CINXE.COM
Hacking & Computer Security | No Starch Press
<!DOCTYPE html> <html lang="en" dir="ltr" xmlns:og="https://ogp.me/ns#"> <head> <link rel="profile" href="https://www.w3.org/1999/xhtml/vocab" /> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <link rel="alternate" type="application/rss+xml" title="Hacking &amp; Computer Security" href="https://nostarch.com/taxonomy/term/5/all/feed" /> <link rel="shortcut icon" href="https://nostarch.com/sites/default/files/favicon.ico" type="image/vnd.microsoft.icon" /> <meta name="generator" content="Drupal 7 (http://drupal.org)" /> <link rel="canonical" href="https://nostarch.com/catalog/security" /> <link rel="shortlink" href="https://nostarch.com/taxonomy/term/5" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:site" content="@nostarch" /> <meta name="twitter:url" content="https://nostarch.com/catalog/security" /> <meta name="twitter:title" content="Taxonomy term" /> <title>Hacking & Computer Security | No Starch Press</title> <link type="text/css" rel="stylesheet" href="https://nostarch.com/sites/default/files/css/css_lQaZfjVpwP_oGNqdtWCSpJT1EMqXdMiU84ekLLxQnc4.css" media="all" /> <link type="text/css" rel="stylesheet" href="https://nostarch.com/sites/default/files/css/css_guSWpwqRBCVb2J7ivC8BaNuaPffCXmbkGB5xDBqKKu8.css" media="all" /> <link type="text/css" rel="stylesheet" href="https://nostarch.com/sites/default/files/css/css_Dw0rmhFX_owMmlf1HH5Y-_BnOHcMlkri1yMjYHD4ffs.css" media="all" /> <link type="text/css" rel="stylesheet" href="https://nostarch.com/sites/default/files/css/css_XJm3Wqia1GUjoI4j54duSLNZVR3Kxhbwy0s3UwuhhHg.css" media="all" /> <!-- HTML5 element support for IE6-8 --> <!--[if lt IE 9]> <script src="https://cdn.jsdelivr.net/html5shiv/3.7.3/html5shiv-printshiv.min.js"></script> <![endif]--> <script src="//ajax.googleapis.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script> <script>window.jQuery || document.write("<script src='/sites/all/modules/contrib/jquery_update/replace/jquery/2.2/jquery.min.js'>\x3C/script>")</script> <script src="https://nostarch.com/misc/jquery-extend-3.4.0.js?v=2.2.4"></script> <script src="https://nostarch.com/misc/jquery-html-prefilter-3.5.0-backport.js?v=2.2.4"></script> <script src="https://nostarch.com/misc/jquery.once.js?v=1.2"></script> <script src="https://nostarch.com/misc/drupal.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/jquery_update/js/jquery_browser.js?v=0.0.1"></script> <script src="https://nostarch.com/misc/form-single-submit.js?v=7.102"></script> <script src="https://nostarch.com/sites/all/modules/contrib/ubercart/uc_file/uc_file.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/libraries/colorbox/jquery.colorbox-min.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/colorbox/js/colorbox.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/colorbox/styles/plain/colorbox_style.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/colorbox/js/colorbox_load.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/colorbox/js/colorbox_inline.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/better_exposed_filters/better_exposed_filters.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/ubercart/uc_cart/uc_cart_block.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/ctools/js/auto-submit.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/modules/contrib/google_analytics/googleanalytics.js?snvsu3"></script> <script src="https://www.googletagmanager.com/gtag/js?id=UA-5027625-1"></script> <script>window.google_analytics_uacct = "UA-5027625-1";window.dataLayer = window.dataLayer || [];function gtag(){dataLayer.push(arguments)};gtag("js", new Date());gtag("set", "developer_id.dMDhkMT", true);gtag("config", "UA-5027625-1", {"groups":"default","anonymize_ip":true});gtag("config", "G-51XGZT9Y4H", {"groups":"default","anonymize_ip":true});</script> <script src="https://nostarch.com/sites/all/themes/nostarch/js/bootstrap.min.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/themes/nostarch/js/main.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/themes/nostarch/js/front_grid_height.js?snvsu3"></script> <script>jQuery.extend(Drupal.settings, {"basePath":"\/","pathPrefix":"","setHasJsCookie":0,"ajaxPageState":{"theme":"nostarch","theme_token":"HnNqwBMme8mDN__u4MelpZsDw4_Uras-VFle3HEQv54","js":{"sites\/all\/modules\/contrib\/addthis\/addthis.js":1,"sites\/all\/libraries\/shariff\/shariff.min.js":1,"sites\/all\/themes\/contrib\/bootstrap\/js\/bootstrap.js":1,"\/\/ajax.googleapis.com\/ajax\/libs\/jquery\/2.2.4\/jquery.min.js":1,"0":1,"misc\/jquery-extend-3.4.0.js":1,"misc\/jquery-html-prefilter-3.5.0-backport.js":1,"misc\/jquery.once.js":1,"misc\/drupal.js":1,"sites\/all\/modules\/contrib\/jquery_update\/js\/jquery_browser.js":1,"misc\/form-single-submit.js":1,"sites\/all\/modules\/contrib\/ubercart\/uc_file\/uc_file.js":1,"sites\/all\/libraries\/colorbox\/jquery.colorbox-min.js":1,"sites\/all\/modules\/contrib\/colorbox\/js\/colorbox.js":1,"sites\/all\/modules\/contrib\/colorbox\/styles\/plain\/colorbox_style.js":1,"sites\/all\/modules\/contrib\/colorbox\/js\/colorbox_load.js":1,"sites\/all\/modules\/contrib\/colorbox\/js\/colorbox_inline.js":1,"sites\/all\/modules\/contrib\/better_exposed_filters\/better_exposed_filters.js":1,"sites\/all\/modules\/contrib\/ubercart\/uc_cart\/uc_cart_block.js":1,"sites\/all\/modules\/contrib\/ctools\/js\/auto-submit.js":1,"sites\/all\/modules\/contrib\/google_analytics\/googleanalytics.js":1,"https:\/\/www.googletagmanager.com\/gtag\/js?id=UA-5027625-1":1,"1":1,"sites\/all\/themes\/nostarch\/js\/bootstrap.min.js":1,"sites\/all\/themes\/nostarch\/js\/main.js":1,"sites\/all\/themes\/nostarch\/js\/front_grid_height.js":1},"css":{"modules\/system\/system.base.css":1,"modules\/field\/theme\/field.css":1,"sites\/all\/modules\/contrib\/logintoboggan\/logintoboggan.css":1,"modules\/node\/node.css":1,"sites\/all\/modules\/contrib\/uc_fedex\/uc_fedex.css":1,"sites\/all\/modules\/contrib\/ubercart\/uc_file\/uc_file.css":1,"sites\/all\/modules\/contrib\/ubercart\/uc_order\/uc_order.css":1,"sites\/all\/modules\/contrib\/ubercart\/uc_product\/uc_product.css":1,"sites\/all\/modules\/contrib\/ubercart\/uc_store\/uc_store.css":1,"sites\/all\/modules\/contrib\/views\/css\/views.css":1,"sites\/all\/modules\/contrib\/ckeditor\/css\/ckeditor.css":1,"sites\/all\/modules\/contrib\/uc_discounts_alt\/uc_discounts\/uc_discounts.css":1,"sites\/all\/modules\/contrib\/colorbox\/styles\/plain\/colorbox_style.css":1,"sites\/all\/modules\/contrib\/ctools\/css\/ctools.css":1,"sites\/all\/modules\/contrib\/ubercart\/uc_cart\/uc_cart_block.css":1,"sites\/all\/libraries\/shariff\/shariff.complete.css":1,"sites\/all\/themes\/nostarch\/css\/en_styles.css":1,"sites\/all\/themes\/nostarch\/css\/custom.css":1,"sites\/all\/themes\/nostarch\/css\/bootstrap-3-vert-offset.css":1,"sites\/all\/themes\/nostarch\/css\/bootstrap-3-autoclear.css":1,"sites\/all\/themes\/nostarch\/css\/glyphicons.css":1}},"colorbox":{"opacity":"0.85","current":"{current} of {total}","previous":"\u00ab Prev","next":"Next \u00bb","close":"Close","maxWidth":"98%","maxHeight":"98%","fixed":true,"mobiledetect":true,"mobiledevicewidth":"480px","file_public_path":"\/sites\/default\/files","specificPagesDefaultValue":"admin*\nimagebrowser*\nimg_assist*\nimce*\nnode\/add\/*\nnode\/*\/edit\nprint\/*\nprintpdf\/*\nsystem\/ajax\nsystem\/ajax\/*"},"better_exposed_filters":{"datepicker":false,"slider":false,"settings":[],"autosubmit":false,"views":{"nostarch_taxonomy_term":{"displays":{"page":{"filters":[]}}},"topics":{"displays":{"block":{"filters":[]}}}}},"urlIsAjaxTrusted":{"\/catalog\/security":true},"googleanalytics":{"account":["UA-5027625-1","G-51XGZT9Y4H"],"trackOutbound":1,"trackMailto":1,"trackDownload":1,"trackDownloadExtensions":"7z|aac|arc|arj|asf|asx|avi|bin|csv|doc(x|m)?|dot(x|m)?|exe|flv|gif|gz|gzip|hqx|jar|jpe?g|js|mp(2|3|4|e?g)|mov(ie)?|msi|msp|pdf|phps|png|ppt(x|m)?|pot(x|m)?|pps(x|m)?|ppam|sld(x|m)?|thmx|qtm?|ra(m|r)?|sea|sit|tar|tgz|torrent|txt|wav|wma|wmv|wpd|xls(x|m|b)?|xlt(x|m)|xlam|xml|z|zip","trackColorbox":1},"bootstrap":{"anchorsFix":"0","anchorsSmoothScrolling":"0","formHasError":1,"popoverEnabled":1,"popoverOptions":{"animation":1,"html":0,"placement":"right","selector":"","trigger":"click","triggerAutoclose":1,"title":"","content":"","delay":0,"container":"body"},"tooltipEnabled":1,"tooltipOptions":{"animation":1,"html":0,"placement":"auto left","selector":"","trigger":"hover focus","delay":0,"container":"body"}}});</script> </head> <body class="html not-front not-logged-in two-sidebars page-taxonomy page-taxonomy-term page-taxonomy-term- page-taxonomy-term-5"> <div id="skip-link"> <a href="#main-content" class="element-invisible element-focusable">Skip to main content</a> </div> <header id="" class="header" role="banner" class="navbar navbar-default"> <div class="container"> <div class="row"> <nav role="navigation" class="navbar navbar-default visible-xs"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand text-uppercase" href="/"><img src="https://nostarch.com/sites/all/themes/nostarch/logo.png" alt="Home" class="img-responsive"/></a> </div> <div id="navbar" class="navbar-collapse collapse text-center"> <ul class="menu nav navbar-nav"><li class="first leaf"><a href="/catalog.htm" title="Explore our catalog">Catalog</a></li> <li class="leaf"><a href="https://nostarch.com/merchandise-0" title="Merchandise">Merchandise</a></li> <li class="leaf"><a href="/blog" title="The No Starch Press blog">Blog</a></li> <li class="leaf"><a href="https://nostarch.com/early-access-program" title="Media contact">Early Access</a></li> <li class="leaf"><a href="/writeforus" title="Submit a book proposal">Write for Us</a></li> <li class="leaf"><a href="/about" title="About No Starch Press">About Us</a></li> <li class="last leaf"><a href="/contactus" title="Contact Us">Contact Us</a></li> </ul> <div class="region region-navigation"> <section id="block-uc-cart-cart" class="block block-uc-cart clearfix"> <h2 class="block-title"><a href="/cart"><span class="cart-block-icon-empty" title="View your shopping cart."></span></a><span class="cart-block-title-bar" title="Show/hide shopping cart contents.">Shopping cart<span class="cart-block-arrow arrow-down"></span></span></h2> <p class="cart-block-items collapsed uc-cart-empty">There are no products in your shopping cart.</p><table class="cart-block-summary"><tbody><tr><td class="cart-block-summary-items"><span class="num-items">0</span> Items</td><td class="cart-block-summary-total"><label>Total:</label> <span class="uc-price">$0.00</span></td></tr></tbody></table> </section> <section id="block-search-api-page-site-search" class="block block-search-api-page clearfix"> <form action="/catalog/security" method="post" id="search-api-page-search-form-site-search" accept-charset="UTF-8"><div><div class="form-item form-item-keys-2 form-type-textfield form-group"><input placeholder="Search" class="form-control form-text" type="text" id="edit-keys-2" name="keys_2" value="" size="15" maxlength="128" /> <label class="control-label element-invisible" for="edit-keys-2">Enter your keywords</label> </div><input type="hidden" name="id" value="2" /> <button class="icon glyphicon glyphicon-search btn-primary form-control btn form-submit" type="submit" id="edit-submit-2" name="op" value=""></button> <input type="hidden" name="form_build_id" value="form-8NYvQazMhf12gcr4uQBBpidL_byGt3gSaYJ244sqsVE" /> <input type="hidden" name="form_id" value="search_api_page_search_form_site_search" /> </div></form> </section> </div> </div> </nav> <div class="navbar-header"> <div class="logo-wrapper col-sm-6 hidden-xs"> <a class="logo navbar-btn pull-left" href="/" title="Home"> <img src="https://nostarch.com/sites/all/themes/nostarch/logo.png" alt="Home" class="img-responsive"/> </a> </div> <div class="logo-wrapper col-sm-6 hidden-xs"> <div class="region region-navigation"> <div class="region region-navigation"> <section id="block-uc-cart-cart" class="block block-uc-cart clearfix"> <h2 class="block-title"><a href="/cart"><span class="cart-block-icon-empty" title="View your shopping cart."