CINXE.COM

Humble Tech Book Bundle: Hacking 2024 by No Starch (pay what you want and help charity)

<!doctype html> <html lang="en" class=""> <head> <title> Humble Tech Book Bundle: Hacking 2024 by No Starch (pay what you want and help charity) </title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <script> window.noZensmooth = true; window.pageData = {atTime: 1733183388 }; window.humble = window.humble || {}; window.humble.locale = "en"; window.humble.timezone = "America/Los_Angeles"; window.humble.ie11ScriptsToLoad = [ "https://cdn.humblebundle.com/static/hashed/230b5ad34db2149203fc119b74fb96ba968bcef1.js", "https://cdn.humblebundle.com/static/hashed/ee47b95548c49132e7080413b0af49b6318fbb04.js", "https://cdn.humblebundle.com/static/hashed/95bcf58c86417455c695def01a0961d2623ff678.js", "https://cdn.humblebundle.com/static/hashed/77174c175993866b13940bcbcbbb078e0331142b.js", "https://cdn.humblebundle.com/static/hashed/f00402ff4c562abd341a500a5f4b0c1043f974a1.js", "https://cdn.humblebundle.com/static/hashed/c5b3c44cb77ebe3f6a35879673a9eaf7dee99d90.js", ]; </script> <script id="main-js" data-dist_version="c9ed87a47d080e3663d596d7acf24ed2c605d66f" src="https://cdn.humblebundle.com/c9ed87a47d080e3663d596d7acf24ed2c605d66f/dist/main.min.js"></script> <meta name="application-name" content="Humble Bundle"> <meta name="msapplication-TileImage" content="https://cdn.humblebundle.com/static/hashed/49bccd0f2050e5fcfc3c442b269d4ff47b038ed9.png"> <meta name='medium' content='news' /> <meta name="theme-color" content="hsl(221, 11.52%, 32.35%)"> <meta property='og:site_name' content='Humble Bundle' /> <meta property='og:type' content='website' /> <meta property="fb:app_id" content="101146256651042" /> <meta property="fb:profile_id" content="162315830478396" /> <meta property="fb:pages" content="162315830478396"><meta name="yandex-verification" content="4c70c59be0ff7c44" /> <meta name="p:domain_verify" content="09935f6d7546ea2a15ecbffb9845de5a"/> <meta name="google-site-verification" content="RWOr7xvK0pjMd7rJvmakIEH5ebV-MVPFkgh_RzZXUl0" /> <script type="application/ld+json"> { "@context": "http://schema.org", "@type": ["Product"], "name": "Humble Tech Book Bundle: Hacking 2024 by No Starch ", "image": "https://hb.imgix.net/6f0a546ed95ccdcdd62a02316dbdcc8fa48335e2.png?auto=compress,format&amp;h=340&amp;w=1200&amp;s=6869fbac39a623b604ca6c0a4f2a2967", "offers": { "@type": "AggregateOffer", "highPrice": "1.00", "lowPrice": "36.00", "priceCurrency": "USD", "offerCount": "4", "availability": "http://schema.org/InStock", "availabilityEnds": "2024-12-23T19:00:00", "availableDeliveryMethod": "http://purl.org/goodrelations/v1#DeliveryModeDirectDownload" }, "url": "/" + } </script> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="canonical" href="https://www.humblebundle.com/books/hacking-2024-no-starch-books" /> <meta content="Humble Tech Book Bundle: Hacking 2024 by No Starch" property="og:title"/><meta content="Level up your hacking and skills with this tech bundle from No Starch. Learn to protect yourself and others! Pay what you want & support charity!" property="og:description"/><meta content="https://www.humblebundle.com/books/hacking-2024-no-starch-books" property="og:url"/><meta content="Humble Tech Book Bundle: Hacking 2024 by No Starch" name="title"/><meta content="Level up your hacking and skills with this tech bundle from No Starch. Learn to protect yourself and others! Pay what you want & support charity!" name="description"/><meta content="https://hb.imgix.net/bae2e2f769d9d94398b21bdbaede0155807feb91.png?auto=compress,format&h=630&w=1200&s=dc90409e15a04fe853348bc670892e00" itemprop="image"/><meta content="https://hb.imgix.net/bae2e2f769d9d94398b21bdbaede0155807feb91.png?auto=compress,format&h=630&w=1200&s=dc90409e15a04fe853348bc670892e00" property="og:image"/><link href="https://hb.imgix.net/bae2e2f769d9d94398b21bdbaede0155807feb91.png?auto=compress,format&h=630&w=1200&s=dc90409e15a04fe853348bc670892e00" rel="image_src"/><meta content="1200" property="og:image:width"/><meta content="630" property="og:image:height"/><meta content="@humble" name="twitter:site"/><meta content="Level up your hacking and skills with this tech bundle from No Starch. Learn to protect yourself and others! Pay what you want & support charity!" name="twitter:description"/><meta content="https://www.humblebundle.com/books/hacking-2024-no-starch-books" name="twitter:url"/><meta content="Humble Tech Book Bundle: Hacking 2024 by No Starch" name="twitter:title"/><meta content="summary_large_image" name="twitter:card"/><meta content="https://hb.imgix.net/bae2e2f769d9d94398b21bdbaede0155807feb91.png?auto=compress,format&h=512&w=1024&s=2c8456da46de15ed65a83900dad851a9" name="twitter:image"/> <link rel="apple-touch-icon" sizes="144x144" href="https://cdn.humblebundle.com/static/hashed/03df0490a53d595fd930f9fff52038366d60a05d.png"> <link rel="icon" type="image/png" sizes="16x16" href="https://cdn.humblebundle.com/static/hashed/4c8bbc6fc7b2b8a9fa21e895afe1157188e28bfb.png"> <link rel="icon" type="image/png" sizes="32x32" href="https://cdn.humblebundle.com/static/hashed/46cf2ed85a0641bfdc052121786440c70da77d75.png"> <link rel="shortcut icon" href="https://cdn.humblebundle.com/static/hashed/47e474eed38083df699b7dfd8d29d575e3398f1e.ico"> <link rel="search" type="application/opensearchdescription+xml" title="Humble Bundle Search" href="https://cdn.humblebundle.com/static/hashed/734237ad071b57a64f3b131b3f86fc7ed670e794.xml" /> <link rel='alternate' type='application/rss+xml' title='Humble Mumble' href='http://blog.humblebundle.com/rss' /> <style> #flash { position:fixed; right: 30px; top:10px; background: #eee; opacity: .8; border-radius: 10px; color: black; padding:20px; min-width: 200px; max-width: 400px; text-align: center; z-index: 99999; box-shadow: 1px 1px 5px #000; display:none; } html, body { -webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale; } body { font-family: 'Sofia Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; padding: 0; } // Localize.js uses the <var> tag to indicate certain special things. However, // some browsers apply special CSS to the <var> tag which we don't want. This // effectively removes any special CSS that the browser might apply to <var>. var { margin: 0; padding: 0; border: 0; font-size: 100%; font: inherit; vertical-align: baseline; } </style> <link rel="stylesheet" href="https://cdn.humblebundle.com/static/hashed/844e9b6853d0e84d67102130770d94e46dc477bb.css" /> <link rel="stylesheet" href="https://cdn.humblebundle.com/static/hashed/affd271aa32963c1accd8f217c514487254f5a86.css" /> <link rel="stylesheet" href="https://cdn.humblebundle.com/static/hashed/011d2583eff00381e4f211b325f73813259d0c77.css" /> <link rel="stylesheet" href="https://cdn.humblebundle.com/static/hashed/86c243100f63e45b975d87ceac79f4d89b7cfaed.css" /> <link rel="stylesheet" href="https://cdn.humblebundle.com/static/hashed/9abe088ca50175f1e3ada1bec0fcb867970ec995.css" /> <link rel="stylesheet" href="https://cdn.humblebundle.com/static/hashed/6c656a6ccefeff002c55866dc46bf6a5a5d07bc3.css" /> <link rel="stylesheet" href="https://cdn.humblebundle.com/static/hashed/959e48023d9a270f3cbb6b332691b058ee61375c.css"><style></style> <script> window.models = window.models || {}; window.models.user_json = {"is_logged_in": false, "logout_url": "/logout?goto\u003d/books/hacking-2024-no-starch-books\u0026qs\u003d"}; window.models.userSubscriptionState = {"newestOwnedTier": null, "nextBilledPlan": null, "consecutiveContentDropCount": 0, "canResubscribe": false, "currentlySkippingContentHumanName": null, "perksStatus": "inactive", "billDate": null, "monthlyNewestOwnedContentMachineName": null, "willReceiveFutureMonths": false, "monthlyOwnsActiveContent": false, "unpauseDt": null, "creditsRemaining": 0, "currentlySkippingContentMachineName": null, "canBeConvertedFromGiftSubToPayingSub": false, "lastSkippedContentMachineName": null, "contentEndDateAfterBillDate": null, "isPaused": false, "monthlyNewestOwnedContentGamekey": null, "failedBillingMonths": 0, "monthlyNewestSkippedContentEnd": null, "wasPaused": false, "monthlyPurchasedAnyContent": false, "monthlyNewestOwnedContentEnd": null, "monthlyOwnsAnyContent": false}; window.models.request = { country_code: "SG", captcha_enabled: true, vat_rate: 0.09, is_mobile: false, isAndroidApp: false }; </script> <link rel="preload" href="https://cdn.ziffstatic.com/jst/zdconsent.js" as="script"> <script type="text/javascript">window.zdconsent = window.zdconsent || {'run': [], 'cmd':[], 'analytics':[], 'functional':[], 'social':[] };</script> <script type="text/javascript" src="https://cdn.ziffstatic.com/jst/zdconsent.js" async="true"></script> <script> window.zdconsent.run.push(function() { var expiry = new Date(); expiry.setTime(expiry.getTime() + 24*60*60*1000*7); // 7 days in the future if (window.gaData && window.gaData['UA-467050-6'] && window.gaData['UA-467050-6']['experiments']) { var expData = window.gaData['UA-467050-6']['experiments']; for (var experimentId in expData) { var experimentVariant = expData[experimentId]; document.cookie = 'hmb_medium=goptimize_' + encodeURIComponent(experimentId) + ';path=/;expires=' + expiry.toUTCString(); document.cookie = 'hmb_campaign=goptimize_' + encodeURIComponent(experimentVariant) + ';path=/;expires=' + expiry.toUTCString(); } if (window.internalUIEventBus) { // Override panel is initialized first // You can trigger an event for experiment data window.internalUIEventBus.trigger('gaExperiments', expData); } } window._hbdl = { 'campaigns': { 'partnerId': '', }, 'privacy': { 'accessCategories': [ { 'categoryName': 'Default', 'domains': [ 'google-analytics.com', 'googletagmanager.com', ], }, { 'categoryName': 'Analytics', 'domains': [ 'googleadservices.com', 'doubleclick.net', ], }, ], }, 'user': { 'hasGivenConsent': '', 'isLoggedIn': '', 'isSubscribed': '', 'sessionId': '', 'userId': '', 'security': { 'hasGivenConsent': null, 'isLoggedIn': null, 'isSubscribed': null, 'sessionId': ['Analytics'], 'userId': ['Analytics'], }, }, 'isDebug': false, 'version': '1.0', }; if (window._hbdl) window._hbdl.in_china = false; window._hbdl.user.hasGivenConsent = window.zdconsent ? window.zdconsent.consentGiven : false; window._hbdl.user.locale = 'en'; window._hbdl.user.isLoggedIn = false; window._hbdl.user.isSubscribed = false; if (window.models.userSubscriptionState.perksStatus === 'active') { window._hbdl.user.isSubscribed = true; } else { window._hbdl.user.isSubscribed = false; } window._hbdl.tags = { 'tagvars': {}, }; window._hbdl.page = { 'name': '' }; if (window.location.pathname === '/') { window._hbdl.page.name = 'site homepage'; } else if (window.location.pathname === '/bundles') { window._hbdl.page.name = 'bundles landing page'; } else if (window.location.pathname === '/games') { window._hbdl.page.name = 'game bundles landing page'; } else if (/\/games\/[^\/]+$/g.test(window.location.pathname)) { window._hbdl.page.name = 'game bundle product detail page'; } else if (window.location.pathname === '/books') { window._hbdl.page.name = 'book bundles landing page'; } else if (/\/books\/[^\/]+$/g.test(window.location.pathname)) { window._hbdl.page.name = 'book bundle product detail page'; } else if (window.location.pathname === '/software') { window._hbdl.page.name = 'software bundles landing page'; } else if (/\/software\/[^\/]+$/g.test(window.location.pathname)) { window._hbdl.page.name = 'software bundle product detail page'; } else if (/(^\/checkout)/g.test(window.location.pathname)) { window._hbdl.page.name = 'bundle checkout page'; } else if (window.location.pathname === '/membership') { window._hbdl.page.name = 'choice landing page'; } else if (window.location.pathname === '/membership/checkout' && window.location.search.indexOf("duration=") !== -1) { window._hbdl.page.name = 'choice checkout page'; } else if (window.location.pathname === '/membership/checkout' && window.location.search.indexOf("duration=") === -1) { window._hbdl.page.name = 'choice membership selection page'; } else if (window.location.pathname === '/store') { window._hbdl.page.name = 'store landing page' } else if (/(^\/store\/c\/[^\/]+$)|(^\/store\/search$)|(^\/store\/search\/sort\/)/g.test(window.location.pathname)) { window._hbdl.page.name = 'store category page'; } else if (/(^\/store\/[^\/]+$)/g.test(window.location.pathname)) { window._hbdl.page.name = 'store product detail page'; } else if (window.location.pathname === '/receipt') { window._hbdl.page.name = 'receipt page'; } else if (window.location.pathname === '/downloads') { window._hbdl.page.name = 'downloads page'; } else if (/^\/store\/promo\//g.test(window.location.pathname)) { window._hbdl.page.name = 'promo page'; } else if (/^\/store\/agecheck\//g.test(window.location.pathname)) { window._hbdl.page.name = 'store agecheck interrupt page'; } else if (/(^\/membership\/)|(^\/membership$)/g.test(window.location.pathname)) { window._hbdl.page.name = 'choice membership page'; } else { window._hbdl.page.name = 'bundle or 404 page'; } // Google Tag Manager - Site (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-3CSP877'); // End Google Tag Manager - Site window._hbgtm = function(isEcomm, options) { const dataLayer = window.dataLayer || []; if (dataLayer) { if (isEcomm) { dataLayer.push({'ecommerce': null}); } dataLayer.push(options); } }; (function() { try { var gawHelper = function() { // If enabled via GTM, set up Adwords (function(){ var head = document.getElementsByTagName('head')[0]; var script = document.createElement('script'); script.src = 'https://www.googletagmanager.com/gtag/js?id=AW-752198208'; head.insertBefore(script, head.firstChild); })(); window.dataLayer = window.dataLayer || []; window.gaw = function() { window.dataLayer.push(arguments); } gaw('js', new Date()); gaw('config', 'AW-752198208'); } // Execute only if window.gaw set to true in GTM if (window.gaw) { gawHelper(); } else { window.addEventListener('gawConsent', gawHelper); } } catch (error) {} })(); if (window._hbdl && typeof window._hbdl.tags !== 'undefined') { window._hbdl.tags.tagvars = { 'cj_pageview_data': {"enterpriseId": 1563072}, 'include_criteo': false, 'enable_tik_tok_pixel': false, }; } }); window.zdconsent.analytics.push(function() { window._hbdl.user.sessionId = "KWUR1liHDh"; }); window.zdconsent.functional.push(function() { var _user_id = ""; var _session_id = "KWUR1liHDh"; var _sift = _sift || []; _sift.push(['_setAccount', 'cbc841cfaa']); _sift.push(['_setUserId', _user_id]); _sift.push(['_setSessionId', _session_id]); _sift.push(['_trackPageview']); (function () { function ls() { var e = document.createElement('script'); e.type = 'text/javascript'; e.async = true; e.src = ('https:' == document.location.protocol ? 'https://' : 'http://') + 'cdn.sift.com/s.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(e, s); } if (window.attachEvent) { window.attachEvent('onload', ls); } else { window.addEventListener('load', ls, false); } })(); }); window.zdconsent.cmd.push(function() { (function(C,O,R,D,I,A,L){ C.CordialObject=I,C[I]=C[I]||function(){(C[I].q=C[I].q||[]).push(arguments)}; C[I].l=1*new Date,C[I].q=[],A=O.createElement(R); L=O.getElementsByTagName(R)[0],A.async=1,A.src=D,L.parentNode.insertBefore(A,L); })(window, document, "script", "//d.mailer.humblebundle.com/track.v2.js", "crdl"); window.crdl('connect', 'humblebundlelive', { trackUrl: '//se.mailer.humblebundle.com', connectUrl: '//d.mailer.humblebundle.com', cookieDomain: 'humblebundle.com', cookieLife: 365, }); }); </script> <script></script> <script type="application/ld+json"> { "@context": "http://schema.org", "@type": "WebSite", "url": "https://www.humblebundle.com/", "potentialAction": { "@type": "SearchAction", "target": "https://www.humblebundle.com/store/search?search={search_term}", "query-input": "required name=search_term" } } </script> <link rel="alternate" hreflang="ru" href="https://ru.humblebundle.com/books/hacking-2024-no-starch-books" /> <link rel="alternate" hreflang="fr" href="https://fr.humblebundle.com/books/hacking-2024-no-starch-books" /> <link rel="alternate" hreflang="en" href="https://www.humblebundle.com/books/hacking-2024-no-starch-books" /> <link rel="alternate" hreflang="zh" href="https://zh.humblebundle.com/books/hacking-2024-no-starch-books" /> <link rel="alternate" hreflang="de" href="https://de.humblebundle.com/books/hacking-2024-no-starch-books" /> <link rel="alternate" hreflang="it" href="https://it.humblebundle.com/books/hacking-2024-no-starch-books" /> <link rel="alternate" hreflang="es" href="https://es.humblebundle.com/books/hacking-2024-no-starch-books" /> <link rel="alternate" hreflang="x-default" href="https://www.humblebundle.com/books/hacking-2024-no-starch-books" /> </head> <body> <div class="page-wrap"> <div id="page-top-messages"></div> <div id="site-xpromo-banner" class="banner js-banner small-banner top is-hidden" style="background-image: url('https://hb.imgix.net/eb4ce38f147d4b154535586ccb60940e6e8def28.png?auto=compress,format&amp;fit=clip&amp;w=1920&amp;s=d714cdfe1959d38d3540f148a15412fb');"> <div class="js-admin-edit" data-entity-kind="banner" data-machine-name="24-11-05_choice_sitewide_banner" > </div> <a class="page-banner-link js-page-banner-link" href="https://www.humblebundle.com/membership?hmb_campaign=24-11-05_choice_sitewide_banner&amp;hmb_medium=banner" data-banner="24-11-05_choice_sitewide_banner"> <p class="body"><b><h2>Get Warhammer 40,000: Darktide & Persona 4 Golden with November’s Humble Choice!