The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim treats cybersecurity like a professional sport, providing a tactical manual for ethical hackers who need a concrete game plan. This second edition expands on the original by incorporating modern attack vectors and advanced tools used by top security researchers. It focuses on the mindset required to navigate complex corporate environments, moving beyond basic theory to offer a hands-on …
Shelves
More like this
JavaScript: The Definitive Guide
This Fifth Edition is completely revised and expanded to cover JavaScript as it is used in today's Web 2.0 applications. This book is both an exam…
Clean Architecture
Building upon the success of best-sellers The Clean Coder and Clean Code, legendary software craftsman Robert C. "Uncle Bob" Martin shows how to b…
JavaScript: The Good Parts
Most programming languages contain good and bad parts, but JavaScript has more than its share of the bad, having been developed and released in a …
Learn You a Haskell for Great Good!
Learn You a Haskell for Great Good! is a fun, illustrated guide to learning Haskell, a functional programming language that's growing in popularit…
The Art of Computer Programming, Volume 1: Fundamental Algorithms
The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer program…
Patterns of Enterprise Application Architecture
Developers of enterprise applications (e.g reservation systems, supply chain programs, financial systems, etc.) face a unique set of challenges, d…
Release It!: Design and Deploy Production-Ready Software
Whether it's in Java, .NET, or Ruby on Rails, getting your application ready to ship is only half the battle. Did you design your system to surviv…
Coders at Work: Reflections on the Craft of Programming
Peter Seibel interviews 16 of the most interesting computer programmers alive today in Coders at Work, offering a brand-new companion volume to Ap…
The Hacker Playbook 3: Practical Guide To Penetration Testing
The Hacker Playbook 3 Red Team Edition serves as a technical manual for security professionals looking to move beyond standard vulnerability scann…
The Hacker Playbook: Practical Guide to Penetration Testing
The Hacker Playbook transforms complex penetration testing into a structured athletic game plan. Peter Kim uses his extensive background as a secu…
Extreme Programming Explained: Embrace Change
“In this second edition of Extreme Programming Explained, Kent Beck organizes and presents five years’ worth of experiences, growth, and change re…
Effective C++: 55 Specific Ways to Improve Your Programs and Designs
The Barnes & Noble Review Since early in the 90s, working C++ programmers have relied on Scott Meyers s Effective C++ to dramatically improve …