Amazon Price: $49.95 $28.97 You save: $20.98 (42%). (as of June 24, 2017 15:49 –
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
Continue reading “Hacking: The Art of Exploitation, 2nd Edition”
Amazon Price: $44.99 $33.02 You save: $11.97 (27%). (as of June 24, 2017 02:39 –
How can you tap into the wealth of social web data to discover who’s making connections with whom, what they’re talking about, and where they’re located? With this expanded and thoroughly revised edition, you’ll learn how to acquire, analyze, and summarize data from all corners of the social web, including Facebook, Twitter, LinkedIn, Google+, GitHub, email, websites, and blogs.
The example code for this unique data science book is maintained in a public GitHub repository. It’s designed to be easily accessible through a turnkey virtual machine that facilitates interactive learning with an easy-to-use collection of IPython Notebooks.
Amazon Price: $69.99 $41.12 You save: $28.87 (41%). (as of June 24, 2017 09:06 –
Cyber-Physical Systems (CPS) offer valuable applications in a wide variety of mission-critical and embedded systems applications, in disciplines including computer science, electrical and computer engineering, mechanical engineering, robotics, chemical engineering, civil engineering, nuclear engineering, and bio-medical engineering. This book compiles the newest CPS research and practice in one volume that will be indispensable both for software practitioners in commercial industry and defense, and for researchers and advanced students.
The only book of its kind, Cyber-Physical Systems addresses CPS from three perspectives. First, it presents the challenges and innovations associated with this class of systems as they have arisen in a wide spectrum of application domains. Second, it describes the foundations that underlie CPS solutions, both in terms of what we know and emerging research challenges. Finally, it offers offer guiding principles for all levels, from specific design and analysis advice for practitioners to high-level perspectives that can guide the direction of new innovations.
Continue reading “Cyber-Physical Systems (SEI Series in Software Engineering)”
Amazon Price: N/A (as of June 25, 2017 00:33 –
Regular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Perl, Python, Ruby, Java, VB.NET and C# (and any language using the .NET Framework), PHP, and MySQL.
If you don't use regular expressions yet, you will discover in this book a whole new world of mastery over your data. If you already use them, you'll appreciate this book's unprecedented detail and breadth of coverage. If you think you know all you need to know about regularexpressions, this book is a stunning eye-opener.
Continue reading “Mastering Regular Expressions”
Amazon Price: $49.95 $35.27 You save: $14.68 (29%). (as of June 25, 2017 00:33 –
Every day, over half a billion iOS users blindly entrust mobile devices with their personal information. If you write an application that mishandles that information, you'll create a goldmine for attackers—and a catastrophe for you and your customers. Whether you develop iOS apps or test their defenses, it's critical that you know how to track down and eliminate security threats before they become real issues.
In iOS Application Security, author David Thiel shows you how to write apps that actually protect users from the bad guys. He covers everything you need to know to design secure iOS apps from the ground up, including:
Continue reading “iOS Application Security: The Definitive Guide for Hackers and Developers”