</h2></b></p> </a> <button href="#" class="dismiss-button js-dismiss-button" aria-label="Dismiss Banner"><i class="hb hb-times" aria-hidden="true"></i></button> </div> <div class="js-navigation-tracker"></div> <div class="navigation-container-v2 js-navigation-container-v2 font-size-reset"> <nav class="navbar navbar-2021 js-navbar-2021"> <div class="navbar-content"> <div class="mobile-nav-buttons"> <div class="expand-mobile-nav-button mobile-nav-button"> <a href="#navbar-mmenu"><i class="hb hb-bars"></i></a> </div> <div class="expand-mobile-search-button mobile-nav-button js-mobile-search-enable"> <i class="hb hb-search-fa"></i> </div> </div> <a class="navbar-item logo-navbar-item" href="/"> <img src="https://cdn.humblebundle.com/static/hashed/4814f84495cd679571cb94896978da3825562075.svg" alt="Humble"> </a> <section class="tabs tabs-navbar-item"> <div class="nav-dropdown-container"> <div class="navbar-item button-title navbar-item-dropdown dropdown-button "> <span class="navbar-icon-text-wrapper"> <span class="navbar-item-text"> <a href="/bundles"> Bundles </a> </span> </span> </div> <div class="navbar-item-dropdown-container nav-dropdown"> <div class="js-disable-body-scroll navbar-item-dropdown-items column-items nav-dropdown-items"> <div class="nav-dropdown-columns"> <div class="nav-dropdown-column "> <div class="nav-dropdown-column-content"> <a href="/games" class="navbar-item-dropdown-item "> Games </a> <a href="/books" class="navbar-item-dropdown-item "> Books </a> <a href="/software" class="navbar-item-dropdown-item "> Software </a> </div> </div> </div> </div> </div> </div> <div class="nav-dropdown-container"> <div class="navbar-item button-title navbar-item-dropdown dropdown-button "> <span class="navbar-icon-text-wrapper"> <span class="navbar-item-text"> <a href="/store"> Store </a> </span> </span> </div> <div class="navbar-item-dropdown-container nav-dropdown"> <div class="js-disable-body-scroll navbar-item-dropdown-items column-items nav-dropdown-items"> <div class="nav-dropdown-columns"> <div class="nav-dropdown-column "> <div class="nav-dropdown-column-title">Popular</div> <div class="nav-dropdown-column-content"> <a href="/store/search?sort=bestselling&amp;filter=onsale" class="navbar-item-dropdown-item "> On Sale </a> <a href="/store/search?sort=bestselling" class="navbar-item-dropdown-item "> Bestselling </a> <a href="/store/search?sort=newest&amp;filter=new" class="navbar-item-dropdown-item "> New Releases </a> <a href="/store/promo/pre-order/" class="navbar-item-dropdown-item "> Pre-order </a> <a href="/store/promo/books/" class="navbar-item-dropdown-item "> Books </a> <a href="/store/promo/software/" class="navbar-item-dropdown-item "> Software </a> <a href="/store/promo/deals-under-5/" class="navbar-item-dropdown-item "> Deals Under $5 </a> <a href="/store/promo/deals-under-10/" class="navbar-item-dropdown-item "> Deals Under $10 </a> <a href="/store/promo/deals-under-20/" class="navbar-item-dropdown-item "> Deals Under $20 </a> <a href="/store/promo/handheld-friendly/" class="navbar-item-dropdown-item "> Great on Handhelds </a> </div> </div> <div class="nav-dropdown-column "> <div class="nav-dropdown-column-title">Top Genres</div> <div class="nav-dropdown-column-content"> <a href="/store/c/rpg" class="navbar-item-dropdown-item "> RPG </a> <a href="/store/c/vr" class="navbar-item-dropdown-item "> Virtual Reality </a> <a href="/store/c/simulation" class="navbar-item-dropdown-item "> Simulation </a> <a href="/store/c/strategy" class="navbar-item-dropdown-item "> Strategy </a> <a href="/store/c/action" class="navbar-item-dropdown-item "> Action </a> <a href="/store/c/adventure" class="navbar-item-dropdown-item "> Adventure </a> <a href="/store/c/indie" class="navbar-item-dropdown-item "> Indie </a> <a href="/store/c/racing" class="navbar-item-dropdown-item "> Racing </a> <a href="/store/c/all" class="navbar-item-dropdown-item "> All Genres </a> </div> </div> <div class="nav-dropdown-column "> <div class="nav-dropdown-column-title">Top Platforms</div> <div class="nav-dropdown-column-content"> <a href="/store/c/windows" class="navbar-item-dropdown-item "> Windows </a> <a href="/store/promo/nintendo/" class="navbar-item-dropdown-item "> Nintendo Switch </a> <a href="/store/c/steam" class="navbar-item-dropdown-item "> Steam </a> <a href="/store/c/mac" class="navbar-item-dropdown-item "> Mac </a> <a href="/store/c/oculus-rift" class="navbar-item-dropdown-item "> Oculus Rift </a> <a href="/store/c/linux" class="navbar-item-dropdown-item "> Linux </a> <a href="/store/c/all" class="navbar-item-dropdown-item "> All platforms </a> </div> </div> <div class="nav-dropdown-column wide-column "> <div class="nav-dropdown-column-title">Featured</div> <div class="nav-dropdown-column-content"> <a href="/store/metaphor-refantazio" class="navbar-item-dropdown-item "> Metaphor: ReFantazio </a> <a href="/store/keep-talking-and-nobody-explodes" class="navbar-item-dropdown-item "> Keep Talking and Nobody Explodes </a> <a href="/store/remnant-2-dlc-bundle" class="navbar-item-dropdown-item "> Remnant 2 - DLC Bundle </a> <a href="/store/kingdom-hearts-integrum-masterpiece" class="navbar-item-dropdown-item "> KINGDOM HEARTS INTEGRUM MASTERPIECE </a> <a href="/store/enshrouded" class="navbar-item-dropdown-item "> Enshrouded </a> </div> </div> </div> </div> </div> </div> <div class="nav-dropdown-container"> <div class="navbar-item button-title "> <span class="navbar-icon-text-wrapper"> <span class="navbar-item-text"> <a href="/membership"> Choice </a> </span> </span> </div> </div> <div class="nav-dropdown-container"> <div class="navbar-item button-title "> <span class="navbar-icon-text-wrapper"> <span class="navbar-item-text"> <a href="https://blog.humblebundle.com/"> Blog </a> </span> </span> </div> </div> <div class="about-dropdown-container nav-dropdown-container"> <div class="navbar-item navbar-item-dropdown dropdown-button button-title non-link-item"> <span class="navbar-icon-text-wrapper"> <span class="navbar-item-text">About</span> </span> </div> <div class="navbar-item-dropdown-container about-dropdown about-item-dropdown-container nav-dropdown"> <div class="js-disable-body-scroll navbar-item-dropdown-items about-items nav-dropdown-items"> <a href="/about" class="navbar-item-dropdown-item"> Our Story </a> <a href="/charities" class="navbar-item-dropdown-item"> Charities </a> <a href="http://app.impact.com/campaign-campaign-info-v2/AUTO-ASSIGNED-PREFIX-Humble-Bundle-Inc-171311118-1718210155173-2854630514953243244.brand?io=qbIw4SgEWGy61j57t%2F4KmsYdxcjkdkXFLTEFZgqM2byDIICljn1mwXnO%2FS6ryTQf" class="navbar-item-dropdown-item" target="_blank"> Affiliates </a> <a href="http://support.humblebundle.com/" class="navbar-item-dropdown-item" target="_blank"> Support</i> </a> <a href="https://jobs.jobvite.com/humble-bundle/jobs/" class="navbar-item-dropdown-item" target="_blank"> Careers</i> </a> <a href="/accessibility" class="navbar-item-dropdown-item"> Accessibility </a> </div> </div> </div> </section> <li class="navbar-item site-search js-site-search"> <span class="js-site-minisearch site-minisearch-view"> <span class="site-searchbar-holder js-navbar-dropdown js-search-item-dropdown-toggle" data-dropdown-type="search-dropdown"> <div class="searchbar"> <input id="site-search" aria-label="Search" class="site-search js-search" placeholder="Search"/> <button class="no-style-button clear-search-button js-clear-search-button" aria-label="Clear search"> <i class="hb hb-search-fa" aria-hidden="true"></i> </button> </div> </span> <div class="site-search-results-holder js-search-holder"> <div class="site-search-message js-message"></div> <div class="site-search-results js-results js-disable-body-scroll"></div> <div class="site-search-navigation js-search-navigation"> <button class="no-style-button page-navigation js-prev-page" aria-label="Previous set of search results"> <i class="hb hb-angle-double-left hb-2x"></i> </button> <div class="site-search-information"> <a class="site-search-link js-search-link"></a> <span class="site-search-paging js-search-paging"></span> </div> <button class="no-style-button page-navigation js-next-page" aria-label="Next set of search results"> <i class="hb hb-angle-double-right hb-2x"></i> </button> </div> </div> </span> </li> <a class='navbar-item js-user-navbar-item user-navbar-item js-create-account logged-out desktop button-title navbar-create-account' href='javascript:void(0)'> Sign Up </a> <a class='navbar-item js-user-navbar-item user-navbar-item js-account-login logged-out desktop button-title navbar-login' href='javascript:void(0)'> <span class="navbar-item-text"> Log In </span> </a> </div> </nav> </div> <nav id="navbar-mmenu" class="font-size-reset hidden"> <ul> <li> <span>Bundles</span> <ul> <li> <a href="/games" class="">Games</a> </li> <li> <a href="/books" class="">Books</a> </li> <li> <a href="/software" class="">Software</a> </li> </ul> </li> <li> <span>Store</span> <ul> <li> <span>Popular</span> <ul> <li> <a href="/store/search?sort=bestselling&amp;filter=onsale" class="">On Sale</a> </li> <li> <a href="/store/search?sort=bestselling" class="">Bestselling</a> </li> <li> <a href="/store/search?sort=newest&amp;filter=new" class="">New Releases</a> </li> <li> <a href="/store/promo/pre-order/" class="">Pre-order</a> </li> <li> <a href="/store/promo/books/" class="">Books</a> </li> <li> <a href="/store/promo/software/" class="">Software</a> </li> <li> <a href="/store/promo/deals-under-5/" class="">Deals Under $5</a> </li> <li> <a href="/store/promo/deals-under-10/" class="">Deals Under $10</a> </li> <li> <a href="/store/promo/deals-under-20/" class="">Deals Under $20</a> </li> <li> <a href="/store/promo/handheld-friendly/" class="">Great on Handhelds</a> </li> </ul> </li> <li> <span>Top Genres</span> <ul> <li> <a href="/store/c/rpg" class="">RPG</a> </li> <li> <a href="/store/c/vr" class="">Virtual Reality</a> </li> <li> <a href="/store/c/simulation" class="">Simulation</a> </li> <li> <a href="/store/c/strategy" class="">Strategy</a> </li> <li> <a href="/store/c/action" class="">Action</a> </li> <li> <a href="/store/c/adventure" class="">Adventure</a> </li> <li> <a href="/store/c/indie" class="">Indie</a> </li> <li> <a href="/store/c/racing" class="">Racing</a> </li> <li> <a href="/store/c/all" class="">All Genres</a> </li> </ul> </li> <li> <span>Top Platforms</span> <ul> <li> <a href="/store/c/windows" class="">Windows</a> </li> <li> <a href="/store/promo/nintendo/" class="">Nintendo Switch</a> </li> <li> <a href="/store/c/steam" class="">Steam</a> </li> <li> <a href="/store/c/mac" class="">Mac</a> </li> <li> <a href="/store/c/oculus-rift" class="">Oculus Rift</a> </li> <li> <a href="/store/c/linux" class="">Linux</a> </li> <li> <a href="/store/c/all" class="">All platforms</a> </li> </ul> </li> <li> <span>Featured</span> <ul> <li> <a href="/store/metaphor-refantazio" class="">Metaphor: ReFantazio</a> </li> <li> <a href="/store/keep-talking-and-nobody-explodes" class="">Keep Talking and Nobody Explodes</a> </li> <li> <a href="/store/remnant-2-dlc-bundle" class="">Remnant 2 - DLC Bundle</a> </li> <li> <a href="/store/kingdom-hearts-integrum-masterpiece" class="">KINGDOM HEARTS INTEGRUM MASTERPIECE</a> </li> <li> <a href="/store/enshrouded" class="">Enshrouded</a> </li> </ul> </li> </ul> </li> <li> <a href="/membership">Choice</a> </li> <li> <a href="https://blog.humblebundle.com/">Blog</a> </li> <div class="mm-nav-spacer"></div> <li><span>About</span> <ul> <li><a href="/about">Our Story</a></li> <li><a href="/charities">Charities</a></li> <li><a href="/partner">Partners</a></li> <li><a href="https://www.humblegames.com/" target="_blank">Publishing</i></a></li> <li><a href="http://support.humblebundle.com/" target="_blank">Support</i></a></li> <li><a href="https://jobs.jobvite.com/humble-bundle/jobs/" target="_blank">Careers</i></a></li> <li><a href="https://blog.humblebundle.com/" target="_blank">Blog</i></a></li> <li><a href="/accessibility">Accessibility</a></li> </ul> </li> <div class="mm-nav-spacer"></div> <li><a class="mobile-signup js-mobile-signup" href="javascript:void(0)">Sign Up</a></li> <li><a class="js-mobile-login" href="javascript:void(0)">Log In</a></li> </ul> </nav><div class="base-main-wrapper"> <div class="page_title"></div> <div class="inner-main-wrapper"> <div class="bundle-page js-bundle-page"><div class="grid"> <div class="main-area desktop-only"> <div class="theiaStickySidebar"> <div class="js-desktop-tiers-view"></div> </div> </div> <div class="sidebar"> <div class="theiaStickySidebar"> <div class="js-basic-info-view"></div> <div class="js-mobile-tiers-view mobile-only"></div> <div class="js-pwyw-view"></div> <div class="js-splits-view"></div> <div class="js-charity-info-view"></div> <div class="js-details-view"></div> <div class="js-leaderboard-view"></div> <div class="js-video-view"></div> </div> </div> </div> <div class="grid"> <div class="js-large-leaderboard full-span"></div> </div> <div class="other-bundles-view-container"> <div class="grid"> <div class="js-other-bundles-view full-span"></div> </div> </div> </div></div> </div> <div class="grayout"> <div class="grayout-inner"> </div> </div> <script> /* v1.0.1 */(function(b){b.fn.mailcheck=function(a,b){var d="yahoo.com,google.com,hotmail.com,gmail.com,me.com,aol.com,mac.com,live.com,comcast.net,googlemail.com,msn.com,hotmail.co.uk,yahoo.co.uk,facebook.com,verizon.net,sbcglobal.net,att.net,gmx.com,mail.com".split(",");if("object"===typeof a&&void 0===b)a.domains=a.domains||d;else{var e=a,a=b;a.domains=e||d}(d=Kicksend.mailcheck.suggest(encodeURI(this.val()),a.domains))?a.suggested&&a.suggested(this,d):a.empty&&a.empty(this)}})(jQuery); var Kicksend={mailcheck:{threshold:3,suggest:function(b,a){var b=b.toLowerCase(),c=this.splitEmail(b),d=this.findClosestDomain(c.domain,a);return d?{address:c.address,domain:d,full:c.address+"@"+d}:!1},findClosestDomain:function(b,a){for(var c,d=99,e=null,f=0;f<a.length;f++){if(b===a[f])return!1;c=this.stringDistance(b,a[f]);c<d&&(d=c,e=a[f])}return d<=this.threshold&&null!==e?e:!1},stringDistance:function(b,a){if(null==b||0===b.length)return null==a||0===a.length?0:a.length;if(null==a||0===a.length)return b.length; for(var c=0,d=0,e=0,f=0;c+d<b.length&&c+e<a.length;){if(b[c+d]==a[c+e])f++;else for(var g=e=d=0;5>g;g++){if(c+g<b.length&&b[c+g]==a[c]){d=g;break}if(c+g<a.length&&b[c]==a[c+g]){e=g;break}}c++}return(b.length+a.length)/2-f},splitEmail:function(b){b=b.split("@");if(2>b.length)return!1;for(var a=0;a<b.length;a++)if(""===b[a])return!1;return{domain:b.pop(),address:b.join("@")}}}}; </script> <script> window.modal_attributes = { request_reason: "", base_url_secure: "https://www.humblebundle.com", goto: null, qs: null, is_eu_country: false, is_in_china: false, isMobile: false, method: 'post' // Force all modal forms to be post instead of the default get to avoid leaking sensitive information during form submit }; </script> <div id='flash'></div> <script></script> <script> /* * TypeWatch 2.0 - Original by Denny Ferrassoli / Refactored by Charles Christolini * * Examples/Docs: www.dennydotnet.com * * Copyright(c) 2007 Denny Ferrassoli - DennyDotNet.com * Coprright(c) 2008 Charles Christolini - BinaryPie.com * * Dual licensed under the MIT and GPL licenses: * http://www.opensource.org/licenses/mit-license.php * http://www.gnu.org/licenses/gpl.html */ (function(jQuery) { jQuery.fn.typeWatch = function(o) { // Options var options = jQuery.extend({ wait : 750, callback : function() { }, highlight : true, captureLength : 2 }, o); function checkElement(timer, override) { var elTxt = jQuery(timer.el).val(); // Fire if text > options.captureLength AND text != saved txt OR if override AND text > options.captureLength if ((elTxt.length > options.captureLength && elTxt.toUpperCase() != timer.text) || (override && elTxt.length > options.captureLength)) { timer.text = elTxt.toUpperCase(); timer.cb(elTxt); } }; function watchElement(elem) { // Must be text or textarea if (elem.type.toUpperCase() == "TEXT" || elem.nodeName.toUpperCase() == "TEXTAREA") { // Allocate timer element var timer = { timer : null, text : jQuery(elem).val().toUpperCase(), cb : options.callback, el : elem, wait : options.wait }; // Set focus action (highlight) if (options.highlight) { jQuery(elem).focus( function() { this.select(); }); } // Key watcher / clear and reset the timer var startWatch = function(evt) { var timerWait = timer.wait; var overrideBool = false; if (evt.keyCode == 13 && this.type.toUpperCase() == "TEXT") { timerWait = 1; overrideBool = true; } var timerCallbackFx = function() { checkElement(timer, overrideBool) } // Clear timer clearTimeout(timer.timer); timer.timer = setTimeout(timerCallbackFx, timerWait); }; jQuery(elem).keydown(startWatch); // HTML5 adds an "input" event which is a more reliable way of telling // when the field has changed -- it fires for things like browser // autofill (where there is no keydown event). For browsers that support // it, we bind startWatch to fire here too. jQuery(elem).bind('input', startWatch); } } ; // Watch Each Element return this.each(function(index) { watchElement(this); }); }; })(jQuery); var MAILCHECK_DOMAINS = ['gmail.com', 'hotmail.com', 'yahoo.com', 'hotmail.co.uk', 'googlemail.com', 'gmx.de', 'live.com', 'live.ca', 'web.de', 'aol.com', 'msn.com', 'comcast.net', 'me.com', 'gmx.net', 'hotmail.fr', 'mail.ru', 'yahoo.co.uk', 'live.co.uk', 'yandex.ru', 'mac.com', 'yahoo.de', 'yahoo.fr']; function isValidEmail(e) { return (e != '') && /.+@.+\..+/.test(e); } function live_email_check($field, setEmailMessage) { var emailValid = false; $field.mailcheck({ domains: MAILCHECK_DOMAINS, suggested: function($input, suggestion) { // set the error text to the suggested correction var message = 'Did you mean <a href="#" class="suggested-email" data-email="' + suggestion['full'] + '">' + suggestion['address'] + '@<strong>' + suggestion['domain'] + '</strong></a>?' var $msgField = setEmailMessage($field, message); $msgField.find('.suggested-email').click(function(e) { e.preventDefault(); $input.val($(this).data('email')); live_email_check($field, setEmailMessage, false); }); emailValid = true; }, empty: function($input) { // no suggested domain correction, check if the email address looks valid var email = $input.val(); emailValid = isValidEmail(email); if (emailValid) { setEmailMessage($field, false); } else { setEmailMessage($field, 'Email address is not valid', true); } } }); return emailValid; } // this method will set up email "validation" and error correction. // Parameters: // $field is the input field to bind to // setEmailMessage is a function that takes the input field the error is related to and a message to set. // It sets the message then returns the error holder. function bindEmailField($field, setEmailMessage){ if (!window.humble || window.humble.locale !== 'en') { // only show email suggestion on EN locale as it only supports common EN email providers return; } function bound_live_email_check () { live_email_check($field, setEmailMessage); } $field.typeWatch({ callback: bound_live_email_check, captureLength: -1, highlight: false, wait: 500 }); } var flash = $('#flash'); function show_flash(message){ flash.text(message) flash.show(); setTimeout(function() { flash.fadeOut(); },5000); } function set_flash(message) { $.cookie('hbflash', message, {path: '/'}); } $(function(){ function show_flash(message){ flash.text(message) flash.show(); setTimeout(function() { flash.fadeOut(); },5000); } var flashmessage = $.cookie('hbflash'); if (flashmessage == 'None') { flashmessage = ''; } if (flashmessage) { show_flash(flashmessage); $.cookie('hbflash', 'None', {path: '/'}); } flash.click(function(){ flash.fadeOut(); }); }); // When CSS4 is widely-supported by all the modern browsers, detecting touch support may not be necessary depending on the usage of the touch. $(function(){ // Class assignment can be used for touch screen problems. Such as :hover. if ('ontouchstart' in window) { $('body').addClass('touch-support'); } }); </script> </div> <footer class="site-footer"> <div class="max-width-wrapper"> <div class="footer-content"> <div class="brand"> <a href="/"><img src="https://cdn.humblebundle.com/static/hashed/4814f84495cd679571cb94896978da3825562075.svg" alt="Humble Bundle Logo"></a> </div> <section class="footer-links"> <div class="footer-links-info"> <h2>About</h2> <ul class="info-links-list"> <li><a href="https://blog.humblebundle.com/" target="_blank">Blog</a></li> <li><a href="https://support.humblebundle.com" target="_blank">Support</a></li> <li><a href="/developer" target="_blank">Developer</a></li> </ul> </div> <div class="footer-links-trending"> <h2>Trending Games</h2> <ul class="trending-games-list"> <li><a href="/store/hunt-showdown-1896" target="_blank">Hunt: Showdown 1896</a></li> <li><a href="/store/metaphor-refantazio" target="_blank">Metaphor: ReFantazio</a></li> <li><a href="/store/kingdom-hearts-integrum-masterpiece" target="_blank">KINGDOM HEARTS INTEGRUM MASTERPIECE</a></li> <li><a href="/store/warhammer-40000-space-marine-2" target="_blank">Warhammer 40,000: Space Marine 2</a></li> <li><a href="/store/god-of-war" target="_blank">God of War</a></li> <li><a href="/store/beamngdrive" target="_blank">BeamNG.drive</a></li> <li><a href="/store/final-fantasy-xvi-complete-edition" target="_blank">FINAL FANTASY XVI COMPLETE EDITION</a></li> <li><a href="/store/enshrouded" target="_blank">Enshrouded</a></li> </ul> </div> </section> <div class="social-and-language-container"> <div class="language-dropdown-container"> <button class="js-language-dropdown language-dropdown"> <p><i class="hb hb-globe-fas"></i> Language: English</p> <i class="hb hb-caret-down"></i> </button> <div class="language-container js-language-container"> <ul> <li class=""> <button data-locale="fr" class="js-change-language no-style-button">Français</button> </li> <li class=" active "> <button data-locale="en" class="js-change-language no-style-button">English</button> </li> <li class=""> <button data-locale="zh_CN" class="js-change-language no-style-button">简体中文</button> </li> <li class=""> <button data-locale="de" class="js-change-language no-style-button">Deutsch</button> </li> <li class=""> <button data-locale="it" class="js-change-language no-style-button">Italiano</button> </li> <li class=""> <button data-locale="es" class="js-change-language no-style-button">Español</button> </li> </ul> </div> </div> <div class="socialcontainer"> <a href="https://www.facebook.com/humblebundle/" class="social-temp"><span class="sr-only">Facebook</span><i class="hb hb-facebook"></i></a> <a href="https://twitter.com/humble" class="social-temp"><span class="sr-only">Twitter</span><i class="hb hb-twitter"></i></a> <a href="https://www.instagram.com/humblebundle" class="social-temp"><span class="sr-only">Instagram</span><i class="hb hb-instagram"></i></a> <a href="https://blog.humblebundle.com/" class="social-temp"><span class="sr-only">Blog</span><i class="hb hb-blog"></i></a> </div> <p class="humble-community-text">The Humble community has contributed over US$263,000,000 to charity since 2010, making an amazing difference to causes all over the world.