></span></a><span class="cart-block-title-bar" title="Show/hide shopping cart contents.">Shopping cart<span class="cart-block-arrow arrow-down"></span></span></h2> <p class="cart-block-items collapsed uc-cart-empty">There are no products in your shopping cart.</p><table class="cart-block-summary"><tbody><tr><td class="cart-block-summary-items"><span class="num-items">0</span> Items</td><td class="cart-block-summary-total"><label>Total:</label> <span class="uc-price">$0.00</span></td></tr></tbody></table> </section> <section id="block-search-api-page-site-search" class="block block-search-api-page clearfix"> <form action="/catalog/security" method="post" id="search-api-page-search-form-site-search" accept-charset="UTF-8"><div><div class="form-item form-item-keys-2 form-type-textfield form-group"><input placeholder="Search" class="form-control form-text" type="text" id="edit-keys-2" name="keys_2" value="" size="15" maxlength="128" /> <label class="control-label element-invisible" for="edit-keys-2">Enter your keywords</label> </div><input type="hidden" name="id" value="2" /> <button class="icon glyphicon glyphicon-search btn-primary form-control btn form-submit" type="submit" id="edit-submit-2" name="op" value=""></button> <input type="hidden" name="form_build_id" value="form-8NYvQazMhf12gcr4uQBBpidL_byGt3gSaYJ244sqsVE" /> <input type="hidden" name="form_id" value="search_api_page_search_form_site_search" /> </div></form> </section> </div> </div> </div> </div> </div> </div> <div class="container"> <div class="row"> <div class="navbar-collapse collapse"> <nav role="navigation"> <ul class="menu nav navbar-nav"><ul class="menu nav navbar-nav"><li class="first leaf"><a href="/catalog.htm" title="Explore our catalog">Catalog</a></li> <li class="leaf"><a href="https://nostarch.com/merchandise-0" title="Merchandise">Merchandise</a></li> <li class="leaf"><a href="/blog" title="The No Starch Press blog">Blog</a></li> <li class="leaf"><a href="https://nostarch.com/early-access-program" title="Media contact">Early Access</a></li> <li class="leaf"><a href="/writeforus" title="Submit a book proposal">Write for Us</a></li> <li class="leaf"><a href="/about" title="About No Starch Press">About Us</a></li> <li class="last leaf"><a href="/contactus" title="Contact Us">Contact Us</a></li> </ul></ul> </nav> </div> </div> </div> </header> <div class="main-container container"> <header role="banner" id="page-header"> <div class="region region-header"> <section id="block-block-156" class="block block-block clearfix"> <style> <!--/*--><![CDATA[/* ><!--*/ #banner { height: 120px; } #banner-graphic { width: 700px; } #banner-countdown { width: 240px; } #banner-cta { width: 200px; text-align: center; margin-top: 19px; } .banner-column { float: left; } .banner_image { max-width: 100% } @media (max-width: 1199px) { #banner-graphic { width: 500px; } } @media (max-width: 991px) { #banner { height: 160px; } #banner-graphic { float: none; width: 100%; } #banner-countdown { width: 50%; } #banner-cta { width: 50%; } } @media (max-width: 422px) { #banner { height: 200px; } #banner-countdown { float: none; width: 100%; } #banner-cta { float: none; width: 100%; margin-top: 10px; } } .time-left { margin: 1em; font-size: .75em; font-weight: bold; text-transform: uppercase; font-family: Arial, Helvetica, Verdana, sans-serif; text-align: center; } .countdown-container { display: flex; justify-content: center; } .countdown-timer { font-family: Arial, Helvetica, Verdana, sans-serif; color: white; } .countdown-timer .countdown-timer-counter { background-color: #222; display: inline-flex; flex-direction: column; justify-content: space-around; text-align: center; border-radius: 0.2em; width: 3em; line-height: 1.3; margin: 0 0.2em; padding: .6em 0.15em 0.75em; text-shadow: 1px 1px 1px rgba(0,0,0,0.85); } .countdown-timer .countdown-timer-counter .countdown-timer-number { font-weight: bold; font-size: 1em; } .countdown-timer .countdown-timer-counter .countdown-label { font-size: 0.75em; } .cta-parent { text-align: center; } .cta-button { font-family: Arial, Helvetica, Verdana, sans-serif; color: white; display: inline-block; font-weight: bold; text-decoration: none; background-color: #ec6352; border: 1px solid #ec6352; cursor: pointer; padding: 0.8em 1.25em 1em; margin: 0.75em auto 0; font-size: 1.15em; text-rendering: optimizeLegibility; border-radius: 0.3em; text-shadow: 1px 1px 1px rgba(0,0,0,0.65); text-transform: uppercase; transition-duration: 0.2s; transition-property: background-color, border, color, box-shadow, text-shadow; transition-timing-function: ease-in-out; white-space: nowrap; } .cta-button:hover { background-color: #ec6352; border: 1px solid #ec6352; } /*--><!]]>*/ </style><div id="banner"> <div class="banner-column" id="banner-graphic"> <p><a href="https://www.humblebundle.com/books/hacking-2024-no-starch-books" target="_blank"><img src="https://nostarch.com/images/banners/HumbleBundleDec2024.png" class="banner_image" /></a></p> </div> <div class="banner-column" id="banner-countdown"> <div class="time-left">time left</div> <div class="countdown-container"> <div class="countdown-timer"> <div class="countdown-timer-counter" data-unit="days"> <div class="countdown-timer-number"></div> <div class="countdown-label">days</div> </div> <div class="countdown-timer-counter" data-unit="hours"> <div class="countdown-timer-number"></div> <div class="countdown-label">hours</div> </div> <div class="countdown-timer-counter" data-unit="minutes"> <div class="countdown-timer-number"></div> <div class="countdown-label">min</div> </div> <div class="countdown-timer-counter" data-unit="seconds"> <div class="countdown-timer-number"></div> <div class="countdown-label">sec</div> </div> </div> </div> </div> <div class="banner-column" id="banner-cta"><a href="https://www.humblebundle.com/books/hacking-2024-no-starch-books" target="_blank"><span class="cta-button">Get The Bundle</span></a></div> </div> <script> <!--//--><![CDATA[// ><!