IT eBooks

IT eBooks
Download, Read, Use

Hack eBooks

JavaScript on Things JavaScript on Things

JavaScript on Things is your first step into the exciting and downright entertaining world of programming for small electronics. If you know enough JavaScript to hack a website together, you'll be making things go bleep, blink, and spin faster than you can say "nodebot". Are you ready to make things move? If you can build a web app, you can create robots, weather stations, and other funky gadgets! In this incredibly fun, project-based guide, JavaScript hardware hacker Lyza Danger Gardner takes you on an incredible journey from your first flashing LED through atmospheric sensors, motorized rovers, Bluetooth doorbells, and more. With JavaScript, some easy-to-get hardware, and a bit of creativity, you'll be beeping, spinning, and glowing in no time. JavaScript on Things introduces the exciting world of programming small electronics! You'll start building things immediately, beginning with basic blinking on Arduino. This fully illustrated, hands-on book surveys JavaScript tool ...
Attacking Network Protocols Attacking Network Protocols

Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world's leading bug ­hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately ­protect vulnerabilities. You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to: Capture, manipulate, and replay packets; Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol; Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service; Use capture and analysis tools like ­Wireshark and develop your ow ...
Gray Hat C# Gray Hat C#

Learn to use C#'s powerful set of core ­libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices. After a crash course in C# and some of its advanced features, you'll learn how to: Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads; Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections; Write a .NET decompiler for OS X and Linux; Parse and read offline registry hives to dump system information; Automate the security tools Arachni and Metasploit using their MSGPACK RPCs. Streamline and simplify your workday by making the most of C#'s extensive repertoire of powerful tools and libraries with Gray Hat C#. ...
The Hardware Hacker The Hardware Hacker

For over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective. Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs. Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices b ...
Foundations for Analytics with Python Foundations for Analytics with Python

Many of Excel's 750 million users would like to do more with their data, such as repeating similar analyses over hundreds of files or combining the data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale data processing and analysis of different data formats with Python, using business-relevant examples with complete, easy-to-read code. Beginning with the basics of Python, author Clinton Brownley shows you how to deal with Excel, CSV, and text files in Python, leading up to scheduling scripts to automatically gather and process information without human intervention. More practical than many other introductions to Python, this book gives you skills you can immediately apply in your job. ...
Slack Hacks Slack Hacks

We're surrounded with a myriad of communication tools: email, Skype, Twitter, Facebook, and Snapchat, to name a few. Slack is a newer communication tool, borrowing IRC concepts and transcending them with an intuitive interface that allows countless customizations and integrations—from other communication tools to bots, Kayak, Google, Hacker News, and more. Slack glues together all of your favorite applications, and if there isn't something already available to fit your needs, you can hack your own solution. This practical book provides you with hacks to use Slack efficiently and adapt it to your company and your community. It discusses Slack integrations, covering both IFTTT and Zapier. Going deeper into Slack customization, the book also shows how you can build your own applications and Slack bots by giving you some examples using different tools and frameworks to hack your custom workflow. ...
Hacking Android Hacking Android

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security. Hacking Android is a step-by-step guide that will get you started with Android security. You'll begin your journey at the absolute basics, and then will slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. On this journey you'll get to grips with various tools and techniques that can be used in your everyday pentests. You'll gain the skills necessary to perform Android application vulnerability assessment and penetration testing and will create an Android pentesting lab. ...
Foundations for Analytics with Python Foundations for Analytics with Python

If you're like many of Excel's 750 million users, you want to do more with your data - like repeating similar analyses over hundreds of files, or combining data in many files for analysis at one time. This practical guide shows ambitious non-programmers how to automate and scale the processing and analysis of data in different formats - by using Python. After author Clinton Brownley takes you through Python basics, you'll be able to write simple scripts for processing data in spreadsheets as well as databases. You'll also learn how to use several Python modules for parsing files, grouping data, and producing statistics. No programming experience is necessary.Create and run your own Python scripts by learning basic syntax;Use Python's csv module to read and parse CSV files;Read multiple Excel worksheets and workbooks with the xlrd module;Perform database operations in MySQL or with the mysqlclient module;Create Python applications to find spe ...
Slack Hacks Slack Hacks

We're surrounded with a myriad of communication tools: email, Skype, Twitter, Facebook, and Snapchat, to name a few. Slack is a newer communication tool, borrowing IRC concepts and transcending them with an intuitive interface that allows countless customizations and integrations—from other communication tools to bots, Kayak, Google, Hacker News, and more. Slack glues together all of your favorite applications, and if there isn't something already available to fit your needs, you can hack your own solution. This practical book provides you with hacks to use Slack efficiently and adapt it to your company and your community. It discusses Slack integrations, covering both IFTTT and Zapier. Going deeper into Slack customization, the book also shows how you can build your own applications and Slack bots by giving you some examples using different tools and frameworks to hack your custom workflow. ...
Penetration Testing with Raspberry Pi Penetration Testing with Raspberry Pi

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners). This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data. ...
Hack and HHVM Hack and HHVM

A couple of years ago, Facebook switched its production servers from a PHP-to-C++ compiler to their own HipHop Virtual Machine (HHVM) and then launched a new version of PHP to run on HHVM called Hack. This comprehensive guide—written by a member of the core HHVM and Hack teams at Facebook—shows you how to get up and running with both HHVM and Hack. What makes them useful? The HHVM engine is faster and more performant than the Zend engine, which can save Facebook and other large-scale sites millions of dollars in servers and maintenance. And while the Hack language looks and acts like PHP, it also contains new features such as static typing, generics, native collections, which PHP developers have long needed. Pick up this book and explore two important programming innovations that help Facebook run a tighter ship. ...
      Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2018