</p> <div class="legal-links"> <ul class="legal-links-list"> <li><a href="/terms" target="_blank">Terms of Service</a></li> <li><a href="/privacy" target="_blank">Privacy Policy</a></li> </ul> <ul class="legal-links-list"> <li><a href="/cookie-policy" target="_blank">Cookie Policy</a></li> <li><a href="/legal" target="_blank">Legal Notices</a></li> </ul> <ul class="legal-links-list"> <li> <a href="#" class="showConsentTool" onclick="window.zdconsent.showConsentTool(event);"> <img src="https://cdn.ziffstatic.com/pub/icong1.png" style="vertical-align: sub;"> AdChoices </a> </li> <li><a href="https://dsar.humblebundle.com/" class="zdDSAR">Do Not Sell My Personal Information</a></li> </ul> </div> </div> </div> <p class="humble-community-text">&copy; 2011 - 2024 Humble Bundle, Inc. a Ziff Davis company. All Rights Reserved. Humble Bundle and Humble Store are registered trademarks of Humble Bundle, Inc. and may not be used by third parties without express written permission.</p> </div> </footer> <script id="base-webpack-json-data" type="application/json"> {"banner": { "bannerToRender": null, "idToInit": null },"production": true, "countryCode": "SG", "navbar": { "ipInChina": null, "BLOG_URL": "https://blog.humblebundle.com/", "humbleLogo": "https://cdn.humblebundle.com/static/hashed/4814f84495cd679571cb94896978da3825562075.svg", "algoliaInfo": { "indexName": "replica_product_query_site_search", "publicKey": "AYSZEWDAZ2", "searchKey": "5229f8b3dec4b8ad265ad17ead42cb7f", "curtimeOverride": null }, "searchOptions": { "pricing_constants": { "current_country": "SG", "pricing_currency": "USD", "exchange_rates": {"USD": 1.0, "AUD": 1.5380609733005113, "CHF": 0.8813671653096005, "IDR": 15862.346146563152, "KRW": 1397.566748721833, "BGN": 1.8517326263965157, "CNY": 7.241431547055482, "ISK": 137.9473584548381, "ILS": 3.6367165309600455, "GBP": 0.7877769361863284, "NZD": 1.6921984472637759, "DKK": 7.061067979549327, "CAD": 1.4008710471501609, "TRY": 34.689452755160005, "HUF": 389.84093921605756, "PHP": 58.643249384586255, "RON": 4.712554440446885, "NOK": 11.058985040711987, "RUB": 117.201, "ZAR": 18.062582844158303, "MYR": 4.444991478886575, "INR": 84.5715773527741, "THB": 34.2899072145427, "MXN": 20.39102442719182, "CZK": 23.912137852679418, "BRL": 6.093637568642302, "JPY": 150.19882597992805, "PLN": 4.067411475099413, "EUR": 0.946790380609733, "SEK": 10.905131603862905, "SGD": 1.340560499905321, "HKD": 7.783658398030676} }, "subscriptioncontent_icon": "https://cdn.humblebundle.com/static/hashed/74c9dedf4e02d66d912f6cd308562bd00a46d646.jpg", "bundle_icon": "https://cdn.humblebundle.com/static/hashed/cf3858ca434246e23c6474e37cd123028f9d1b98.svg" }, "userDropdown": { "hasDashboard": false, "isPartner": false } } } </script> <script id="webpack-bundle-page-data" type="application/json"> {"userOptions": {"is_logged_in": false, "logout_url": "/logout?goto\u003d/books/hacking-2024-no-starch-books\u0026qs\u003d"}, "showSingleSignOn": true, "debug": false, "ipInChina": false, "isEuCountry": false, "baseSubscriptionPrice|money": {"currency": "USD", "amount": 11.99}, "bannerOptions": null, "exchangeRates": {"USD|decimal": 1.0, "AUD|decimal": 1.5380609733005113, "CHF|decimal": 0.8813671653096005, "IDR|decimal": 15862.346146563152, "KRW|decimal": 1397.566748721833, "BGN|decimal": 1.8517326263965157, "CNY|decimal": 7.241431547055482, "ISK|decimal": 137.9473584548381, "ILS|decimal": 3.6367165309600455, "GBP|decimal": 0.7877769361863284, "NZD|decimal": 1.6921984472637759, "DKK|decimal": 7.061067979549327, "CAD|decimal": 1.4008710471501609, "TRY|decimal": 34.689452755160005, "HUF|decimal": 389.84093921605756, "PHP|decimal": 58.643249384586255, "RON|decimal": 4.712554440446885, "NOK|decimal": 11.058985040711987, "RUB|decimal": 117.201, "ZAR|decimal": 18.062582844158303, "MYR|decimal": 4.444991478886575, "INR|decimal": 84.5715773527741, "THB|decimal": 34.2899072145427, "MXN|decimal": 20.39102442719182, "CZK|decimal": 23.912137852679418, "BRL|decimal": 6.093637568642302, "JPY|decimal": 150.19882597992805, "PLN|decimal": 4.067411475099413, "EUR|decimal": 0.946790380609733, "SEK|decimal": 10.905131603862905, "SGD|decimal": 1.340560499905321, "HKD|decimal": 7.783658398030676}, "csrfTokenInput": "\u003cinput type\u003d\"hidden\" class\u003d\"csrftoken\" name\u003d\"_le_csrf_token\" value\u003d\"Y5pywCWlyQwrx4yZ-1-1733183389\"\u003e", "csrfToken": {}, "user_max_reward_amount": 0, "csrfFormKey": "_le_csrf_token", "bundleData": {"machine_name": "hacking2024nostarch_bookbundle", "jplayer_swf_path": "https://cdn.humblebundle.com/static/hashed/682bac84e8df7e444ab9127ce8e22f626caf0e41.swf", "tier_display_data": {"bt10": {"header": "Pay US$10 or more to also unlock!", "identifier": "bt10", "time_till_mpa": null, "tier_item_machine_names": ["penetrationtesting", "cyberjutsu", "blackhatgo", "malwaredatascience", "real-worldbughunting", "thetangledweb"], "hidden_machine_names": [], "sold_out": false, "bonus_item_machine_names": []}, "initial": {"header": "Pay US$1 to unlock!", "identifier": "initial", "time_till_mpa": null, "tier_item_machine_names": ["real-worldbughunting", "thetangledweb"], "hidden_machine_names": [], "sold_out": false, "bonus_item_machine_names": []}, "bt36": {"header": "Pay US$36 or more to also unlock!", "identifier": "bt36", "time_till_mpa": null, "tier_item_machine_names": ["hacksleaksandrevelations", "windowssecurityinternals", "evadingedr", "evasivemalware", "androidmalwarebook", "artofmacmalware", "ethicalhacking", "attackingnetworkprotocols", "foundationsofinformationsecurity", "practicaliothacking", "linuxbasicsforhackers", "ghidrabook", "penetrationtesting", "cyberjutsu", "blackhatgo", "malwaredatascience", "real-worldbughunting", "thetangledweb"], "hidden_machine_names": [], "sold_out": false, "bonus_item_machine_names": []}, "bt18": {"header": "Pay US$18 or more to also unlock!", "identifier": "bt18", "time_till_mpa": null, "tier_item_machine_names": ["ethicalhacking", "attackingnetworkprotocols", "foundationsofinformationsecurity", "practicaliothacking", "linuxbasicsforhackers", "ghidrabook", "penetrationtesting", "cyberjutsu", "blackhatgo", "malwaredatascience", "real-worldbughunting", "thetangledweb"], "hidden_machine_names": [], "sold_out": false, "bonus_item_machine_names": []}}, "tier_order": ["bt36", "bt18", "bt10", "initial"], "is_all_charity_bundle": false, "author": "No Starch Press", "preset_prices": [{"price|money": {"currency": "USD", "amount": 1.0}, "suggested": false, "qualifying_tier_id": "initial"}, {"price|money": {"currency": "USD", "amount": 10.0}, "suggested": false, "qualifying_tier_id": "bt10"}, {"price|money": {"currency": "USD", "amount": 18.0}, "suggested": false, "qualifying_tier_id": "bt18"}, {"price|money": {"currency": "USD", "amount": 36.0}, "suggested": false, "qualifying_tier_id": "bt36"}, {"price|money": {"currency": "USD", "amount": 41.0}, "suggested": true, "qualifying_tier_id": "bt36"}, {"price|money": {"currency": "USD", "amount": 46.0}, "suggested": false, "qualifying_tier_id": "bt36"}], "cyoc_data": {}, "average_data": {"average_usd_amount|decimal": 35.415837260698595, "average_usd_string": "35.41583726069859820286513176", "avguuid": "DgDtmH8aJpWqHtT9", "cleanavg": "35.41", "average_usd|money": {"currency": "USD", "amount": 35.415837260698595}, "average|money": {"currency": "USD", "amount": 35.41}, "avghash": "BscWIFpaSiU83sMvbda7iGWHJJz9p+sa+SHbZhV39mQ\u003d"}, "leaderboard_data": [{"name": "do_more_ppl", "order_price|money": {"currency": "GBP", "amount": 48.0}}, {"name": "craquemattic", "order_price|money": {"currency": "USD", "amount": 46.0}}, {"name": "mbush123", "order_price|money": {"currency": "USD", "amount": 41.0}}, {"name": "johnhamlin", "order_price|money": {"currency": "USD", "amount": 41.0}}, {"name": "psandy", "order_price|money": {"currency": "AUD", "amount": 60.38}}, {"name": "Zito", "order_price|money": {"currency": "EUR", "amount": 34.57}}, {"name": "Luis Moreno", "order_price|money": {"currency": "USD", "amount": 36.0}}], "at_time|datetime": "2024-12-02T23:49:48.932926", "basic_data": {"eula": null, "split_disclaimer": null, "currency": "USD", "giving_fund": "ppgf", "logo": "https://hb.imgix.net/6f0a546ed95ccdcdd62a02316dbdcc8fa48335e2.png?auto\u003dcompress,format\u0026h\u003d340\u0026w\u003d1200\u0026s\u003d6869fbac39a623b604ca6c0a4f2a2967", "disallowed_payment_processors": [], "newsletter_mailing_list_machine_name": "ebook_emails", "supports_partners": true, "detailed_marketing_blurb": "Level up your hacking and cyber security skills with this bursting tech bundle from No Starch! Learn from top hacking courses like \u003cem\u003eHacks, Leaks, and Revelations\u003c/em\u003e, \u003cem\u003eWindows Security Internals\u003c/em\u003e, \u003cem\u003ePractical IoT Hacking\u003c/em\u003e, and more! Get 15+ guides and courses to help you better understand the intricacies of hacking so you can better defend yourself from future cyber attacks. Get professional level resources for both novice and seasoned hackers, and help support the Electronic Frontier Foundation and ACLU Foundation with your purchase!", "order_form_disclaimer": null, "media_type": "ebook", "description": "\u003cp\u003e\u003cstrong\u003eStop hackers by understanding hacking.\u003c/strong\u003e Level up your hacking and cyber security skills with this bursting tech bundle from No Starch! Learn from top hacking courses like \u003cem\u003eHacks, Leaks, and Revelations\u003c/em\u003e, \u003cem\u003eWindows Security Internals\u003c/em\u003e, \u003cem\u003ePractical IoT Hacking\u003c/em\u003e, and more! Get 15+ guides and courses to help you better understand the intricacies of hacking so you can better defend yourself from future cyber attacks. Get professional level resources for both novice and seasoned hackers, and help support the Electronic Frontier Foundation and\u0026nbsp;ACLU Foundation with your purchase!\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003ePay US$1 or more.\u003c/strong\u003e Normally, the total cost for the ebooks in this bundle is as much as US$756. Here at Humble Bundle, you choose the price and increase your contribution to upgrade your bundle! This bundle has a minimum US$1 purchase.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eRead them anywhere.\u003c/strong\u003e The ebooks in this bundle are available in PDF, MOBI, and ePub formats, so they work on your computer, e-readers, iPads, cell phones, and a wide array of mobile devices! Instructions and a list of recommended reading programs can be found \u003ca href\u003d\"https://support.humblebundle.com/hc/articles/202712300\" rel\u003d\"noopener\" target\u003d\"_blank\"\u003ehere\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eSupport charity.\u003c/strong\u003e Choose where the money goes - between the publisher and to support Electronic Frontier Foundation and ACLU. If you like what we do, you can leave us a Humble Tip too!\u003c/p\u003e", "legal_disclaimer": null, "page_title_tag": "", "short_marketing_blurb": "Stop hackers by understanding hacking", "required_account_links": ["steam"], "require_linked_third_party_account_when": "only-when-free", "region_lock_warnings": {}, "youtube_video_key": null, "twitch_data": {}, "allowed_payment_processors": ["free", "paypal", "alipay", "alipay_payment_intent", "stripe_checkout", "stripe_payment_intent"], "end_time|datetime": "2024-12-23T19:00:00", "msrp|money": {"currency": "USD", "amount": 756.0}, "human_name": "Humble Tech Book Bundle: Hacking 2024 by No Starch", "tpkd_cutoff_price|money": {"currency": "USD", "amount": 1.0}}, "tier_pricing_data": {"bt10": {"price|money": {"currency": "USD", "amount": 10.0}, "average_purchase_price|money": {"currency": "USD", "amount": 35.42}, "is_bta": false, "is_free": false, "is_initial_tier": false, "identifier": "bt10", "is_fixed": true, "should_be_included_in_tier_list": true}, "initial": {"price|money": {"currency": "USD", "amount": 1.0}, "average_purchase_price|money": {"currency": "USD", "amount": 35.42}, "is_bta": false, "is_free": false, "is_initial_tier": true, "identifier": "initial", "is_fixed": true, "should_be_included_in_tier_list": true}, "bt36": {"price|money": {"currency": "USD", "amount": 36.0}, "average_purchase_price|money": {"currency": "USD", "amount": 35.42}, "is_bta": false, "is_free": false, "is_initial_tier": false, "identifier": "bt36", "is_fixed": true, "should_be_included_in_tier_list": true}, "bt18": {"price|money": {"currency": "USD", "amount": 18.0}, "average_purchase_price|money": {"currency": "USD", "amount": 35.42}, "is_bta": false, "is_free": false, "is_initial_tier": false, "identifier": "bt18", "is_fixed": true, "should_be_included_in_tier_list": true}}, "partner_data": null, "other_bundles_data": [{"tile_logo_information": {"config": {"image_type": "gcs", "gcs": "images/logos/scifishooters_bundle-logo-product.png", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "product_variables": {"msrp|pricing": {"US": [209.0, "USD"]}, "msrp": "US$209"}, "machine_name": "scifishooters_bundle", "high_res_tile_image": "https://hb.imgix.net/7cf32bfc01f9707e629cee3ba59aebcf3e3fdfe5.jpg?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d600\u0026w\u003d1200\u0026s\u003df8cda6c60468f8c13e36382afd7cb08f", "disable_hero_tile": false, "marketing_blurb": "Get \u003cem\u003eDOOM\u003c/em\u003e, \u003cem\u003eSystem Shock\u003c/em\u003e, \u003cem\u003eCrysis 3: Remastered\u003c/em\u003e, \u003cem\u003eStar Wars: Dark Forces Remaster\u003c/em\u003e, and more!", "hover_title": "Pay What You Want", "product_url": "/games/scifi-shooters", "tile_image": "https://hb.imgix.net/7cf32bfc01f9707e629cee3ba59aebcf3e3fdfe5.jpg?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d353\u0026w\u003d616\u0026s\u003daeb9cc5e29583b9d65968d545c37ae3f", "cached_content_events": [{"identifier": "less_than_initial", "display_counter": false, "type": "base", "price": null, "has_subproducts": true, "start": null, "mpa_time": null, "section_identifiers": [], "has_tpkds": false, "max_price": null, "is_base": false}, {"identifier": "initial", "display_counter": false, "type": "price", "price": {"RU": [1172.01, "RUB"], "CN": [72.44, "CNY"], "CA": [14.09, "CAD"], "TR": [345.4, "TRY"], "US": [10.0, "USD"], "NZ": [17.11, "NZD"], "AU": [15.49, "AUD"], "PH": [586.89, "PHP"], "EUROPE_GBP": [7.91, "GBP"], "EUROPE_EURO": [9.47, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["core_tier"], "has_tpkds": true, "max_price": null, "is_base": false}, {"identifier": "bt14", "display_counter": false, "type": "price", "price": {"RU": [1640.81, "RUB"], "CN": [101.42, "CNY"], "CA": [19.73, "CAD"], "TR": [483.56, "TRY"], "US": [14.0, "USD"], "NZ": [23.96, "NZD"], "AU": [21.69, "AUD"], "PH": [821.65, "PHP"], "EUROPE_GBP": [11.08, "GBP"], "EUROPE_EURO": [13.26, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["bt14_tier"], "has_tpkds": true, "max_price": null, "is_base": false}, {"identifier": "bt19", "display_counter": false, "type": "price", "price": {"RU": [2226.81, "RUB"], "CN": [137.64, "CNY"], "CA": [26.78, "CAD"], "TR": [656.26, "TRY"], "US": [19.0, "USD"], "NZ": [32.52, "NZD"], "AU": [29.44, "AUD"], "PH": [1115.09, "PHP"], "EUROPE_GBP": [15.04, "GBP"], "EUROPE_EURO": [18.0, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["bt19_tier"], "has_tpkds": true, "max_price": null, "is_base": false}], "exclusive_countries": [], "category": "bundle", "hero_highlights": [{"heading": "US$209 worth of awesome stuff", "tooltip": "Get games collectively valued at up to US$209."}, {"heading": "Pay \u20ac9.47 or more", "tooltip": "Name your price of \u20ac9.47 or more and increase your contribution to upgrade your bundle."}, {"heading": "Redeem on Steam", "tooltip": "Pay \u20ac9.47 or more for access to content on Steam."}], "end_date|datetime": "2024-12-14T02:00:00", "author": "Publishers", "fallback_store_sale_logo": "", "high_res_tile_image_information": {"config": {"image_type": "gcs", "gcs": "images/displayitems/master_images/scifishooters_bundle-product.jpg", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "supports_partners": true, "detailed_marketing_blurb": "From the depths of space to a galaxy far, far away. Get award-winning and timeless sci-fi shooters with this bundle of awesome games! Use the Force in \u003cem\u003eStar Wars: Dark Forces Remaster\u003c/em\u003e, experience an all-time classic in 2023\u2019s \u003cem\u003eSystem Shock\u003c/em\u003e, send demons back to hell in \u003cem\u003eDOOM\u003c/em\u003e, and more. Play some of the greatest titles of the genre, and help support One Tree Planted and Cool Effect with your purchase!", "tile_logo": "https://hb.imgix.net/9fdaad41330a83b5e90460ee17f58b155ea1840d.png?auto\u003dcompress,format\u0026h\u003d340\u0026w\u003d1200\u0026s\u003da470de63043ab16c0c8f29ee829ba174", "tile_short_name": "Sci-Fi Shooters", "start_date|datetime": "2024-11-22T21:00:00", "hover_highlights": ["7 games", "US$209 Value"], "tile_stamp": "games", "tile_name": "Sci-Fi Shooters", "short_marketing_blurb": "Dark and futuristic sci-fi shooters", "tile_image_information": {"config": {"image_type": "gcs", "gcs": "images/displayitems/master_images/scifishooters_bundle-product.jpg", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "type": "bundle", "disallowed_countries": [], "highlights": ["Pay What You Want", "7 games", "US$209 Value", "Support Charity"]}, {"tile_logo_information": {"config": {"image_type": "gcs", "gcs": "images/logos/disneyblackfriday_bundle-logo.png", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "product_variables": {"msrp|pricing": {"US": [224.0, "USD"]}, "msrp": "US$224"}, "machine_name": "disneyblackfriday_bundle", "high_res_tile_image": "https://hb.imgix.net/44ff5c484f027b9096b6171a7c54e8df8f1d0f55.jpg?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d600\u0026w\u003d1200\u0026s\u003d2bf07db1cb2bfab483ad8e02ed1f1b8e", "disable_hero_tile": false, "marketing_blurb": "Get \u003cem\u003eThe Curse of Monkey Island\u003c/em\u003e, \u003cem\u003eSTAR WARS(tm) Empire at War: Gold Pack\u003c/em\u003e, \u003cem\u003eLEGO(r) Star Wars(tm): The Complete Saga\u003c/em\u003e, \u003cem\u003eLEGO(r) Pirates of the Caribbean The Video Game\u003c/em\u003e, and more!", "hover_title": "Pay What You Want", "product_url": "/games/disney-classics-black-friday", "tile_image": "https://hb.imgix.net/44ff5c484f027b9096b6171a7c54e8df8f1d0f55.jpg?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d353\u0026w\u003d616\u0026s\u003d1001711b36164adbfcf0383131cf9248", "cached_content_events": [{"identifier": "less_than_initial", "display_counter": false, "type": "base", "price": null, "has_subproducts": true, "start": null, "mpa_time": null, "section_identifiers": [], "has_tpkds": false, "max_price": null, "is_base": false}, {"identifier": "initial", "display_counter": false, "type": "price", "price": {"RU": [1172.01, "RUB"], "CN": [71.78, "CNY"], "CA": [13.92, "CAD"], "TR": [342.54, "TRY"], "US": [10.0, "USD"], "NZ": [16.82, "NZD"], "AU": [15.24, "AUD"], "PH": [588.58, "PHP"], "EUROPE_GBP": [7.78, "GBP"], "EUROPE_EURO": [9.35, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["core_tier"], "has_tpkds": true, "max_price": null, "is_base": false}], "exclusive_countries": [], "category": "bundle", "hero_highlights": [{"heading": "US$224 worth of awesome stuff", "tooltip": "Get games collectively valued at up to US$224."}, {"heading": "Pay \u20ac9.35 or more", "tooltip": "Name your price of \u20ac9.35 or more and increase your contribution to upgrade your bundle."}, {"heading": "Redeem on Steam", "tooltip": "Pay \u20ac9.35 or more for access to content on Steam."