Starch Press 💰 Mathematics

Statistics Done Wrong

Scientific progress depends on good research, and good research needs good statistics. But statistical analysis is tricky to get right, even for the best and brightest of us. You'd be surprised...

Records : 340 of 354 | Page : of 18