-- // Time when event ends in UTC time var countdownTime = new Date(2024,11,23,19,0,0,0); // User's timezone offset var localOffset = countdownTime.getTimezoneOffset() * 60000; // Update the count down every 1 second var x = setInterval(function() { // Get todays UTC date and time var currentLocalTime = new Date(); var currentUtcTime = currentLocalTime.getTime() + localOffset; // Find the distance between now and the count down date var distance = countdownTime.getTime() - currentUtcTime; // Time calculations for days, hours, minutes and seconds var days = Math.floor(distance / (1000 * 60 * 60 * 24)); var hours = Math.floor((distance % (1000 * 60 * 60 * 24)) / (1000 * 60 * 60)); var minutes = Math.floor((distance % (1000 * 60 * 60)) / (1000 * 60)); var seconds = Math.floor((distance % (1000 * 60)) / 1000); document.querySelectorAll('[data-unit="days"]')[0].getElementsByClassName("countdown-timer-number")[0].innerHTML = days > 0 ? days : "0"; document.querySelectorAll('[data-unit="hours"]')[0].getElementsByClassName("countdown-timer-number")[0].innerHTML = hours > 0 ? hours : "0"; document.querySelectorAll('[data-unit="minutes"]')[0].getElementsByClassName("countdown-timer-number")[0].innerHTML = minutes > 0 ? minutes : "0"; document.querySelectorAll('[data-unit="seconds"]')[0].getElementsByClassName("countdown-timer-number")[0].innerHTML = seconds > 0 ? seconds : "0"; }, 1000); //--><!]]> </script> </section> <section id="block-block-155" class="block block-block clearfix"> <style> <!--/*--><![CDATA[/* ><!--*/ .image_full { max-width: 95%; height: 120px; } .image_mobile { max-width: 95%; height: 120px; } @media (max-width: 767px) { .image_full { display: none; } } @media (min-width: 768px) { .image_mobile { display: none; } } img { display: block; margin-left: auto; margin-right: auto; } /*--><!]]>*/ </style><div id="banner"> <img src="https://nostarch.com/images/banners/BFWebsiteBanner.png" class="image_full" /><br /> <img src="https://nostarch.com/images/banners/BFWebsiteBanner.png" class="image_mobile" /> </div> </section> </div> </header> <!-- /#page-header --> <div class="row"> <aside class="col-sm-3" role="complementary"> <div class="region region-sidebar-first well"> <section id="block-views-topics-block" class="block block-views clearfix"> <button class="btn btn-primary btn-block visible-xs vert-offset-top-2" data-toggle="collapse" data-target="#topics"><span class="glyphicon glyphicon-menu-down pull-left"></span> <span class="btn-text">Topics</span><span class="glyphicon glyphicon-menu-down pull-right"></span></button> <h2 class="block-title hidden-xs">Topics</h2> <div id="topics" class="view-content collapse dont-collapse animateCollapse"> <div class="view view-topics view-id-topics view-display-id-block view-dom-id-c903f32b39898c5ba900e34028214b25"> <div class="view-content"> <div class="item-list"> <ul> <li class="views-row views-row-1 views-row-odd views-row-first"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/art-photography-design">Art & Design</a></span> </div></li> <li class="views-row views-row-2 views-row-even"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/general-computing">General Computing</a></span> </div></li> <li class="views-row views-row-3 views-row-odd"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/security" class="active">Hacking & Computer Security</a></span> </div></li> <li class="views-row views-row-4 views-row-even"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/hardware-and-diy">Hardware / DIY</a></span> </div></li> <li class="views-row views-row-5 views-row-odd"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/kids">Kids</a></span> </div></li> <li class="views-row views-row-6 views-row-even"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/lego">LEGO®</a></span> </div></li> <li class="views-row views-row-7 views-row-odd"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/linux-bsd-unix">Linux & BSD</a></span> </div></li> <li class="views-row views-row-8 views-row-even"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/manga">Manga</a></span> </div></li> <li class="views-row views-row-9 views-row-odd"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/programming">Programming</a></span> </div></li> <li class="views-row views-row-10 views-row-even"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/python">Python</a></span> </div></li> <li class="views-row views-row-11 views-row-odd"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/rforall">R for All</a></span> </div></li> <li class="views-row views-row-12 views-row-even"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/science-math">Science & Math</a></span> </div></li> <li class="views-row views-row-13 views-row-odd"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/scratch">Scratch</a></span> </div></li> <li class="views-row views-row-14 views-row-even"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/system-administration">System Administration</a></span> </div></li> <li class="views-row views-row-15 views-row-odd views-row-last"> <div class="views-field views-field-name"> <span class="field-content"><a href="/catalog/early-access">Early Access</a></span> </div></li> </ul></div> </div> <div class="view-footer"> <style> <!--/*--><![CDATA[/* ><!--*/ .view-topics .item-list a {font-weight: bold;} .view-topics ul {padding-left: 20px;} /*--><!]]>*/ </style> </div> </div> </div> </section><section id="block-block-12" class="block block-block clearfix"> <div class="rounded_border_block"><span style="font-family:Arial,Helvetica,sans-serif"><strong><span style="font-size:12px"><span style="color:#c0392b"><a href="https://nostarch.com/about_ebooks.htm">FREE ebook edition with every print book purchased from nostarch.com!</a></span></span></strong></span></div> <p class="rtecenter"><span style="font-size:22px">+</span></p> <div class="rounded_border_block"><span style="font-family:Arial,Helvetica,sans-serif"><strong><span style="font-size:12px"><a href="https://nostarch.com/early-access-program"><span style="color:#c0392b">EARLY ACCESS lets you read full chapters months before a title's release date!