}], "end_date|datetime": "2024-12-14T02:00:00", "author": "Disney Interactive", "fallback_store_sale_logo": "", "high_res_tile_image_information": {"config": {"image_type": "gcs", "gcs": "images/humble_home/disneyblackfriday_bundle-product.jpg", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "supports_partners": true, "detailed_marketing_blurb": "Journey into the wonderful past with these beloved Disney franchises. Build your favorite heroes in LEGO games featuring Star Wars, Indiana Jones, and the Pirates of the Caribbean. Speaking of pirates, join Guybrush Threepwood in a collection of Monkey Island adventures or travel to a galaxy far, far away with Star Wars Knights of the Old Republic and Republic Commando. Delve into a deep catalog of Disney Classics and help support the Starlight Children\u0027s Foundation with your purchase!", "tile_logo": "https://hb.imgix.net/563cd3efa8318419d76102d4f7d62bf2b4cdf255.png?auto\u003dcompress,format\u0026h\u003d340\u0026w\u003d1200\u0026s\u003dbd6a063cd1a77a383c2d63c6f1372cf5", "tile_short_name": "Disney Classics Black Friday Humble Bundle", "start_date|datetime": "2024-11-29T19:00:00", "hover_highlights": ["17 games", "US$224 Value"], "tile_stamp": "games", "tile_name": "Disney Classics Black Friday Humble Bundle", "short_marketing_blurb": "A vault full of Disney Classics", "tile_image_information": {"config": {"image_type": "gcs", "gcs": "images/humble_home/disneyblackfriday_bundle-product.jpg", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "type": "bundle", "disallowed_countries": [], "highlights": ["Pay What You Want", "17 games", "US$224 Value", "Support Charity"]}, {"tile_logo_information": {"config": {"image_type": "gcs", "gcs": "images/logos/pathfindersecondeditionhappybirthdayremasterbundlefrompaizoinc_bundle-logo-product.png", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "product_variables": {"msrp|pricing": {"US": [888.0, "USD"]}, "msrp": "US$888"}, "machine_name": "pathfindersecondeditionhappybirthdayremasterbundlefrompaizoinc_bookbundle", "high_res_tile_image": "https://hb.imgix.net/f6458b06a808e7ead7c521494168b0f50684bf15.jpg?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d600\u0026w\u003d1200\u0026s\u003d8428bf4bb191356a8fea68a4781a1872", "disable_hero_tile": false, "marketing_blurb": "Get \u003cem\u003ePathfinder GM Core\u003c/em\u003e, \u003cem\u003ePathfinder Player Core\u003c/em\u003e, \u003cem\u003ePathfinder Core GM Screen\u003c/em\u003e, \u003cem\u003eThe Choosing (Stolen Fate 1 of 3)\u003c/em\u003e, \u003cem\u003eBroken Tusk Moon (Quest for the Frozen Flame 1 of 3)\u003c/em\u003e, and more!", "hover_title": "Pay What You Want", "product_url": "/books/pathfinder-second-edition-happy-birthday-remaster-bundle-from-paizo-inc-books", "tile_image": "https://hb.imgix.net/f6458b06a808e7ead7c521494168b0f50684bf15.jpg?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d353\u0026w\u003d616\u0026s\u003dd5857922ad99801378a6418f8719c5cf", "cached_content_events": [{"identifier": "less_than_initial", "display_counter": false, "type": "base", "price": null, "has_subproducts": true, "start": null, "mpa_time": null, "section_identifiers": [], "has_tpkds": false, "max_price": null, "is_base": false}, {"identifier": "initial", "display_counter": false, "type": "price", "price": {"RU": [586.0, "RUB"], "CN": [35.84, "CNY"], "CA": [6.95, "CAD"], "TR": [171.78, "TRY"], "US": [5.0, "USD"], "NZ": [8.34, "NZD"], "AU": [7.54, "AUD"], "PH": [291.72, "PHP"], "EUROPE_GBP": [3.86, "GBP"], "EUROPE_EURO": [4.64, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["core_tier"], "has_tpkds": true, "max_price": null, "is_base": false}, {"identifier": "bt15", "display_counter": false, "type": "price", "price": {"RU": [1758.01, "RUB"], "CN": [107.54, "CNY"], "CA": [20.86, "CAD"], "TR": [515.36, "TRY"], "US": [15.0, "USD"], "NZ": [25.02, "NZD"], "AU": [22.64, "AUD"], "PH": [875.18, "PHP"], "EUROPE_GBP": [11.58, "GBP"], "EUROPE_EURO": [13.92, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["bt15_tier"], "has_tpkds": true, "max_price": null, "is_base": false}, {"identifier": "bt30", "display_counter": false, "type": "price", "price": {"RU": [3516.03, "RUB"], "CN": [215.09, "CNY"], "CA": [41.72, "CAD"], "TR": [1030.73, "TRY"], "US": [30.0, "USD"], "NZ": [50.04, "NZD"], "AU": [45.28, "AUD"], "PH": [1750.37, "PHP"], "EUROPE_GBP": [23.16, "GBP"], "EUROPE_EURO": [27.84, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["bt30_tier"], "has_tpkds": true, "max_price": null, "is_base": false}], "exclusive_countries": [], "category": "bundle", "hero_highlights": [{"heading": "US$888 worth of awesome stuff", "tooltip": "Get ebooks collectively valued at up to US$888."}, {"heading": "Pay \u20ac4.64 or more", "tooltip": "Name your price of \u20ac4.64 or more and increase your contribution to upgrade your bundle."}, {"heading": "DRM-free", "tooltip": "Download the ebooks onto your favorite device to enjoy anywhere, anytime."}, {"heading": "Multi-format", "tooltip": "These ebooks come in \u003c\u003c\u003c\u003e\u003e\u003e file types to support many devices."}], "end_date|datetime": "2024-12-05T19:00:00", "author": "Paizo", "fallback_store_sale_logo": "", "high_res_tile_image_information": {"config": {"image_type": "gcs", "gcs": "images/humble_home/pathfindersecondeditionhappybirthdayremasterbundlefrompaizoinc_bundle-product.jpg", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "supports_partners": true, "detailed_marketing_blurb": "Gather your friends for endless adventure with the Ultimate Pathfinder Second Edition Bundle from Paizo Inc.! Experience the best way to play \u003cem\u003ePathfinder\u003c/em\u003e with this amazing bundle, which includes rulebooks, new scenarios, a bestiary, flip-mats, and campaign resources for \u003cem\u003ePathfinder GM Core\u003c/em\u003e, \u003cem\u003ePathfinder Second Edition Beginner Box: Remastered Edition\u003c/em\u003e, and \u003cem\u003ePathfinder Player Core\u003c/em\u003e, and more. Tabletop RPGs have never been this fun\u2014get everything you need to embark on an epic journey together while supporting ComicBooks For Kids! with your purchase.", "tile_logo": "https://hb.imgix.net/845d927071c3a5dbca711dbf4bf435e1cd1eba59.png?auto\u003dcompress,format\u0026h\u003d340\u0026w\u003d1200\u0026s\u003d178955eb38083ad676c679452f755200", "tile_short_name": "Pathfinder Second Edition \"Happy Birthday, Remaster!\" Bundle from Paizo Inc.", "start_date|datetime": "2024-11-14T19:00:00", "hover_highlights": ["72 books", "US$888 Value"], "tile_stamp": "books", "tile_name": "Humble RPG Bundle: Pathfinder Second Edition \"Happy Birthday, Remaster!\" Bundle from Paizo Inc.", "short_marketing_blurb": "Be the legendary hero of Golarion", "tile_image_information": {"config": {"image_type": "gcs", "gcs": "images/humble_home/pathfindersecondeditionhappybirthdayremasterbundlefrompaizoinc_bundle-product.jpg", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "type": "bundle", "disallowed_countries": [], "highlights": ["Pay What You Want", "72 books", "US$888 Value", "Support Charity"]}, {"tile_logo_information": {"config": {"image_type": "gcs", "gcs": "images/logos/rawcember-to-remember_bundle-logo-product.png", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "product_variables": {"msrp|pricing": {"US": [198.0, "USD"]}, "msrp": "US$198"}, "machine_name": "rawcembertoremember_bundle", "high_res_tile_image": "https://hb.imgix.net/e6cf082cafc93e8b821ca92f611d6dfff07c3619.png?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d600\u0026w\u003d1200\u0026s\u003d943311d16bfcb777e58fdcf0c3b3b250", "disable_hero_tile": false, "marketing_blurb": "Get \u003cem\u003ePizza Possum\u003c/em\u003e, \u003cem\u003eKingdom Two Crowns\u003c/em\u003e, \u003cem\u003eDome Keeper Deluxe\u003c/em\u003e, \u003cem\u003eSKALD: Against the Black Priory\u003c/em\u003e, \u003cem\u003eSnufkin: Melody of Moominvalley\u003c/em\u003e, and more!", "hover_title": "Pay What You Want", "product_url": "/games/rawcember-to-remember", "tile_image": "https://hb.imgix.net/e6cf082cafc93e8b821ca92f611d6dfff07c3619.png?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d353\u0026w\u003d616\u0026s\u003d5f4e036e64f9ac1bb086fde714d4f221", "cached_content_events": [{"identifier": "less_than_initial", "display_counter": false, "type": "base", "price": null, "has_subproducts": true, "start": null, "mpa_time": null, "section_identifiers": [], "has_tpkds": false, "max_price": null, "is_base": false}, {"identifier": "initial", "display_counter": false, "type": "price", "price": {"RU": [586.0, "RUB"], "CN": [36.22, "CNY"], "CA": [6.99, "CAD"], "TR": [172.32, "TRY"], "US": [5.0, "USD"], "NZ": [8.49, "NZD"], "AU": [7.68, "AUD"], "PH": [294.83, "PHP"], "EUROPE_GBP": [3.94, "GBP"], "EUROPE_EURO": [4.73, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["core_tier"], "has_tpkds": true, "max_price": null, "is_base": false}, {"identifier": "bt10", "display_counter": false, "type": "price", "price": {"RU": [1172.01, "RUB"], "CN": [72.45, "CNY"], "CA": [13.98, "CAD"], "TR": [344.65, "TRY"], "US": [10.0, "USD"], "NZ": [16.99, "NZD"], "AU": [15.36, "AUD"], "PH": [589.67, "PHP"], "EUROPE_GBP": [7.89, "GBP"], "EUROPE_EURO": [9.46, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["bt10_tier"], "has_tpkds": true, "max_price": null, "is_base": false}, {"identifier": "bt15", "display_counter": false, "type": "price", "price": {"RU": [1758.01, "RUB"], "CN": [108.68, "CNY"], "CA": [20.97, "CAD"], "TR": [516.98, "TRY"], "US": [15.0, "USD"], "NZ": [25.48, "NZD"], "AU": [23.04, "AUD"], "PH": [884.51, "PHP"], "EUROPE_GBP": [11.84, "GBP"], "EUROPE_EURO": [14.2, "EUR"]}, "has_subproducts": false, "start": null, "mpa_time": null, "section_identifiers": ["bt15_tier"], "has_tpkds": true, "max_price": null, "is_base": false}], "exclusive_countries": [], "category": "bundle", "hero_highlights": [{"heading": "US$198 worth of awesome stuff", "tooltip": "Get games collectively valued at up to US$198."}, {"heading": "Pay \u20ac4.73 or more", "tooltip": "Name your price of \u20ac4.73 or more and increase your contribution to upgrade your bundle."}], "end_date|datetime": "2024-12-19T02:00:00", "author": "Raw Fury Games", "fallback_store_sale_logo": "", "high_res_tile_image_information": {"config": {"image_type": "gcs", "gcs": "images/humble_home/rawcember-to-remember_bundle-product.png", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "supports_partners": true, "detailed_marketing_blurb": "Ready to play something new? The world of indie gaming is vast, deep, and bursting with amazing titles. Publishers like Raw Fury release amazing indie games that span a variety of genres\u2014from serious shooters to musical puzzle games. Get awesome indie titles like \u003cem\u003eDome Keeper Deluxe Edition\u003c/em\u003e, \u003cem\u003eKingdom Two Crowns: Norse Lands Edition\u003c/em\u003e, \u003cem\u003eSnufkin: Melody of Moominvalley\u003c/em\u003e, and more with Raw Fury\u2019s RAWcember to Remember bundle! Experience new games and help support Save the Children with your purchase.", "tile_logo": "https://hb.imgix.net/7e07f027bfeb191858d147efd181338cf4fe5bfd.png?auto\u003dcompress,format\u0026h\u003d340\u0026w\u003d1200\u0026s\u003de05e4152fa4879f0b695c62a5deb5f8f", "tile_short_name": "Rawcember to Remember", "start_date|datetime": "2024-11-27T19:00:00", "hover_highlights": ["12 games", "US$198 Value"], "tile_stamp": "games", "tile_name": "Rawcember to Remember", "short_marketing_blurb": "RAWcember to Remember is here!", "tile_image_information": {"config": {"image_type": "gcs", "gcs": "images/humble_home/rawcember-to-remember_bundle-product.png", "imgix": {"args": {}, "master_image": {"image_type": "gcs", "gcs": "", "static": "", "imgix": {}}}}}, "type": "bundle", "disallowed_countries": [], "highlights": ["Pay What You Want", "12 games", "US$198 Value", "Support Charity"]}], "tier_item_data": {"artofmacmalware": {"machine_name": "artofmacmalware", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "350.6 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/artofmacmalware_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/artofmacmalware_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d9c7bd8f993d4c3dcd01e66f08dd1ccd7e349f51685d50ecd0e95907f81d8e86f"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/art-mac-malware"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 36.0}, "subtitle_html": null, "description_text": "\u003cp\u003eDefenders must fully understand how malicious software works if they hope to stay ahead of the increasingly sophisticated threats facing Apple products today. \u003cem\u003eThe Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software\u003c/em\u003e is a comprehensive handbook to cracking open these malicious programs and seeing what\u2019s inside.\u003c/p\u003e\n\u003cp\u003eDiscover the secrets of nation state backdoors, destructive ransomware, and subversive cryptocurrency miners as you uncover their infection methods, persistence strategies, and insidious capabilities. Then work with and extend foundational reverse-engineering tools to extract and decrypt embedded strings, unpack protected Mach-O malware, and even reconstruct binary code. Next, using a debugger, you\u2019ll execute the malware, instruction by instruction, to discover exactly how it operates. In the book\u2019s final section, you\u2019ll put these lessons into practice by analyzing a complex Mac malware specimen on your own.\u003c/p\u003e\n\u003cp\u003eYou\u2019ll learn to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eRecognize common infections vectors, persistence mechanisms, and payloads leveraged by Mac malware\u003c/li\u003e\n\u003cli\u003eTriage unknown samples in order to quickly classify them as benign or malicious\u003c/li\u003e\n\u003cli\u003eWork with static analysis tools, including disassemblers, in order to study malicious scripts and compiled binaries\u003c/li\u003e\n\u003cli\u003eLeverage dynamical analysis tools, such as monitoring tools and debuggers, to gain further insight into sophisticated threats\u003c/li\u003e\n\u003cli\u003eQuickly identify and bypass anti-analysis techniques aimed at thwarting your analysis attempts\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eA former NSA hacker and current leader in the field of macOS threat analysis, Patrick Wardle uses real-world examples pulled from his original research. \u003cem\u003eThe Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software\u003c/em\u003e is the definitive resource to battling these ever more prevalent and insidious Apple-focused threats.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/artofmacmalware.png", "title": null, "resolved_paths": {}, "image_text": "The Art of Mac Malware", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/artofmacmalware_slideout.jpg", "developers": [{"developer-name": "Patrick Wardle"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/537e34e6a9edc1f7af44628aab2034d595048681.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d710c28967226710d0823d13fa359670c", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/537e34e6a9edc1f7af44628aab2034d595048681.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d3369c43529ae2988039b6f39a1483b05", "front_page_art_imgix_retina": "https://hb.imgix.net/f77d8ec44778655aa51b8e16efadcabc545aed4e.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d492dcd955f2e600a2d8135407ef82eb7", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/f77d8ec44778655aa51b8e16efadcabc545aed4e.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d60d09d2a1d73c73d04d63d35643dfcfe", "preview_image": "https://hb.imgix.net/537e34e6a9edc1f7af44628aab2034d595048681.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003db2a34beffec7c98e57b8f0e65138821d", "front_page_art_imgix": "https://hb.imgix.net/f77d8ec44778655aa51b8e16efadcabc545aed4e.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003da7eda75d3a4e5530490384ee42ff7770", "front_page_art_charity_imgix": "https://hb.imgix.net/f77d8ec44778655aa51b8e16efadcabc545aed4e.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d4279bfc54a6b716d481b9db0f87e01bb"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "The Art of Mac Malware", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "americancivillibertiesunion": {"machine_name": "americancivillibertiesunion", "youtube_link": "e0vcUTwgyfE", "item_content_type": null, "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": null, "featured_image": null, "ppgf_info": {"category": "Society and Communities", "city": "New York", "description": "For nearly 100 years, the American Civil Liberties Union (ACLU) has been our nation\u0027s guardian of liberty, working in courts, legislatures, and communities to defend and preserve the individual rights and liberties that the Constitution and the laws of the United States guarantee everyone in this country.", "url": "http://www.aclu.org", "country": "US", "charity_id": "2330496", "state": "NY", "keywords": "civil liberties, rights, Constitution, resistance", "human_name": "ACLU Foundation", "logo_url": "https://hbproxy.imgix.net/https%3A%2F%2Fpics.paypal.com%2F00%2Fs%2FYzJkNDBlZTktNjU5MC00MmI0LWJmODMtZjllOGQ2MDI3MWM1%2Ffile.PNG?auto\u003dcompress\u0026auto\u003dformat\u0026bg\u003dfff\u0026fit\u003dfill\u0026h\u003d350\u0026w\u003d510\u0026s\u003d018bfa1ac0aa2acc0b0edcc5c42312c7"}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": null, "publishers": [], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "subtitle_html": null, "description_text": "\u003cp\u003e\u003cem\u003eDonations to support the American Civil Liberties Union Foundation, Inc. (ACLU) are made to \u0026nbsp;\u003ca href\u003d\"https://support.humblebundle.com/hc/en-us/articles/205183597\" target\u003d\"_blank\"\u003ePayPal Giving Fund\u003c/a\u003e, subject to its policies.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eFor nearly 100 years, the American Civil Liberties Union (ACLU) has been our nation\u0027s guardian of liberty, working in courts, legislatures, and communities to defend and preserve the individual rights and liberties that the Constitution and the laws of the United States guarantee everyone in this country. Whether it\u0027s achieving full equality for LGBT people, establishing new privacy protections for our digital age of widespread government surveillance, ending mass incarceration, or preserving the right to vote or the right to have an abortion, the ACLU takes up the toughest civil liberties cases and issues to defend all people from government abuse and overreach. With more than 2 million members, activists, and supporters, the ACLU is a nationwide organization that fights tirelessly in all 50 states, Puerto Rico, and Washington, D.C., to safeguard everyone\u0027s rights.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/charities/CharityLogos/aclu_logo_blue.png", "title": null, "resolved_paths": {}, "image_text": "American Civil Liberties Union (ACLU)", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/charities/CharityLogos/aclu_logo_blue.png", "developers": [{"developer-name": "www.aclu.org", "developer-url": " https://www.aclu.org"}], "is_clickable": true, "platforms_and_oses": {}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003da129d878c0a4ddb289f68c5118f5d65a", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d2cc00346038eaa82b432cf40921c488d", "front_page_art_imgix_retina": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d240\u0026w\u003d180\u0026s\u003d75a3cafae13ffcb4ffdaf397f7e2e05c", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d5246cdf59ce1a56fd7e4e4473303d7ea", "preview_image": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d8ff87400f93a9b122779f1676fa4cf08", "front_page_art_imgix": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d240\u0026w\u003d180\u0026s\u003d2e33ca04eac32d71e62fd8da9c5d8249", "front_page_art_charity_imgix": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dfd23b241352553378e6e79c347428e49"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "American Civil Liberties Union (ACLU)", "is_mystery_box": null, "payee_secondary_id": "2330496", "wallet_credit": {}}, "androidmalwarebook": {"machine_name": "androidmalwarebook", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "585.2 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/androidmalwarebook_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/androidmalwarebook_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d61d88625008f1276684ae8a7e56d431c3189b5949fcd1338cf6a28c40a6a58ca"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/androidmalwarehandbook"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 36.0}, "subtitle_html": null, "description_text": "\u003cp\u003eThis groundbreaking guide to Android malware distills years of research by machine learning experts in academia and members of Meta and Google\u2019s Android Security teams into a comprehensive introduction to detecting common threats facing the Android eco-system today.