O’Reilly Media, Inc., 2012. — 320 p. — ISBN: 978-1-449-30371-6. If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through...
Wiley, 2024. — 320 р. — (Tech Today). — ISBN-13: 978-1-394-19988-4. A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to...
3rd Edition. — Packt Publishing, 2018. — 569 p. — ISBN: 978-1-78899-061-5. Discover the next level of network defense with the Metasploit framework We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out...
Manning Publications Co., 2019. — 454 p. — ISBN: 978-1617294358. Secure by Design teaches developers how to use design to drive security in software development. This book is full of patterns, best practices, and mindsets that you can directly apply to your real world development. You'll also learn to spot weaknesses in legacy code and how to address them. Foreword by Daniel...
Wiley, 2020. — 272 p. — ISBN: 978-1119491804. A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities...
Apress Media LLC, 2020. — 948 p. — ISBN13: (electronic): 978-1-4842-6193-4. Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to...
BPB Publications, 2024. — 328 р. — ISBN: 978-93-89898-569. Learn how to work towards making the most out of a career in emerging tech Key Features Understand the core concepts related to careers in emerging tech. Learn innovative, exclusive, and exciting ways to design a successful career in ET. Reduce your learning curve by examining the career trajectories of eminent ET...
No Starch Press, San Francisco, 2012. — 802 p. — ISBN 13: 978-1593272906. Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the...
No Starch Press, 2019. — 264 p. — ISBN13: 978-1-59327-861-8. Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications. Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common...
М.: ДМК Пресс, 2013. – 240с.: ил. — ISBN: 978-5-94074-374-3. Даже самые простые ошибки могут иметь драматические последствия, позволяя атакующему компрометировать системы, повышать локальные привилегии и наносить иной ущерб системе. Книга рассказывает, как обнаруживаются и используются ошибки, найденные им в некоторых наиболее популярных во всем мире программных продуктах,...
Комментарии