</span></a></span></strong></span></div> </section> <section id="block-nostarch-custom-login-block" class="block block-nostarch-customclearfix"> <h2 class="block-title">User login</h2> <ul> <li><a href="/user">Log in</a></a></li> <li><a href="/user/register">Create account</a></a></li> </ul> </section> <section id="block-block-78" class="block block-block clearfix"> <script data-account="eeqOpWOUyZ" src="https://cdn.userway.org/widget.js"></script> </section> </div> </aside> <!-- /#sidebar-first --> <section class="col-sm-6" style=""> <a id="main-content"></a> <h1 class="page-header">Hacking & Computer Security</h1> <div class="region region-content"> <section id="block-system-main" class="block block-system clearfix"> <div class="view view-nostarch-taxonomy-term view-id-nostarch_taxonomy_term view-display-id-page auto-clear view-dom-id-44b2eccce824af5de178ace5c0c9f4fe"> <div class="view-content"> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-797" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/zero-day"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/ZeroDay_placeholder.png?itok=Cmg5Yqir" width="170" height="225" alt="From Day Zero to Zero Day placeholder cover" title="From Day Zero to Zero Day placeholder cover" /></a></div></div></div> <header> <h2><a href="/zero-day">From Day Zero to Zero Day</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Eugene Lim</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p> </p></div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-788" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/microcontroller-exploits"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/MicrocontrollerExploits_frontcover.png?itok=cmaNghjD" width="159" height="225" alt="Microcontroller Exploits cover" title="Microcontroller Exploits cover" /></a></div></div></div> <header> <h2><a href="/microcontroller-exploits">Microcontroller Exploits</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Travis Goodspeed</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="font-size:10pt"><span style="font-family:Roboto,sans-serif"><span style="color:#000000">A deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.</span></span></span></p> <p> </p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-785" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/serious-cryptography-2nd-edition"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/SeriousCryptography2e_frontcover.png?itok=2AFD540W" width="170" height="225" alt="Serious Cryptography, 2nd Edition placeholder cover" title="Serious Cryptography, 2nd Edition placeholder cover" /></a></div></div></div> <header> <h2><a href="/serious-cryptography-2nd-edition">Serious Cryptography, 2nd Edition</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jean-Philippe Aumasson</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><h4><span style="font-size:10pt"><span style="font-family:Arial,sans-serif"><span style="color:#000000"><span style="background-color:#ffffff"><em>Serious Cryptography</em></span></span></span></span><span style="font-size:10pt"><span style="font-family:Arial,sans-serif"><span style="color:#333333"><span style="background-color:#ffffff">, 2nd edition, is a practical guide to the past, present, and future of cryptographic systems and algorithms.</span></span></span></span></h4> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-784" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/cybersecurity-tabletop-exercises"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/CybersecutiryTabletopExercises_frontcover.png?itok=kpHzLSXv" width="170" height="225" alt="Cybersecurity Tabletop Exercises cover" title="Cybersecurity Tabletop Exercises cover" /></a></div></div></div> <header> <h2><a href="/cybersecurity-tabletop-exercises">Cybersecurity Tabletop Exercises</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Robert Lelewski and John Hollenberger</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-778" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/art-mac-malware-v2"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/ArtMacMalwarev2_frontcover.png?itok=yC6y7p3e" width="170" height="225" alt="The Art of Mac Malware, Volume 2 cover" title="The Art of Mac Malware, Volume 2 cover" /></a></div></div></div> <header> <h2><a href="/art-mac-malware-v2">The Art of Mac Malware, Volume 2</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Patrick Wardle</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-777" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/black-hat-bash"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718503748.png?itok=DmUiFJoV" width="168" height="225" alt="Black Hat Bash cover" title="Black Hat Bash cover" /></a></div></div></div> <header> <h2><a href="/black-hat-bash">Black Hat Bash</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Dolev Farhi, Nick Aleks</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-763" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/windows-security-internals"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718501980.png?itok=hxkTXbEh" width="172" height="225" alt="Windows Security Internals cover" title="Windows Security Internals cover" /></a></div></div></div> <header> <h2><a href="/windows-security-internals">Windows Security Internals</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">James Forshaw</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Power up your Windows security skills with expert guidance, in-depth technical insights, and lots of real-world vulnerability examples.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-768" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/engineering-secure-devices"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/EngineeringSecureDevices_frontcover.png?itok=-CSItHq5" width="170" height="225" alt="Engineering Secure Devices cover" title="Engineering Secure Devices cover" /></a></div></div></div> <header> <h2><a href="/engineering-secure-devices">Engineering Secure Devices</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Dominik Merli</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>An essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-746" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/evasive-malware"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718503267.png?itok=pAI7UG05" width="169" height="225" alt="Evasive Malware Cover" title="Evasive Malware Cover" /></a></div></div></div> <header> <h2><a href="/evasive-malware">Evasive Malware</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Kyle Cucci</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="font-size:10pt"><span style="font-family:Roboto,sans-serif"><span style="color:#000000">The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.