\u003c/p\u003e\r\n\u003cp\u003eExplore the history of Android malware in the wild since the operating system first launched and then practice static and dynamic approaches to analyzing real malware specimens. Next, examine machine learning techniques that can be used to detect malicious apps, the types of classification models that defenders can implement to achieve these detections, and the various malware features that can be used as input to these models. Adapt these machine learning strategies to the identification of malware categories like banking trojans, ransomware, and SMS fraud.\u003c/p\u003e\r\n\u003cp\u003eYou\u2019ll:\u003c/p\u003e\r\n\u003cul\u003e\r\n\u003cli\u003eDive deep into the source code of real malware\u003c/li\u003e\r\n\u003cli\u003eExplore the static, dynamic, and complex features you can extract from malware for analysis\u003c/li\u003e\r\n\u003cli\u003eMaster the machine learning algorithms useful for malware detection\u003c/li\u003e\r\n\u003cli\u003eSurvey the efficacy of machine learning techniques at detecting common Android malware categories\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003cp\u003eThe \u003cem\u003eAndroid Malware Handbook\u003c/em\u003e\u2019s team of expert authors will guide you through the Android threat landscape and prepare you for the next wave of malware to come.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/androidmalwarebook.png", "title": null, "resolved_paths": {}, "image_text": "The Android Malware Book", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/androidmalwarebook_slideout.jpg", "developers": [{"developer-name": "Qian Han"}, {"developer-name": "Salvador Mandujano"}, {"developer-name": "Sebastian Porst"}, {"developer-name": "V.S. Subrahmanian"}, {"developer-name": "Sai Deep Tetali"}, {"developer-name": "Yanhai Xiong"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/aa361713ea80343221b9bf65a413e0dd21363a4e.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003deb3ccb9a1dcca71b3a6d7093c7aa75cc", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/aa361713ea80343221b9bf65a413e0dd21363a4e.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003dedfcbae4038aa9e189bbce78936b9a98", "front_page_art_imgix_retina": "https://hb.imgix.net/ea6d2c78aea936154733c5d84c604c79bfe75480.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003ddc6e40b87157822eede82daaccfdd56e", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/ea6d2c78aea936154733c5d84c604c79bfe75480.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d71534afbf3b749084fe2ae799c67309c", "preview_image": "https://hb.imgix.net/aa361713ea80343221b9bf65a413e0dd21363a4e.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d764e2da968a04aaac1ebf45cf8df916b", "front_page_art_imgix": "https://hb.imgix.net/ea6d2c78aea936154733c5d84c604c79bfe75480.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003deb92e1e5cc6d3547f7cac6aa8451bc6f", "front_page_art_charity_imgix": "https://hb.imgix.net/ea6d2c78aea936154733c5d84c604c79bfe75480.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d171f910d12a422e4bd66661c9cc07403"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "The Android Malware Book", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "blackhatgo": {"machine_name": "blackhatgo", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "518.3 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/blackhatgo_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/blackhatgo_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d9765fca044ed440766f4ec26d4aa8d08d1d6e92c2132b45c9df378f104fedebf"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/blackhatgo"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 10.0}, "subtitle_html": null, "description_text": "\u003cp\u003e\u003ci\u003eBlack Hat Go\u003c/i\u003e explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.\u003c/p\u003e\n\u003cp\u003eYou\u0027ll begin your journey with a basic overview of Go\u0027s syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You\u0027ll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You\u0027ll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.\u003c/p\u003e\n\u003cp\u003eYou\u0027ll learn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eMake performant tools that can be used for your own security projects\u003c/li\u003e\n\u003cli\u003eCreate usable tools that interact with remote APIs\u003c/li\u003e\n\u003cli\u003eScrape arbitrary HTML data\u003c/li\u003e\n\u003cli\u003eUse Go\u0027s standard package, net/http, for building HTTP servers\u003c/li\u003e\n\u003cli\u003eWrite your own DNS server and proxy\u003c/li\u003e\n\u003cli\u003eUse DNS tunneling to establish a C2 channel out of a restrictive network\u003c/li\u003e\n\u003cli\u003eCreate a vulnerability fuzzer to discover an application\u0027s security weaknesses\u003c/li\u003e\n\u003cli\u003eUse plug-ins and extensions to future-proof products\u003c/li\u003e\n\u003cli\u003eBuild an RC2 symmetric-key brute-forcer\u003c/li\u003e\n\u003cli\u003eImplant data within a Portable Network Graphics (PNG) image\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eAre you ready to add to your arsenal of security tools? Then let\u0027s Go!\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/blackhatgo.png", "title": null, "resolved_paths": {}, "image_text": "Black Hat Go", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/blackhatgo_slideout.jpg", "developers": [{"developer-name": "Tom Steele"}, {"developer-name": "Chris Patten"}, {"developer-name": "Dan Kottmann"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/32a113b01707b83ba236a55ddf78d3a6c735c419.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d129578e6f8cbe5894cf0833baa8e78f7", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/32a113b01707b83ba236a55ddf78d3a6c735c419.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003da5534c96d7e34a76556c6044eed3a9fc", "front_page_art_imgix_retina": "https://hb.imgix.net/e1f5bf72fae363562a3d08e1320a5dcf8908e2de.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003df38c9cbc3edf7c71749ca02e387d4b50", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/e1f5bf72fae363562a3d08e1320a5dcf8908e2de.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003de2cfa396c63c1857b70168139e1bcf7a", "preview_image": "https://hb.imgix.net/32a113b01707b83ba236a55ddf78d3a6c735c419.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d7f0c33921d9803d6f819513b6d552186", "front_page_art_imgix": "https://hb.imgix.net/e1f5bf72fae363562a3d08e1320a5dcf8908e2de.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d3766af27fbb18a9b7162104d8c50e3df", "front_page_art_charity_imgix": "https://hb.imgix.net/e1f5bf72fae363562a3d08e1320a5dcf8908e2de.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d0d742fbb2cd1ce11249353aac6baadc6"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Black Hat Go", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "attackingnetworkprotocols": {"machine_name": "attackingnetworkprotocols", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "85.6 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/attackingnetworkprotocols_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/attackingnetworkprotocols_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d7f321488f302a235db6154abacccd1fea121cdf639769e8099cc6f65bab3fb35"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/networkprotocols"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 18.0}, "subtitle_html": null, "description_text": "\u003cp\u003e\u003cem\u003eAttacking Network Protocols\u003c/em\u003e is a deep dive into network protocol security from James Forshaw, one of the world\u0027s leading bug hunters. This comprehensive guide looks at networking from an attacker\u0027s perspective to help you discover, exploit, and ultimately protect vulnerabilities.\u003c/p\u003e\n\u003cp\u003eYou\u0027ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you\u0027ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks.\u003c/p\u003e\n\u003cp\u003eLearn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCapture, manipulate, and replay packets\u003c/li\u003e\n\u003cli\u003eDevelop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol\u003c/li\u003e\n\u003cli\u003eDiscover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service\u003c/li\u003e\n\u003cli\u003eUse capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network traffic\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cem\u003eAttacking Network Protocols\u003c/em\u003e is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.\u003cbr\u003e\u003cbr\u003e\u003cem\u003e\"Very readable and accessible...worth reading even if your only interest in network security is as an applications developer.\u201d\u003c/em\u003e \u003cbr\u003e\u2014I Programmer\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/attackingnetworkprotocols.png", "title": null, "resolved_paths": {}, "image_text": "Attacking Network Protocols", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/attackingnetworkprotocols_slideout.jpg", "developers": [{"developer-name": "James Forshaw"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/e7a82c46bbf278a86d8d765a2df1d9c42750b426.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d74f58e15b879eec965baedc52146335a", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/e7a82c46bbf278a86d8d765a2df1d9c42750b426.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d826dd30f4ed7b5b5e9355a3b8e554e7f", "front_page_art_imgix_retina": "https://hb.imgix.net/e043f613375d2be40af923992e2ebb1ebda5cafd.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d09b97badf2e8dcbe607cf657b806f01a", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/e043f613375d2be40af923992e2ebb1ebda5cafd.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d33110beb5285d3b142f269debff64b84", "preview_image": "https://hb.imgix.net/e7a82c46bbf278a86d8d765a2df1d9c42750b426.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d9f832c4402272749dd9120361f0725da", "front_page_art_imgix": "https://hb.imgix.net/e043f613375d2be40af923992e2ebb1ebda5cafd.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003dc4dd33ee50e18c711feaa45e3a9229b3", "front_page_art_charity_imgix": "https://hb.imgix.net/e043f613375d2be40af923992e2ebb1ebda5cafd.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dae3fd13c47609d070ddf4d6e6cc38284"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Attacking Network Protocols", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "windowssecurityinternals": {"machine_name": "windowssecurityinternals", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "104 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/windowssecurityinternals_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/windowssecurityinternals_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003dd5f87cd8ae67b75be55b16812d639e7f0fd3052a07cfbf0ab787c65c85ae5c28"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/windows-security-internals"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 36.0}, "subtitle_html": null, "description_text": "\u003cp\u003e\u003cem\u003eWindows Security Internals\u003c/em\u003e is a must-have for anyone needing to understand the Windows operating system\u2019s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system\u2019s key elements and weaknesses, surpassing even Microsoft\u2019s official documentation.\u003c/p\u003e\r\n\u003cp\u003eAuthor James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.\u003c/p\u003e\r\n\u003cp\u003eYou\u2019ll also explore a wide range of topics, such as:\u003c/p\u003e\r\n\u003cul\u003e\r\n\u003cli\u003eWindows security architecture, including both the kernel and user-mode applications\u003c/li\u003e\r\n\u003cli\u003eThe Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource\u2019s security descriptor, and access checking and auditing\u003c/li\u003e\r\n\u003cli\u003eInteractive Windows authentication and credential storage in the Security Account Manager (SAM) and Active Directory\u003c/li\u003e\r\n\u003cli\u003eMechanisms of network authentication protocols, including NTLM and Kerberos\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003cp\u003eIn an era of sophisticated cyberattacks on Windows networks, mastering the operating system\u2019s complex security mechanisms is more crucial than ever. Whether you\u2019re defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you\u2019ll find \u003cem\u003eWindows Security Internals\u003c/em\u003e indispensable in your efforts to navigate the complexities of today\u2019s cybersecurity landscape.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/windowssecurityinternals.png", "title": null, "resolved_paths": {}, "image_text": "Windows Security Internals", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/windowssecurityinternals_slideout.jpg", "developers": [{"developer-name": "James Forshaw"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/8163d5c35b6d7dc8c47cb8f3a4810b644d9b3ed6.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d0afa30530d2db43a77497920964b3523", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/8163d5c35b6d7dc8c47cb8f3a4810b644d9b3ed6.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003def57141677d2a892009466007a3de268", "front_page_art_imgix_retina": "https://hb.imgix.net/ca9b6a70fee19d6302b7c61399d220d13d17df6b.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d742dae141f9c7f6ea680bdab24318873", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/ca9b6a70fee19d6302b7c61399d220d13d17df6b.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d44f6ecde0c7f80f8eceddf824a360400", "preview_image": "https://hb.imgix.net/8163d5c35b6d7dc8c47cb8f3a4810b644d9b3ed6.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d3c4b2eec05f7628b2035a43d1b49d67b", "front_page_art_imgix": "https://hb.imgix.net/ca9b6a70fee19d6302b7c61399d220d13d17df6b.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003dabbd90d9f82a48b3a687ebad824144be", "front_page_art_charity_imgix": "https://hb.imgix.net/ca9b6a70fee19d6302b7c61399d220d13d17df6b.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d5dfdbf2399c279312d7089ba7cdfe6a0"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Windows Security Internals", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "evadingedr": {"machine_name": "evadingedr", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "145 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/evadingedr_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/evadingedr_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003db0df74cef2e7db7d1aed79a0fbd6ecbd029f97b4265d006f7c6259bb274ad8d1"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/evading-edr"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 36.0}, "subtitle_html": null, "description_text": "\u003cp\u003eNearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn\u2019t mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you\u2019ll learn that EDR is not a magical black box\u2014it\u2019s just a complex software application built around a few easy-to-understand components.\u003c/p\u003e\r\n\u003cp\u003eThe author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/evadingedr.png", "title": null, "resolved_paths": {}, "image_text": "Evading EDR", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/evadingedr_slideout.jpg", "developers": [{"developer-name": "Matt Hand"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/bd0970991e154d98cbf852b9946de4c3987dad4e.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003df065246b7b081cb995297b153dd15a63", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/bd0970991e154d98cbf852b9946de4c3987dad4e.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003db8488a9b67273f168b30a0aba4ea4648", "front_page_art_imgix_retina": "https://hb.imgix.net/a4e04d428c24afc9263ea168e8276d60e357d6fb.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003dc7037007bcf6ccb5e5fe60ca70441049", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/a4e04d428c24afc9263ea168e8276d60e357d6fb.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dc33392fcc4c75e9a15c40f7754e612db", "preview_image": "https://hb.imgix.net/bd0970991e154d98cbf852b9946de4c3987dad4e.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003dda05a572e1f4dfacbfb92eafbb4dacff", "front_page_art_imgix": "https://hb.imgix.net/a4e04d428c24afc9263ea168e8276d60e357d6fb.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d83e5eb9a056ff92df0f7c4b63d8c71d7", "front_page_art_charity_imgix": "https://hb.imgix.net/a4e04d428c24afc9263ea168e8276d60e357d6fb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d45997dbc5182792c60f00884c57c8eb4"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Evading EDR", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "ghidrabook": {"machine_name": "ghidrabook", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "268.2 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/ghidrabook_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/ghidrabook_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d0a5f72f312bcbb8614b656644e0fde39b80e474850ad82bf4d6e28ec74eaf2f2"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/GhidraBook"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 18.0}, "subtitle_html": null, "description_text": "\u003cp\u003eThe result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency\u2019s most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world\u2019s most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere\u2014and \u003cem\u003eThe Ghidra Book\u003c/em\u003e is the one and only guide you need to master it.\u003c/p\u003e\n\u003cp\u003eIn addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra\u2019s components, features, and unique capacity for group collaboration. You\u2019ll learn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eNavigate a disassembly\u003c/li\u003e\n\u003cli\u003eUse Ghidra\u2019s built-in decompiler to expedite analysis\u003c/li\u003e\n\u003cli\u003eAnalyze obfuscated binaries\u003c/li\u003e\n\u003cli\u003eExtend Ghidra to recognize new data types\u003c/li\u003e\n\u003cli\u003eBuild new Ghidra analyzers and loaders\u003c/li\u003e\n\u003cli\u003eAdd support for new processors and instruction sets\u003c/li\u003e\n\u003cli\u003eScript Ghidra tasks to automate workflows\u003c/li\u003e\n\u003cli\u003eSet up and use a collaborative reverse engineering environment\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eDesigned for beginner and advanced users alike, \u003cem\u003eThe Ghidra Book\u003c/em\u003e will effectively prepare you to meet the needs and challenges of RE, so you can analyze files like a pro.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/ghidrabook.png", "title": null, "resolved_paths": {}, "image_text": "The Ghidra Book", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/ghidrabook_slideout.jpg", "developers": [{"developer-name": "Chris Eagle"}, {"developer-name": "Kara Nance"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/95e70c03f578d8a4fc7a349e10636cf9dbc45fc3.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003dbab5ac0195af2f3a6fd14590bad6d871", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/95e70c03f578d8a4fc7a349e10636cf9dbc45fc3.