Category: Ebooks

Modern JavaScript

Keep up-to-date with the evolving world of JavaScript. It’s not uncommon these days to see people complaining about how complex JavaScript development seems to have become. If you’re learning JS, it won’t take long for...

Pentesting Using Python

Learn about the need for pentesting, components to be tested, qualities of a good pentester and much more. In simple words, penetration testing is to test the information security measures of a company. Information...

How to Measure Anything in Cybersecurity Risk

A groundbreaking expose on the failure of popular cyber risk management methods. How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current “risk management” practices, and offers a series of improvement techniques that...

crypto 101

Crypto 101

Crypto 101 Want to know how to exploit a common cryptographic flaw or forge administrator cookies, recover passwords? This is an introductory course on cryptography, freely available for programmers of all ages and skill...

Python Programming Cookbook

Python is a widely used high-level, general-purpose, interpreted, dynamic programming language. Its design philosophy emphasizes code readability, and its syntax allows programmers to express concepts in fewer lines of code than would be possible...

The Essentials of IT Management – June 2017 Kit

The Essentials of IT Management – June 2017 Kit brings together the latest information, coverage of important developments, and expert commentary to help with your IT Management related decisions. The following kit contents will help...

Practical Linux Security Cookbook

Secure your Linux machines and keep them secured with the help of exciting recipes. Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems...

[Ebook] Heap Exploitation

Heap Exploitation This short book is written for people who want to understand the internals of ‘heap memory’, particularly the implementation of glibc’s ‘malloc’ and ‘free’ procedures, and also for security researchers who want...

Rails, Novice to Ninja

This resource is an easy-to-follow, practical, and fun guide to Ruby on Rails for beginners. It covers all you need to get up and running, from installing Ruby, Rails and SQLite to building and...

12 Tools You Can Use to Help Beat Ransomware

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. Antivirus software is a continually evolving market. It has to be both...

Hacking iOS Applications

Hacking iOS Applications Table of Contents 1. Setting Up iOS Pentest Lab 2. Acquiring iOS Binaries 3. Generating iOS Binary (.IPA file) from Xcode Source Code 4. Installing iOS Binaries on Physical Devices 5....

[Course] Exploitation and Defense 2017

You will learn: Intel x86: Architecture, CPU. Registers Linux: Userspace memory layout, stacks, heap, Syscalls, Sockets, Networking Programming Languages: Assembler, C, Python, Bash, Ruby Content Day 1 [ ] 0x01_Intro.pdf [ ] 0x02_Intro-Technical.pdf [...