</span></span></span></p> <p> </p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-743" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/androidmalwarehandbook"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718503304.png?itok=SyO2clOJ" width="170" height="225" alt="The Android Malware Handbook cover" title="The Android Malware Handbook cover" /></a></div></div></div> <header> <h2><a href="/androidmalwarehandbook">The Android Malware Handbook</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, and Yanhai Xiong</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>An all-star guide to tackling the analysis and detection of malware that targets the Android operating system.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-741" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/evading-edr"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/EvadingEDR_cover.png?itok=fZKYgSxh" width="170" height="225" alt="Evading EDR cover" title="Evading EDR cover" /></a></div></div></div> <header> <h2><a href="/evading-edr">Evading EDR</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Matt Hand</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-718" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/black-hat-graphql"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/BlackHatGraphQL_CV_F.png?itok=gafi6bTY" width="170" height="225" alt="Black Hat GraphQL Cover" title="Black Hat GraphQL Cover" /></a></div></div></div> <header> <h2><a href="/black-hat-graphql">Black Hat GraphQL</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Dolev Farhi, Nick Aleks</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Written by hackers for hackers, this hands-on book shows how to identify vulnerabilities in apps that use GraphQL.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-715" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/hacks-leaks-and-revelations"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718503120.png?itok=QVJ-lJ9U" width="172" height="225" alt="Hacks, Leaks, and Revelations cover" title="Hacks, Leaks, and Revelations cover" /></a></div></div></div> <header> <h2><a href="/hacks-leaks-and-revelations">Hacks, Leaks, and Revelations</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Micah Lee</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="color:#000000; font-family:Roboto,sans-serif; font-size:10pt">Learn the tools and develop the skills for uncovering big secrets hiding in public datasets.</span></p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-716" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/metasploit-2nd-edition"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/metasploit2e_frontcover_0.png?itok=syxwdg0l" width="169" height="225" alt="Metasploit, 2nd Edition cover" title="Metasploit, 2nd Edition cover" /></a></div></div></div> <header> <h2><a href="/metasploit-2nd-edition">Metasploit, 2nd Edition</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even"> David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman, and Daniel Graham</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><span style="font-size:10pt"><span style="font-family:Arial"><span style="color:#000000">The second edition of the international bestseller </span></span></span><span style="font-size:10pt"><span style="font-family:Arial"><span style="color:#000000"><em>Metasploit</em></span></span></span><span style="font-size:10pt"><span style="font-family:Arial"><span style="color:#000000"> is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework. </span></span></span></p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-687" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/codebreaking"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/Codebreaking_cover.png?itok=psZtK6XG" width="170" height="225" alt="Codebreaking cover" title="Codebreaking cover" /></a></div></div></div> <header> <h2><a href="/codebreaking">Codebreaking</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Elonka Dunin and Klaus Schmeh</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A tour through history’s real codes and ciphers written by two of today’s best cipher crackers.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-655" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/hacking-apis"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/HackingAPI_front.png?itok=8PTmOFp3" width="169" height="225" alt="Hacking APIs Cover" title="Hacking APIs Cover" /></a></div></div></div> <header> <h2><a href="/hacking-apis">Hacking APIs</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Corey Ball</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Learn how to test APIs for security vulnerabilities so you can uncover high-payout bugs and improve the security of web apps.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-649" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/art-cyberwarfare"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718502147.png?itok=VbyT_6zl" width="168" height="225" alt="The Art of Cyberwarfare Cover" title="The Art of Cyberwarfare Cover" /></a></div></div></div> <header> <h2><a href="/art-cyberwarfare">The Art of Cyberwarfare</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jon DiMaggio</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A detailed guide to nation-state hacking methods that shows how to track, analyze, and attribute advanced attacks.