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003dc50fcde575dd51b860a27718c3710c24", "front_page_art_imgix_retina": "https://hb.imgix.net/cb80373e3693d47fe8ce4895ce42fad8a3effa3c.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d140e8a2926ec4a5e017a70684eb27d62", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/cb80373e3693d47fe8ce4895ce42fad8a3effa3c.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d7a4c2a787f6a5cb663f8336f42c1fcbb", "preview_image": "https://hb.imgix.net/95e70c03f578d8a4fc7a349e10636cf9dbc45fc3.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d127998f159ec8f1f7cd01a85e3fc9c3f", "front_page_art_imgix": "https://hb.imgix.net/cb80373e3693d47fe8ce4895ce42fad8a3effa3c.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d399c40e7a9e77e1af3c51ccf385b321e", "front_page_art_charity_imgix": "https://hb.imgix.net/cb80373e3693d47fe8ce4895ce42fad8a3effa3c.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d1216f85fb22129733235ca5c472af2af"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "The Ghidra Book", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "hacksleaksandrevelations": {"machine_name": "hacksleaksandrevelations", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "60.5 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/hacksleaksandrevelations_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/hacksleaksandrevelations_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d6436f793a81d5a37f03fd84a41b267132b9b2e7d4384db49b90b9c4bd93225c1"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/hacks-leaks-and-revelations"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 36.0}, "subtitle_html": null, "description_text": "\u003cp\u003eUnlock the internet\u2019s treasure trove of public interest data with \u003cem\u003eHacks, Leaks, and Revelations\u003c/em\u003e by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends real-world techniques for researching large datasets with lessons on coding, data authentication, and digital security. All of this is spiced up with gripping stories from the front lines of investigative journalism.\u003c/p\u003e\r\n\u003cp\u003eDive into exposed datasets from a wide array of sources: the FBI, the DHS, police intelligence agencies, extremist groups like the Oath Keepers, and even a Russian ransomware gang. Lee\u2019s own in-depth case studies on disinformation-peddling pandemic profiteers and neo-Nazi chatrooms serve as blueprints for your research.\u003c/p\u003e\r\n\u003cp\u003eGain practical skills in searching massive troves of data for keywords like \u201cantifa\u201d and pinpointing documents with newsworthy revelations. Get a crash course in Python to automate the analysis of millions of files.\u003c/p\u003e\r\n\u003cp\u003eYou will also learn how to:\u003c/p\u003e\r\n\u003cul\u003e\r\n\u003cli\u003eMaster encrypted messaging to safely communicate with whistleblowers\u003c/li\u003e\r\n\u003cli\u003eSecure datasets over encrypted channels using Signal, Tor Browser, OnionShare, and SecureDrop\u003c/li\u003e\r\n\u003cli\u003eHarvest data from the BlueLeaks collection of internal memos, financial records, and more from over 200 state, local, and federal agencies\u003c/li\u003e\r\n\u003cli\u003eProbe leaked email archives about offshore detention centers and the Heritage Foundation\u003c/li\u003e\r\n\u003cli\u003eAnalyze metadata from videos of the January 6 attack on the US Capitol, sourced from the Parler social network\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\u003cp\u003eWe live in an age where hacking and whistleblowing can unearth secrets that alter history. \u003cem\u003eHacks, Leaks, and Revelations\u003c/em\u003e is your toolkit for uncovering new stories and hidden truths. Crack open your laptop, plug in a hard drive, and get ready to change history.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/hacksleaksandrevelations.png", "title": null, "resolved_paths": {}, "image_text": "Hacks, Leaks, and Revelations", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/hacksleaksandrevelations_slideout.jpg", "developers": [{"developer-name": "Micah Lee"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/35c5bec2f6a594c5911ad39322cf13e603033f7e.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d89c2d669f9c548a091a9dc374bd77b51", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/35c5bec2f6a594c5911ad39322cf13e603033f7e.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d7e19d9785805e3b7c6aed73f67ed0fb3", "front_page_art_imgix_retina": "https://hb.imgix.net/a2e95cd2bfbe877812c63f98d696b6326f9c61e2.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003dc4ae7ad7e09451195c78839e4f2310a7", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/a2e95cd2bfbe877812c63f98d696b6326f9c61e2.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d02cd96eafdef54434fec5b225dcd781d", "preview_image": "https://hb.imgix.net/35c5bec2f6a594c5911ad39322cf13e603033f7e.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d9406b4828931a9020bde903d854f232d", "front_page_art_imgix": "https://hb.imgix.net/a2e95cd2bfbe877812c63f98d696b6326f9c61e2.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d04778e3996d99fcb819ff93103f9874d", "front_page_art_charity_imgix": "https://hb.imgix.net/a2e95cd2bfbe877812c63f98d696b6326f9c61e2.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d70a845a45076fcd7206dcaadade75357"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Hacks, Leaks, and Revelations", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "real-worldbughunting": {"machine_name": "real-worldbughunting", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "295.6 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/real-worldbughunting_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/real-worldbughunting_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d3722bbf99fca21d34fccf2bfd7ef660d7c16935fe74d6c8695d0c57afde6e23a"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/bughunting"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 1.0}, "subtitle_html": null, "description_text": "\u003cp\u003eLearn how people break websites and how you can, too.\u0026nbsp;\u003ci\u003eReal-World Bug Hunting\u003c/i\u003e is the premier field guide to finding software bugs. Whether you\u0027re a cyber-security beginner who wants to make the internet safer or a seasoned developer who wants to write secure code, ethical hacker Peter Yaworski will show you how it\u0027s done.\u003c/p\u003e\n\u003cp\u003eYou\u0027ll learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery. Using real-life case studies of rewarded vulnerabilities from applications like Twitter, Facebook, Google, and Uber, you\u0027ll see how hackers manage to invoke race conditions while transferring money, use URL parameter to cause users to like unintended tweets, and more.\u003c/p\u003e\n\u003cp\u003eEach chapter introduces a vulnerability type accompanied by a series of actual reported bug bounties. The book\u0027s collection of tales from the field will teach you how attackers trick users into giving away their sensitive information and how sites may reveal their vulnerabilities to savvy users. You\u0027ll even learn how you could turn your challenging new hobby into a successful career.\u003c/p\u003e\n\u003cp\u003eYou\u0027ll learn:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eHow the internet works and basic web hacking concepts\u003c/li\u003e\n\u003cli\u003eHow attackers compromise websites\u003c/li\u003e\n\u003cli\u003eHow to identify functionality commonly associated with vulnerabilities\u003c/li\u003e\n\u003cli\u003eWhere to start when hunting bugs\u003c/li\u003e\n\u003cli\u003eHow to find bug bounty programs and submit effective vulnerability reports\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003ci\u003eReal-World Bug Hunting\u003c/i\u003e is a fascinating soup-to-nuts primer on web security vulnerabilities, filled with stories from the trenches and practical wisdom. With your new understanding of site security and weaknesses, you can help make the web a safer place\u2014and profit while you\u0027re at it.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/real-worldbughunting.png", "title": null, "resolved_paths": {}, "image_text": "Real-World Bug Hunting", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/real-worldbughunting_slideout.jpg", "developers": [{"developer-name": "Peter Yaworski"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/94ae9358fe87a07e5222b6cb841c4fe915c4efe9.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d5abdaac96a0ce4a0f11a7ded62ee55de", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/94ae9358fe87a07e5222b6cb841c4fe915c4efe9.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003db569d6ae2a8d3ca1a8423bdfe9f5d6bc", "front_page_art_imgix_retina": "https://hb.imgix.net/74eba4c5e560eb2be3592d949c0200f0a4ff0434.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d663ff3142eb07f099b2367526facf0e0", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/74eba4c5e560eb2be3592d949c0200f0a4ff0434.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d03ee380140978bd27b05a18c55a2e88e", "preview_image": "https://hb.imgix.net/94ae9358fe87a07e5222b6cb841c4fe915c4efe9.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003db421edbb6dbb0b1f6a99e22840cbe30c", "front_page_art_imgix": "https://hb.imgix.net/74eba4c5e560eb2be3592d949c0200f0a4ff0434.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d1befaf1cb4b00aa8ef8fb63a1903c490", "front_page_art_charity_imgix": "https://hb.imgix.net/74eba4c5e560eb2be3592d949c0200f0a4ff0434.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003da7d219e406fc9add481f2f55c10bfb4e"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Real-World Bug Hunting", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "thetangledweb": {"machine_name": "thetangledweb", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "121.1 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/thetangledweb_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/thetangledweb_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d5adb6a424fb36b2e648eda4d06b77c4e0ec9ed0c25f8ff8b08171f0563f3d5a7"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/tangledweb"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 1.0}, "subtitle_html": null, "description_text": "\u003cp\u003eModern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.\u003c/p\u003e\n\u003cp\u003eIn \u003ci\u003eThe Tangled Web\u003c/i\u003e, Michal Zalewski, one of the world\u2019s top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they\u2019re fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You\u2019ll learn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003ePerform common but surprisingly complex tasks such as URL parsing and HTML sanitization\u003c/li\u003e\n\u003cli\u003eUse modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing\u003c/li\u003e\n\u003cli\u003eLeverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs\u003c/li\u003e\n\u003cli\u003eBuild mashups and embed gadgets without getting stung by the tricky frame navigation policy\u003c/li\u003e\n\u003cli\u003eEmbed or host user-supplied content without running into the trap of content sniffing\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor quick reference, \u201cSecurity Engineering Cheat Sheets\u201d at the end of each chapter offer ready solutions to problems you\u2019re most likely to encounter. With coverage extending as far as planned HTML5 features, \u003ci\u003eThe Tangled Web\u003c/i\u003e will help you create secure web applications that stand the test of time.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/thetangledweb.png", "title": null, "resolved_paths": {}, "image_text": "The Tangled Web", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/thetangledweb_slideout.jpg", "developers": [{"developer-name": "Michal Zalewski"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/c35ef938fd30f38dd571e6a26aeed3af33484ddd.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003dbfc073e33341afa42484b896780769e3", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/c35ef938fd30f38dd571e6a26aeed3af33484ddd.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003df735fe9d89ee6b73ad93834d5d2243a7", "front_page_art_imgix_retina": "https://hb.imgix.net/a30088832dacc754d1eb4eb2eae779dcdebdcbaa.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d11e11421ff231e6f628c7e690148aac3", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/a30088832dacc754d1eb4eb2eae779dcdebdcbaa.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d7f524b9b11a65bf10e02aa0d4f72b60a", "preview_image": "https://hb.imgix.net/c35ef938fd30f38dd571e6a26aeed3af33484ddd.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d2f42e8e00ffb107235447cab71971af0", "front_page_art_imgix": "https://hb.imgix.net/a30088832dacc754d1eb4eb2eae779dcdebdcbaa.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003dffc78f9a14dea64589d97514e2b01e79", "front_page_art_charity_imgix": "https://hb.imgix.net/a30088832dacc754d1eb4eb2eae779dcdebdcbaa.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dd650909930b84a5a65eda7200f24aa48"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "The Tangled Web", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "linuxbasicsforhackers": {"machine_name": "linuxbasicsforhackers", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": "images/storefront/master_images/linuxbasicsforhackers_slideout.jpg", "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "725.9 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/linuxbasicsforhackers_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/linuxbasicsforhackers_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003daaad279fb3cb05ec0484e2833cb333f2a4e1315b9d683ca85493ea4af09f76dd"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/linuxbasicsforhackers"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 18.0}, "subtitle_html": null, "description_text": "\u003cp\u003eIf you\u2019re getting started along the exciting path of hacking, cybersecurity, and pentesting, \u003cem\u003eLinux Basics for Hackers\u003c/em\u003e is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you\u2019ll learn the basics of using the Linux operating system and acquire the tools and techniques you\u2019ll need to take control of a Linux environment.\u003c/p\u003e\n\u003cp\u003eFirst, you\u2019ll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you\u2019ll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You\u2019ll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCover your tracks by changing your network information and manipulating the rsyslog logging utility\u003c/li\u003e\n\u003cli\u003eWrite a tool to scan for network connections, and connect and listen to wireless networks\u003c/li\u003e\n\u003cli\u003eKeep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email\u003c/li\u003e\n\u003cli\u003eWrite a bash script to scan open ports for potential targets\u003c/li\u003e\n\u003cli\u003eUse and abuse services like MySQL, Apache web server, and OpenSSH\u003c/li\u003e\n\u003cli\u003eBuild your own hacking tools, such as a remote video spy camera and a password cracker\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eHacking is complex, and there is no single way in. Why not start at the beginning with \u003cem\u003eLinux Basics for Hackers\u003c/em\u003e?\u003c/p\u003e\n\u003cp\u003eCovers Kali Linux and Python 3\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/linuxbasicsforhackers.png", "title": null, "resolved_paths": {}, "image_text": "Linux Basics for Hackers", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/linuxbasicsforhackers_slideout.jpg", "developers": [{"developer-name": "OccupyTheWeb"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/0a1bee349b578417aef01104b02940bf95c72133.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d60fe685a1bf62f0a50f9739b1c6f0ea6", "featured_image": "https://hb.imgix.net/be932dbc5e0c8e5db2d37a0ad9f888a2668454e6.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d17356df64246d7fc53f78235da2c38c2", "preview_image_bonus": "https://hb.imgix.net/0a1bee349b578417aef01104b02940bf95c72133.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003dde88dbea86eba732032ca6563f1c6eed", "front_page_art_imgix_retina": "https://hb.imgix.net/b09ca6df7e5adddb331990122fb08cd3382598b7.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d8871edcb1045324bafee929f39ad2e35", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/be932dbc5e0c8e5db2d37a0ad9f888a2668454e6.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d971467da1544214928fad9b95e0ff53d", "preview_image": "https://hb.imgix.net/0a1bee349b578417aef01104b02940bf95c72133.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d4a775b3d9597533bbffc901cb558a6be", "front_page_art_imgix": "https://hb.imgix.net/be932dbc5e0c8e5db2d37a0ad9f888a2668454e6.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d17356df64246d7fc53f78235da2c38c2", "front_page_art_charity_imgix": "https://hb.imgix.net/be932dbc5e0c8e5db2d37a0ad9f888a2668454e6.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003df42a5bc1d31d7db81f4528eb43a05f85"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Linux Basics for Hackers", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "cyberjutsu": {"machine_name": "cyberjutsu", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "80.9 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/cyberjutsu_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/cyberjutsu_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d4b7857f1d2a0c82fb8901229a48bf0dc9f74673aea8e4190dceedfdc5a3b6c9f"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/cyberjutsu"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 10.0}, "subtitle_html": null, "description_text": "\u003cp\u003e\u003cem\u003eCyberjutsu\u003c/em\u003e is a practical cybersecurity field guide based on the techniques, tactics, and procedures of the ancient ninja. Cyber warfare specialist Ben McCarty\u2019s analysis of declassified Japanese scrolls will show how you can apply ninja methods to combat today\u2019s security challenges like information warfare, deceptive infiltration, espionage, and zero-day attacks.\u003c/p\u003e\n\u003cp\u003eLearn how to use key ninja techniques to find gaps in a target\u2019s defense, strike where the enemy is negligent, master the art of invisibility, and more. McCarty outlines specific, in-depth security mitigations such as fending off social engineering attacks by being present with \u201cthe correct mind,\u201d mapping your network like an adversary to prevent breaches, and leveraging ninja-like traps to protect your systems.\u003c/p\u003e\n\u003cp\u003eYou\u2019ll also learn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eUse threat modeling to reveal network vulnerabilities\u003c/li\u003e\n\u003cli\u003eIdentify insider threats in your organization\u003c/li\u003e\n\u003cli\u003eDeploy countermeasures like network sensors, time-based controls, air gaps, and authentication protocols\u003c/li\u003e\n\u003cli\u003eGuard against malware command-and-control servers\u003c/li\u003e\n\u003cli\u003eDetect attackers, prevent supply-chain attacks, and counter zero-day exploits\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003e\u003cem\u003eCyberjutsu\u003c/em\u003e is the playbook that every modern cybersecurity professional needs to channel their inner ninja. Turn to the old ways to combat the latest cyber threats and stay one step ahead of your adversaries.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/cyberjutsu.png", "title": null, "resolved_paths": {}, "image_text": "Cyberjutsu", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/cyberjutsu_slideout.jpg", "developers": [{"developer-name": "Ben McCarty"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/b9508e7af329cc9f9af9fa9e32c90546d898f4a6.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003de32a5b88eed140c2f561517fa3603035", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/b9508e7af329cc9f9af9fa9e32c90546d898f4a6.