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-640" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/locksport"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/Locksport_frontcover.png?itok=9RZhWXJ0" width="170" height="225" alt="Locksport Cover" title="Locksport Cover" /></a></div></div></div> <header> <h2><a href="/locksport">Locksport</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jos Weyers, Matt Burrough, Walter Belgers, BandEAtoZ, and Nigel K. Tolley</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>This hands-on guide to the art of lockpicking will take you from noob to competition-ready.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-639" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/designing-secure-software"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718501928.png?itok=BW5f4Kkl" width="168" height="225" alt="Designing Secure Software cover" title="Designing Secure Software cover" /></a></div></div></div> <header> <h2><a href="/designing-secure-software">Designing Secure Software</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Loren Kohnfelder</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>An elegant, team-oriented guide for building security into the software design process.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-637" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/practical-doomsday"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/PracticalDoomsday_v10_darker_03.png?itok=feDs7ZPH" width="169" height="225" alt="Practical Doomsday" title="Practical Doomsday" /></a></div></div></div> <header> <h2><a href="/practical-doomsday">Practical Doomsday</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Michal Zalewski</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Outlines a model for evaluating risks in your life, as well as preparing for a wide range of potential crises.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-638" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/art-mac-malware-volume-1"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/ArtofMacMalware_v1_frontcover.png?itok=_lGfRg82" width="170" height="225" alt="The Art of Mac Malware, Volume 1 Cover" title="The Art of Mac Malware, Volume 1 Cover" /></a></div></div></div> <header> <h2><a href="/art-mac-malware-volume-1">The Art of Mac Malware, Volume 1</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Patrick Wardle</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A handbook for Apple infection methods, malicious script analysis, and Mach-O malware.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-633" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/go-hck-yourself"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/go-h_ck-yourself_cover_1216_finalPRINT4.png?itok=Pc80BdkE" width="171" height="225" alt="Go H*ck Yourself Cover" title="Go H*ck Yourself Cover" /></a></div></div></div> <header> <h2><a href="/go-hck-yourself">Go H*ck Yourself</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Bryson Payne</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A hands-on intro to hacking that guides you through executing every major type of attack (from the safety of a virtual lab).</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-629" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/practical-linux-forensics"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/PracticalLinuxForensincs_cover.png?itok=8f63-gWz" width="170" height="225" alt="Practical Linux Forensics Cover" title="Practical Linux Forensics Cover" /></a></div></div></div> <header> <h2><a href="/practical-linux-forensics">Practical Linux Forensics</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Bruce Nikkel</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A practitioner’s guide focused on postmortem analysis of modern Linux installations.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-614" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/bug-bounty-bootcamp"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718501546.png?itok=6fyd49d1" width="170" height="225" alt="Bug Bounty Bootcamp cover" title="Bug Bounty Bootcamp cover" /></a></div></div></div> <header> <h2><a href="/bug-bounty-bootcamp">Bug Bounty Bootcamp</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Vickie Li</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A beginner's guide to web hacking, bug hunting, reporting vulnerabilities – and getting paid for it.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-609" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/ethical-hacking"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718501874.png?itok=NZFhFw3K" width="169" height="225" alt="Ethical Hacking Cover" title="Ethical Hacking Cover" /></a></div></div></div> <header> <h2><a href="/ethical-hacking">Ethical Hacking</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Daniel G. Graham</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A crash course in modern hacking techniques, with lots of hands-on labs for aspiring offensive security experts. </p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-604" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/how-hack-legend"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/HTHLegend_v2.png?itok=iBxYNbsH" width="171" height="225" alt="How to Hack Like a Legend Cover" title="How to Hack Like a Legend Cover" /></a></div></div></div> <header> <h2><a href="/how-hack-legend">How to Hack Like a Legend</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Sparc Flow</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Puts you in the mind of a master hacker, as you plan and launch a stealth attack on Microsoft’s best security systems.