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d365c908de38c035a3b20284296ef3b6e", "front_page_art_imgix_retina": "https://hb.imgix.net/fb00d306130c6f1de407a18c14ddcdc34ff9ae73.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d687f3fcdf573c44d6f3f7b17c0e2a8ae", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/fb00d306130c6f1de407a18c14ddcdc34ff9ae73.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d766ac1ea15fdefbdf7ca32ccf47f7b76", "preview_image": "https://hb.imgix.net/b9508e7af329cc9f9af9fa9e32c90546d898f4a6.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d356843ab2598ff990212b2e4be1f67ff", "front_page_art_imgix": "https://hb.imgix.net/fb00d306130c6f1de407a18c14ddcdc34ff9ae73.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003dd5e1e09b062490e61708045e899a7f15", "front_page_art_charity_imgix": "https://hb.imgix.net/fb00d306130c6f1de407a18c14ddcdc34ff9ae73.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d597730202c5d64c964505b858c7cf720"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Cyberjutsu", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "evasivemalware": {"machine_name": "evasivemalware", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "82.3 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/evasivemalware_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/evasivemalware_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d5ca64fbe394de8e0abaeaff1b655def9f98dcd192d1562942901cbafed113ee0"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/evasive-malware"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 36.0}, "subtitle_html": null, "description_text": "\u003cp\u003eWe\u2019re all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. \u003cem\u003eEvasive Malware\u003c/em\u003e will introduce you to the evasion techniques used by today\u2019s malicious software and show you how to defeat them.\u003c/p\u003e\n\u003cp\u003eFollowing a crash course on using static and dynamic code analysis to uncover malware\u2019s true intentions, you\u2019ll learn how malware weaponizes context awareness to detect and skirt virtual machines and sandboxes, plus the various tricks it uses to thwart analysis tools. You\u2019ll explore the world of anti-reversing, from anti-disassembly methods and debugging interference to covert code execution and misdirection tactics. You\u2019ll also delve into defense evasion, from process injection and rootkits to fileless malware. Finally, you\u2019ll dissect encoding, encryption, and the complexities of malware obfuscators and packers to uncover the evil within.\u003c/p\u003e\n\u003cp\u003eYou\u2019ll learn how malware:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eAbuses legitimate components of Windows, like the Windows API and LOLBins, to run undetected\u003c/li\u003e\n\u003cli\u003eUses environmental quirks and context awareness, like CPU timing and hypervisor enumeration, to detect attempts at analysis\u003c/li\u003e\n\u003cli\u003eBypasses network and endpoint defenses using passive circumvention techniques, like obfuscation and mutation, and active techniques, like unhooking and tampering\u003c/li\u003e\n\u003cli\u003eDetects debuggers and circumvents dynamic and static code analysis\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eYou\u2019ll also find tips for building a malware analysis lab and tuning it to better counter anti-analysis techniques in malware. Whether you\u2019re a frontline defender, a forensic analyst, a detection engineer, or a researcher, \u003cem\u003eEvasive Malware\u003c/em\u003e will arm you with the knowledge and skills you need to outmaneuver the stealthiest of today\u2019s cyber adversaries.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/evasivemalware.png", "title": null, "resolved_paths": {}, "image_text": "Evasive Malware", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/evasivemalware_slideout.jpg", "developers": [{"developer-name": "Kyle Cucci"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/f82ca14751cfdee3a6919ec661f88fbb4b7200cf.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d2fd3bcfd35790bf080578a78dbf98459", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/f82ca14751cfdee3a6919ec661f88fbb4b7200cf.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003dfbe874c0473b94cc14235dd17208869b", "front_page_art_imgix_retina": "https://hb.imgix.net/dcf1764e027c6b44b1a6eafc8490e68d37801c7a.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d06e11a0a9044614934319127f6dd45c6", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/dcf1764e027c6b44b1a6eafc8490e68d37801c7a.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d35e7b75764dd543589c98c19634b83bf", "preview_image": "https://hb.imgix.net/f82ca14751cfdee3a6919ec661f88fbb4b7200cf.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d72d170d26d1464c53b79aef6929b5082", "front_page_art_imgix": "https://hb.imgix.net/dcf1764e027c6b44b1a6eafc8490e68d37801c7a.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003ded13274f47487592cbb3ef283de3a964", "front_page_art_charity_imgix": "https://hb.imgix.net/dcf1764e027c6b44b1a6eafc8490e68d37801c7a.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dee1103be1f5ff7d4e9be574a7e4311db"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Evasive Malware", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "ethicalhacking": {"machine_name": "ethicalhacking", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "1.2 MB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/ethicalhacking_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/ethicalhacking_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003dd808934b106a0c0dd5f5445d24854534ceaca764c70c09f6ec5bfaa0568e389f"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/ethical-hacking"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 18.0}, "subtitle_html": null, "description_text": "\u003cp\u003e\u003cem\u003eEthical Hacking\u003c/em\u003e is a crash course in modern hacking techniques. It\u2019s already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you\u2019ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst.\u003c/p\u003e\n\u003cp\u003eYou\u2019ll begin with the basics: capturing a victim\u2019s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you\u2019ll deploy reverse shells that let you remotely run commands on a victim\u2019s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you\u2019ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you\u2019ll use to traverse a private network.\u003c/p\u003e\n\u003cp\u003eYou\u2019ll work with a wide range of professional penetration testing tools\u2014and learn to write your own tools in Python\u2014as you practice tasks like:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eDeploying the Metasploit framework\u2019s reverse shells and embedding them in innocent-seeming files\u003c/li\u003e\n\u003cli\u003eCapturing passwords in a corporate Windows network using Mimikatz\u003c/li\u003e\n\u003cli\u003eScanning (almost) every device on the internet to find potential victims\u003c/li\u003e\n\u003cli\u003eInstalling Linux rootkits that modify a victim\u2019s operating system\u003c/li\u003e\n\u003cli\u003ePerforming advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eAlong the way, you\u2019ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more.\u003c/p\u003e\n\u003cp\u003eDeveloped with feedback from cybersecurity students, \u003cem\u003eEthical Hacking\u003c/em\u003e addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you\u2019ll be able to think like an ethical hacker: someone who can carefully analyze systems and creatively gain access to them.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/ethicalhacking.png", "title": null, "resolved_paths": {}, "image_text": "Ethical Hacking", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/ethicalhacking_slideout.jpg", "developers": [{"developer-name": "Daniel G. Graham"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/7998447cf62052bcd3c6a143e90377c13f561411.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d03bb49bbdf2a3ff6c3a80c071b8b65e4", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/7998447cf62052bcd3c6a143e90377c13f561411.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003dd78d74b98ae21949a763230d9709043c", "front_page_art_imgix_retina": "https://hb.imgix.net/1196184f78a285353f0343e2617934d31865cc62.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d750f3d1b0773b6a764890d074befc7d8", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/1196184f78a285353f0343e2617934d31865cc62.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d7666d51f5dbaea442487fd6e954d17af", "preview_image": "https://hb.imgix.net/7998447cf62052bcd3c6a143e90377c13f561411.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d8ae785d80753ca5509f7f7ff4a5038de", "front_page_art_imgix": "https://hb.imgix.net/1196184f78a285353f0343e2617934d31865cc62.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d542b1258daa763d1ef4b25869426128c", "front_page_art_charity_imgix": "https://hb.imgix.net/1196184f78a285353f0343e2617934d31865cc62.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d1f236730e896b51f9353acd09b875a16"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Ethical Hacking", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "practicaliothacking": {"machine_name": "practicaliothacking", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "141.4 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/practicaliothacking_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/practicaliothacking_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d2d9f3964c737f37e3798d0ee3376032d5792313f0a9bc8e8853e860a03e77ebe"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/practical-iot-hacking"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 18.0}, "subtitle_html": null, "description_text": "\u003cp\u003eDrawing from the real-life exploits of five highly regarded IoT security researchers, \u003cem\u003ePractical IoT Hacking\u003c/em\u003e teaches you how to test IoT systems, devices, and protocols to mitigate risk.\u003c/p\u003e\n\u003cp\u003eThe book begins by walking you through common threats and a threat modeling framework. You\u2019ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you\u2019ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks.\u003c/p\u003e\n\u003cp\u003eYou\u2019ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems.\u003c/p\u003e\n\u003cp\u003eYou\u2019ll also learn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eWrite a DICOM service scanner as an NSE module\u003c/li\u003e\n\u003cli\u003eHack a microcontroller through the UART and SWD interfaces\u003c/li\u003e\n\u003cli\u003eReverse engineer firmware and analyze mobile companion apps\u003c/li\u003e\n\u003cli\u003eDevelop an NFC fuzzer using Proxmark3\u003c/li\u003e\n\u003cli\u003eHack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eThe tools and devices you\u2019ll use are affordable and readily available, so you can easily practice what you learn. You can also download this book\u2019s code examples at \u003ca href\u003d\"https://github.com/practical-iot-hacking\"\u003ehttps://github.com/practical-iot-hacking\u003c/a\u003e.\u003c/p\u003e\n\u003cp\u003eWhether you\u2019re a security researcher, IT team member, or hacking hobbyist, you\u2019ll find \u003cem\u003ePractical IoT Hacking\u003c/em\u003e indispensable in your efforts to \u003cem\u003ehack all the things\u003c/em\u003e.\u003c/p\u003e\n\u003cp\u003eREQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/practicaliothacking.png", "title": null, "resolved_paths": {}, "image_text": "Practical IoT Hacking", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/practicaliothacking_slideout.jpg", "developers": [{"developer-name": "Fotios Chantzis"}, {"developer-name": "Ioannis Stais"}, {"developer-name": "Paulino Calderon"}, {"developer-name": "Evangelos Deirmentzoglou"}, {"developer-name": "Beau Woods"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/98ae1f7b7f3aed6d9188fe70914151749b67fcc9.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003db017eade810f95c41cafb7c4ab5e3bbb", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/98ae1f7b7f3aed6d9188fe70914151749b67fcc9.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003db1f48b76bf5f0081e8745327f1372d1a", "front_page_art_imgix_retina": "https://hb.imgix.net/2ec5b3a7b63c1e8956f7442b5cc8b68f68cbe2c6.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003dd4c57cdcdc3da7e62b91d0e278237062", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/2ec5b3a7b63c1e8956f7442b5cc8b68f68cbe2c6.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dca7182165097ec05ba614c1f0d12e11a", "preview_image": "https://hb.imgix.net/98ae1f7b7f3aed6d9188fe70914151749b67fcc9.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d91b9537ff7fa7fecd69772e21925029b", "front_page_art_imgix": "https://hb.imgix.net/2ec5b3a7b63c1e8956f7442b5cc8b68f68cbe2c6.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d4c63e9ec7e51fddea258c651199be679", "front_page_art_charity_imgix": "https://hb.imgix.net/2ec5b3a7b63c1e8956f7442b5cc8b68f68cbe2c6.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dac6e529f70d1e75a00b52374995bc5c7"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Practical IoT Hacking", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "penetrationtesting": {"machine_name": "penetrationtesting", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "605.1 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/penetrationtesting_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/penetrationtesting_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003dcc5d86680e17447c9a1c83778e0c911058725d88c88ed20cc61683849f5e3755"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://www.nostarch.com/pentesting"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 10.0}, "subtitle_html": null, "description_text": "\u003cp\u003ePenetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.\u003c/p\u003e\n\u003cp\u003eIn \u003cem\u003ePenetration Testing\u003c/em\u003e, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine\u2013based lab that includes Kali Linux and vulnerable operating systems, you\u2019ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you\u2019ll experience the key stages of an actual assessment\u2014including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.\u003c/p\u003e\n\u003cp\u003eLearn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eCrack passwords and wireless network keys with brute-forcing and wordlists\u003c/li\u003e\n\u003cli\u003eTest web applications for vulnerabilities\u003c/li\u003e\n\u003cli\u003eUse the Metasploit Framework to launch exploits and write your own Metasploit modules\u003c/li\u003e\n\u003cli\u003eAutomate social-engineering attacks\u003c/li\u003e\n\u003cli\u003eBypass antivirus software\u003c/li\u003e\n\u003cli\u003eTurn access to one machine into total control of the enterprise in the post exploitation phase\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eYou\u2019ll even explore writing your own exploits. Then it\u2019s on to mobile hacking\u2014Weidman\u2019s particular area of research\u2014with her tool, the Smartphone Pentest Framework.\u003c/p\u003e\n\u003cp\u003eWith its collection of hands-on lessons that cover key tools and strategies, \u003cem\u003ePenetration Testing\u003c/em\u003e is the introduction that every aspiring hacker needs.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/penetrationtesting.png", "title": null, "resolved_paths": {}, "image_text": "Penetration Testing", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/penetrationtesting_slideout.jpg", "developers": [{"developer-name": "Georgia Weidman"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/d8c2026e846e49568bb5d9eefb607db7ecc50527.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d0bf5e0768bc99bb3eb3985dc959c0a00", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/d8c2026e846e49568bb5d9eefb607db7ecc50527.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003de00906870a14422bdca043037ac23cb7", "front_page_art_imgix_retina": "https://hb.imgix.net/6eb1abea27eb6efb4e2de0035a18f9692ab87874.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d5619fe98e2397ef1dbcf733873842684", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/6eb1abea27eb6efb4e2de0035a18f9692ab87874.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d8275e95c2eaf7741c56730d491a3b811", "preview_image": "https://hb.imgix.net/d8c2026e846e49568bb5d9eefb607db7ecc50527.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003dc0396f9a71386ab37e3af6d5e04f8d66", "front_page_art_imgix": "https://hb.imgix.net/6eb1abea27eb6efb4e2de0035a18f9692ab87874.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d03112ca4df3924ac4205253cec976610", "front_page_art_charity_imgix": "https://hb.imgix.net/6eb1abea27eb6efb4e2de0035a18f9692ab87874.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d24005017daa1735e51e71db3f22b6915"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Penetration Testing", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "malwaredatascience": {"machine_name": "malwaredatascience", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "244.3 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/malwaredatascience_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/malwaredatascience_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d939bf81b47861ac6526ac5bcb6bb8599a84b0307c7a7245a1170e2f46db78c49"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/malwaredatascience"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 10.0}, "subtitle_html": null, "description_text": "\u003cp\u003eSecurity has become a \"big data\" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you\u0027ll need to know how to think like a data scientist.\u003c/p\u003e\n\u003cp\u003eIn \u003ci\u003eMalware Data Science\u003c/i\u003e, security data scientist Joshua Saxe introduces machine learning, statistics, social network analysis, and data visualization, and shows you how to apply these methods to malware detection and analysis.\u003c/p\u003e\n\u003cp\u003eYou\u0027ll learn how to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eAnalyze malware using static analysis\u003c/li\u003e\n\u003cli\u003eObserve malware behavior using dynamic analysis\u003c/li\u003e\n\u003cli\u003eIdentify adversary groups through shared code analysis\u003c/li\u003e\n\u003cli\u003eCatch 0-day vulnerabilities by building your own machine learning detector\u003c/li\u003e\n\u003cli\u003eMeasure malware detector accuracy\u003c/li\u003e\n\u003cli\u003eIdentify malware campaigns, trends, and relationships through data visualization\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eWhether you\u0027re a malware analyst looking to add skills to your existing arsenal, or a data scientist interested in attack detection and threat intelligence, \u003ci\u003eMalware Data Science\u003c/i\u003e will help you stay ahead of the curve.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/malwaredatascience.png", "title": null, "resolved_paths": {}, "image_text": "Malware Data Science", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/malwaredatascience_slideout.jpg", "developers": [{"developer-name": "Joshua Saxe"}, {"developer-name": "Hillary Sanders"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/c7b5050cbdc2906cace034b04f11c5eac5f16418.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003dbd310a74966d5f2f48925b07a10af42b", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/c7b5050cbdc2906cace034b04f11c5eac5f16418.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d84a2c6bd7eda207a96e6c25a95e865fb", "front_page_art_imgix_retina": "https://hb.imgix.net/b16bf44ab5e28320fda0b9ef48d16b342ba0bb66.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003d71c5e4e1da03b7cbef960550f5333c30", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/b16bf44ab5e28320fda0b9ef48d16b342ba0bb66.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dabc7747e01232fdbbf7fbc0275df795b", "preview_image": "https://hb.imgix.net/c7b5050cbdc2906cace034b04f11c5eac5f16418.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d55d76fb5d23b362acc44711150315386", "front_page_art_imgix": "https://hb.imgix.net/b16bf44ab5e28320fda0b9ef48d16b342ba0bb66.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d271bee63ba649454e7f8bd1c58723833", "front_page_art_charity_imgix": "https://hb.imgix.net/b16bf44ab5e28320fda0b9ef48d16b342ba0bb66.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d699ce142a888ef7e0b92289feebb6b25"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Malware Data Science", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}, "eff": {"machine_name": "eff", "youtube_link": null, "item_content_type": null, "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": null, "featured_image": null, "ppgf_info": {"category": "Society and Communities", "city": "San Francisco", "description": "The Electronic Frontier Foundation (EFF) is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy and free expression online through a strategic combination of impact litigation, policy analysis, activism, and technology development. We empower tinkerers, creators, coders, and consumers to reclaim freedom as our use of technology grows.", "url": "http://www.eff.org", "country": "US", "charity_id": "8443", "state": "CA", "keywords": "privacy,innovation,free speech,fair use,EFF,surveillance,Internet", "human_name": "Electronic Frontier Foundation", "logo_url": "https://hbproxy.imgix.net/https%3A%2F%2Fpics.paypal.com%2F00%2Fs%2FNzBlYTJlNGEtZTNmOC00ZDIzLWE1NDItMDRlMjFmY2I1YmMx%2Ffile.PNG?auto\u003dcompress\u0026auto\u003dformat\u0026bg\u003dfff\u0026fit\u003dfill\u0026h\u003d350\u0026w\u003d510\u0026s\u003d65f455bde92da2915333825656033398"}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": null, "publishers": [], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "subtitle_html": null, "description_text": "\u003cp\u003e\u003cem\u003eDonations to support\u0026nbsp;Electronic Frontier Foundation are made to \u0026nbsp;\u003ca href\u003d\"https://support.humblebundle.com/hc/en-us/articles/205183597\" target\u003d\"_blank\"\u003ePayPal Giving Fund\u003c/a\u003e, subject to its policies.\u003c/em\u003e\u003cbr /\u003e\u003cbr /\u003eThe Electronic Frontier Foundation is a non-profit that defends your rights in the digital world. This world-class team of tech-savvy attorneys, activists, and technologists fight in courtrooms and Congress to protect privacy and free expression online and throughout the world.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/charities/CharityLogos/eff-logo-lockup-red.png", "title": null, "resolved_paths": {}, "image_text": "Electronic Frontier Foundation", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/eff_slideout.jpg", "developers": [{"developer-name": "www.eff.org", "developer-url": "https://www.eff.org/"}], "is_clickable": true, "platforms_and_oses": {}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/9c85e396af5f02edbbe154fbe36bc61c00f24ca1.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d2b73841ec3685d286d91c9f8005fa438", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/9c85e396af5f02edbbe154fbe36bc61c00f24ca1.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d5d49b15b9eb47e5e8d429068cfde9a11", "front_page_art_imgix_retina": "https://hb.imgix.net/639f5c3c44c6df3629129d3219f2e4b38628d036.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d240\u0026w\u003d180\u0026s\u003d71838dfc86f3d1b657fca0f1f4f16fbd", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/639f5c3c44c6df3629129d3219f2e4b38628d036.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003de2219e179ef50d09bb655ae2ba473cd8", "preview_image": "https://hb.imgix.net/9c85e396af5f02edbbe154fbe36bc61c00f24ca1.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d1e033c2207232140e2857e42b1992dc5", "front_page_art_imgix": "https://hb.imgix.net/639f5c3c44c6df3629129d3219f2e4b38628d036.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d240\u0026w\u003d180\u0026s\u003df2ef8096b8732ac2391e04652f027a15", "front_page_art_charity_imgix": "https://hb.imgix.net/639f5c3c44c6df3629129d3219f2e4b38628d036.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d5a33868687e91d90cdf51e129feb8977"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Electronic Frontier Foundation", "is_mystery_box": null, "payee_secondary_id": "8443", "wallet_credit": {}}, "foundationsofinformationsecurity": {"machine_name": "foundationsofinformationsecurity", "youtube_link": null, "item_content_type": "ebook", "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": {"platform_icons": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "human_names": {"hb-file-pdf-o": "PDF", "hb-file-epub": "EPUB", "hb-drmfree": "DRM-free download", "hb-file-text-o": "MOBI"}, "delivery_to_platform": {"hb-drmfree": {"available": ["hb-file-pdf-o", "hb-file-text-o", "hb-file-epub"], "unavailable": []}}, "preamble": {"available": "Redeem for", "unavailable": "not available", "hb-drmfree": "Download for"}, "delivery_icons": ["hb-drmfree"], "platform_to_delivery": {"hb-file-pdf-o": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-epub": {"available": ["hb-drmfree"], "unavailable": []}, "hb-file-text-o": {"available": ["hb-drmfree"], "unavailable": []}}}, "featured_image": null, "ppgf_info": {}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": {"preview_file_size": "630.2 KB", "preview_prefix": null, "preview_file_type": "PDF", "unsigned_url": "ops/pdfs/foundationsofinformationsecurity_preview.pdf", "preview_icon": "pdf", "preview_file_link": "https://cdn.humble.com/humblebundle/ops/pdfs/foundationsofinformationsecurity_preview.pdf?t\u003dst\u003d1733183389~exp\u003d1733269789~hmac\u003d621958a61ccb8395419b7816581d8c9da26cd8e18211ba3b84ae11ca528b4a6b"}, "publishers": [{"publisher-name": "No Starch Press", "publisher-url": "https://nostarch.com/foundationsinfosec"}], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "min_price|money": {"currency": "USD", "amount": 18.0}, "subtitle_html": null, "description_text": "\u003cp\u003eA high-level survey of the information security field by best-selling author Jason Andress. The book covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.\u003c/p\u003e\n\u003cp\u003eUsing real-world security breaches as examples, \u003ci\u003eFoundations of Information Security\u003c/i\u003e explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications.\u003c/p\u003e\n\u003cp\u003eYou\u0027ll also learn the basics of topics like:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eMultifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process\u003c/li\u003e\n\u003cli\u003eThe principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates\u003c/li\u003e\n\u003cli\u003eThe laws and regulations that protect systems and data\u003c/li\u003e\n\u003cli\u003eAnti-malware tools, firewalls, and intrusion detection systems\u003c/li\u003e\n\u003cli\u003eVulnerabilities such as buffer overflows and race conditions\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eA valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, \u003ci\u003eFoundations of Information Security\u003c/i\u003e is a great place to start your journey into the dynamic and rewarding field of information security.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/displayitems/master_images/foundationsofinformationsecurity.png", "title": null, "resolved_paths": {}, "image_text": "Foundations of Information Security", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/foundationsofinformationsecurity_slideout.jpg", "developers": [{"developer-name": "Jason Andress"}], "is_clickable": true, "platforms_and_oses": {"ebook": {"download": ["pdf", "epub", "mobi"]}}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/d8b8ba0033bce2e56ea6f37797269df2e919f760.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d8e83231eb5ef3cf98ff70d7d3485028b", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/d8b8ba0033bce2e56ea6f37797269df2e919f760.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003df13ecfe01d6608ce2faeb2c430fd9393", "front_page_art_imgix_retina": "https://hb.imgix.net/467305dd124d4d1cb21d0638210d33f2c6028e01.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d218\u0026w\u003d150\u0026s\u003dd8a475088afd1bbd5020dfe14af9dbf8", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/467305dd124d4d1cb21d0638210d33f2c6028e01.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003da16c7d14f647dc99d8b9e83042fae0d2", "preview_image": "https://hb.imgix.net/d8b8ba0033bce2e56ea6f37797269df2e919f760.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d7d0b5a551a16faca130d20726625645b", "front_page_art_imgix": "https://hb.imgix.net/467305dd124d4d1cb21d0638210d33f2c6028e01.png?auto\u003dcompress,format\u0026w\u003d180\u0026s\u003d0fc140c9cb28d7fda854db1fb29e9b66", "front_page_art_charity_imgix": "https://hb.imgix.net/467305dd124d4d1cb21d0638210d33f2c6028e01.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003daebafb6b3a9faad15f48634486772a6d"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Foundations of Information Security", "is_mystery_box": null, "payee_secondary_id": "", "wallet_credit": {}}}, "splits": [{"partner_split|decimal": 0.5, "name": "No Starch Press", "extra_charity_partner_split|decimal": 0.425, "extra_charity_split|decimal": 0.475, "sibling_split|decimal": 0.55, "class": "nostarchpress"}, {"partner_split|decimal": 0.05, "name": "Charities", "extra_charity_partner_split|decimal": 0.15, "extra_charity_split|decimal": 0.15, "sibling_split|decimal": 0.05, "class": "charity", "subsplit": [{"class": "paypalgivingfund", "secondary_id": "8443", "sibling_split|decimal": 0.5, "name": "Electronic Frontier Foundation"}, {"class": "paypalgivingfund", "secondary_id": "2330496", "sibling_split|decimal": 0.5, "name": "ACLU"}]}, {"partner_split|decimal": 0.3, "name": "Humble Tip", "extra_charity_partner_split|decimal": 0.3, "extra_charity_split|decimal": 0.375, "minimum_split|decimal": 0.3, "sibling_split|decimal": 0.4, "class": "humblebundle"}], "upsell_data": {"monthly_v2_premium": {"category": "subscriptionplan", "image_url": "https://hb.imgix.net/c6a6655d3145d16bc7c5f3546b379d727c723541.png?auto\u003dcompress,format\u0026fit\u003dcrop\u0026h\u003d353\u0026w\u003d616\u0026s\u003dc8ccfc1a50c618a9f6275e6d436a9d64", "machine_name": "monthly_v2_premium", "description": "", "discount_percentage|decimal": 5.0, "full_price|money": {"currency": "USD", "amount": 11.99}, "renewal_date|datetime": "2024-12-31T18:00:00", "subscription_content_product": "november_2024_choice", "active_content_end_time|datetime": "2024-12-03T18:00:00", "disallow_subscription_discount": null, "subscription_credits": 1, "human_name": "Month-to-Month Plan", "current_price|money": {"currency": "USD", "amount": 11.39}, "active_content_start_time|datetime": "2024-11-05T18:00:00"}}, "statistics_data": {"total_charity_raised|money": {"currency": "USD", "amount": 2946.0}, "num_purchases|decimal": 876.0}, "charity_data": {"charity_items": {"americancivillibertiesunion": {"machine_name": "americancivillibertiesunion", "youtube_link": "e0vcUTwgyfE", "item_content_type": null, "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": null, "featured_image": null, "ppgf_info": {"category": "Society and Communities", "city": "New York", "description": "For nearly 100 years, the American Civil Liberties Union (ACLU) has been our nation\u0027s guardian of liberty, working in courts, legislatures, and communities to defend and preserve the individual rights and liberties that the Constitution and the laws of the United States guarantee everyone in this country.", "url": "http://www.aclu.org", "country": "US", "charity_id": "2330496", "state": "NY", "keywords": "civil liberties, rights, Constitution, resistance", "human_name": "ACLU Foundation", "logo_url": "https://hbproxy.imgix.net/https%3A%2F%2Fpics.paypal.com%2F00%2Fs%2FYzJkNDBlZTktNjU5MC00MmI0LWJmODMtZjllOGQ2MDI3MWM1%2Ffile.PNG?auto\u003dcompress\u0026auto\u003dformat\u0026bg\u003dfff\u0026fit\u003dfill\u0026h\u003d350\u0026w\u003d510\u0026s\u003d018bfa1ac0aa2acc0b0edcc5c42312c7"}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": null, "publishers": [], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "subtitle_html": null, "description_text": "\u003cp\u003e\u003cem\u003eDonations to support the American Civil Liberties Union Foundation, Inc. (ACLU) are made to \u0026nbsp;\u003ca href\u003d\"https://support.humblebundle.com/hc/en-us/articles/205183597\" target\u003d\"_blank\"\u003ePayPal Giving Fund\u003c/a\u003e, subject to its policies.\u003c/em\u003e\u003c/p\u003e\n\u003cp\u003eFor nearly 100 years, the American Civil Liberties Union (ACLU) has been our nation\u0027s guardian of liberty, working in courts, legislatures, and communities to defend and preserve the individual rights and liberties that the Constitution and the laws of the United States guarantee everyone in this country. Whether it\u0027s achieving full equality for LGBT people, establishing new privacy protections for our digital age of widespread government surveillance, ending mass incarceration, or preserving the right to vote or the right to have an abortion, the ACLU takes up the toughest civil liberties cases and issues to defend all people from government abuse and overreach. With more than 2 million members, activists, and supporters, the ACLU is a nationwide organization that fights tirelessly in all 50 states, Puerto Rico, and Washington, D.C., to safeguard everyone\u0027s rights.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/charities/CharityLogos/aclu_logo_blue.png", "title": null, "resolved_paths": {}, "image_text": "American Civil Liberties Union (ACLU)", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/charities/CharityLogos/aclu_logo_blue.png", "developers": [{"developer-name": "www.aclu.org", "developer-url": " https://www.aclu.org"}], "is_clickable": true, "platforms_and_oses": {}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003da129d878c0a4ddb289f68c5118f5d65a", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d2cc00346038eaa82b432cf40921c488d", "front_page_art_imgix_retina": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d240\u0026w\u003d180\u0026s\u003d75a3cafae13ffcb4ffdaf397f7e2e05c", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d5246cdf59ce1a56fd7e4e4473303d7ea", "preview_image": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d8ff87400f93a9b122779f1676fa4cf08", "front_page_art_imgix": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d240\u0026w\u003d180\u0026s\u003d2e33ca04eac32d71e62fd8da9c5d8249", "front_page_art_charity_imgix": "https://hb.imgix.net/da55c2279d236d28afe84614ae62e2cdd4d634cb.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003dfd23b241352553378e6e79c347428e49"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "American Civil Liberties Union (ACLU)", "is_mystery_box": null, "payee_secondary_id": "2330496", "wallet_credit": {}}, "eff": {"machine_name": "eff", "youtube_link": null, "item_content_type": null, "soundtrack_listing": {"hide_listing": null, "tracks": []}, "user_ratings": {}, "limited_content": null, "availability_icons": null, "featured_image": null, "ppgf_info": {"category": "Society and Communities", "city": "San Francisco", "description": "The Electronic Frontier Foundation (EFF) is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy and free expression online through a strategic combination of impact litigation, policy analysis, activism, and technology development. We empower tinkerers, creators, coders, and consumers to reclaim freedom as our use of technology grows.", "url": "http://www.eff.org", "country": "US", "charity_id": "8443", "state": "CA", "keywords": "privacy,innovation,free speech,fair use,EFF,surveillance,Internet", "human_name": "Electronic Frontier Foundation", "logo_url": "https://hbproxy.imgix.net/https%3A%2F%2Fpics.paypal.com%2F00%2Fs%2FNzBlYTJlNGEtZTNmOC00ZDIzLWE1NDItMDRlMjFmY2I1YmMx%2Ffile.PNG?auto\u003dcompress\u0026auto\u003dformat\u0026bg\u003dfff\u0026fit\u003dfill\u0026h\u003d350\u0026w\u003d510\u0026s\u003d65f455bde92da2915333825656033398"}, "is_region_locked": false, "exclusive_countries": [], "display_user_ratings": null, "rating_details": "", "front_page_art_enabled": true, "rating_info": null, "callout": null, "subscribe_text": null, "all_ratings": {"rar-rating": null, "esrb-rating": null, "pegi-rating": null, "oflc-nz-rating": null, "oflc-au-rating": null, "usk-rating": null}, "cta_badge": null, "book_preview": null, "publishers": [], "show_rating": null, "side_box_art_text": null, "third_party_subscribe_text": null, "msrp_price": null, "subtitle_html": null, "description_text": "\u003cp\u003e\u003cem\u003eDonations to support\u0026nbsp;Electronic Frontier Foundation are made to \u0026nbsp;\u003ca href\u003d\"https://support.humblebundle.com/hc/en-us/articles/205183597\" target\u003d\"_blank\"\u003ePayPal Giving Fund\u003c/a\u003e, subject to its policies.\u003c/em\u003e\u003cbr /\u003e\u003cbr /\u003eThe Electronic Frontier Foundation is a non-profit that defends your rights in the digital world. This world-class team of tech-savvy attorneys, activists, and technologists fight in courtrooms and Congress to protect privacy and free expression online and throughout the world.\u003c/p\u003e", "user_ratings_css_class": "none", "wide_hero_art": false, "front_page_art": {"image_path": "images/charities/CharityLogos/eff-logo-lockup-red.png", "title": null, "resolved_paths": {}, "image_text": "Electronic Frontier Foundation", "link": null, "badge_info": {"badge_tooltip": null, "badge_number": null, "badge_type": null}}, "preview_image": "images/popups/eff_slideout.jpg", "developers": [{"developer-name": "www.eff.org", "developer-url": "https://www.eff.org/"}], "is_clickable": true, "platforms_and_oses": {}, "resolved_paths": {"preview_image_bonus_retina": "https://hb.imgix.net/9c85e396af5f02edbbe154fbe36bc61c00f24ca1.jpg?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d2b73841ec3685d286d91c9f8005fa438", "featured_image": null, "preview_image_bonus": "https://hb.imgix.net/9c85e396af5f02edbbe154fbe36bc61c00f24ca1.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d200\u0026w\u003d200\u0026s\u003d5d49b15b9eb47e5e8d429068cfde9a11", "front_page_art_imgix_retina": "https://hb.imgix.net/639f5c3c44c6df3629129d3219f2e4b38628d036.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d240\u0026w\u003d180\u0026s\u003d71838dfc86f3d1b657fca0f1f4f16fbd", "front_page_art_charity_imgix_retina": "https://hb.imgix.net/639f5c3c44c6df3629129d3219f2e4b38628d036.png?auto\u003dcompress,format\u0026dpr\u003d2\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003de2219e179ef50d09bb655ae2ba473cd8", "preview_image": "https://hb.imgix.net/9c85e396af5f02edbbe154fbe36bc61c00f24ca1.jpg?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d350\u0026w\u003d600\u0026s\u003d1e033c2207232140e2857e42b1992dc5", "front_page_art_imgix": "https://hb.imgix.net/639f5c3c44c6df3629129d3219f2e4b38628d036.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d240\u0026w\u003d180\u0026s\u003df2ef8096b8732ac2391e04652f027a15", "front_page_art_charity_imgix": "https://hb.imgix.net/639f5c3c44c6df3629129d3219f2e4b38628d036.png?auto\u003dcompress,format\u0026fit\u003dclip\u0026h\u003d80\u0026w\u003d170\u0026s\u003d5a33868687e91d90cdf51e129feb8977"}, "disallowed_countries": [], "front_page_url": null, "tall_hero_art": false, "human_name": "Electronic Frontier Foundation", "is_mystery_box": null, "payee_secondary_id": "8443", "wallet_credit": {}}}, "header": "", "charity_item_machine_names": ["eff", "americancivillibertiesunion"]}, "page_url": "books/hacking-2024-no-starch-books"}} </script> <script src="https://cdn.humblebundle.com/static/hashed/a7f95949642d62678a1689ba3385b0c49fbbff25.js"></script> <script src="https://cdn.humblebundle.com/static/hashed/0adda1e77739e3d68b60e723ad98cf24c38a338a.js"></script> <div id="site-modal"></div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10