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-608" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/cybersecurity-small-networks"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/CybersecuritySmallNetworks_front.png?itok=4LXXvxr7" width="170" height="225" alt="Cybersecurity for Small Networks Cover" title="Cybersecurity for Small Networks Cover" /></a></div></div></div> <header> <h2><a href="/cybersecurity-small-networks">Cybersecurity for Small Networks</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Seth Enoka</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-591" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/crypto-dictionary"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718501409.png?itok=ytFJtB1O" width="149" height="225" alt="Crypto Dictionary cover" title="Crypto Dictionary cover" /></a></div></div></div> <header> <h2><a href="/crypto-dictionary">Crypto Dictionary</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jean-Philippe Aumasson</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/crypto-dictionary">Crypto Dictionary </a> is your full reference resource for all things cryptography.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-583" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/black-hat-python2E"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/BlackHatPython2e_cover.png?itok=aINpYFyr" width="170" height="225" alt="Black Hat Python, 2nd Edition cover" title="Black Hat Python, 2nd Edition cover" /></a></div></div></div> <header> <h2><a href="/black-hat-python2E">Black Hat Python, 2nd Edition</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Justin Seitz and Tim Arnold</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Explore the stealthier side of programming with <a href="/black-hat-python2E">Black Hat Python, 2nd Edition</a> – fully updated for Python 3, with all new strategies for your hacking projects!</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-580" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/how-hack-ghost"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/hth-ghost_cover.png?itok=5bjVIjNX" width="169" height="225" alt="How to Hack Like a Ghost Cover" title="How to Hack Like a Ghost Cover" /></a></div></div></div> <header> <h2><a href="/how-hack-ghost">How to Hack Like a Ghost</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Sparc Flow</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/how-hack-ghost"> How to Hack Like a Ghost</a> is a fast-paced adventure that lets you shadow a master hacker targeting a shady foe with advanced cloud security.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-584" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/cybersecurityreallyworks"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/HowCybersecurityReallyWorks_cover.png?itok=YQ83HIs6" width="170" height="225" alt="How Cybersecurity Really Works Cover" title="How Cybersecurity Really Works" /></a></div></div></div> <header> <h2><a href="/cybersecurityreallyworks">How Cybersecurity Really Works</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Sam Grubb</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A hands-on guide targeted at total beginners,<a href="/cybersecurityreallyworks"> How Cybersecurity Really Works</a> will teach you everything you need to know about cyber defenses.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-567" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/practical-iot-hacking"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718500907.png?itok=kKS-p0-j" width="172" height="225" alt="Practical IoT Hacking cover" title="Practical IoT Hacking cover" /></a></div></div></div> <header> <h2><a href="/practical-iot-hacking">Practical IoT Hacking</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Fotios Chantzis, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Written by all-star security experts, <a href="/practical-iot-hacking">Practical IoT Hacking</a> is a quick-start conceptual guide to testing and exploiting IoT systems and devices.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-556" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/gtfo3"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/POC__GTFO_vIII.jpg?itok=0eWIXsTM" width="152" height="225" alt="PoC||GTFO, Volume 3 Cover" title="PoC||GTFO, Volume 3 Cover" /></a></div></div></div> <header> <h2><a href="/gtfo3">PoC||GTFO, Volume 3</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Manul Laphroaig</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://www.nostarch.com/gtfo3">PoC||GTFO (Proof of Concept or Get The Fuck Out), Volume 3</a> continues the series of wildly popular collections of this hacker journal.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-557" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/cyberjutsu"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718500549.png?itok=qxMIDvy9" width="149" height="225" alt="Cyberjutsu cover" title="Cyberjutsu cover" /></a></div></div></div> <header> <h2><a href="/cyberjutsu">Cyberjutsu</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Ben McCarty</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Based on techniques adapted from authentic Japanese ninja scrolls, <a href="/Cyberjutsu">Cyberjutsu</a> teaches ancient approaches to modern security problems.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-558" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/practical-social-engineering"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718500983.png?itok=EOOMCArs" width="170" height="225" alt="Practical Social Engineering Cover " title="Practical Social Engineering Cover " /></a></div></div></div> <header> <h2><a href="/practical-social-engineering">Practical Social Engineering</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Joe Gray</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>A hands-on look at the cyber attacks that target human nature, with pentesting templates for performing SE ops, and tips for defending against them.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-551" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/GhidraBook"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/Ghidra_fcvr.png?itok=dxaQMNlv" width="170" height="225" alt="The Ghidra Book" title="The Ghidra Book Cover" /></a></div></div></div> <header> <h2><a href="/GhidraBook">The Ghidra Book</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Chris Eagle and Kara Nance</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/GhidraBook">The Ghidra Book</a> is a practical introduction to Ghidra, a comprehensive, open-source tool suite for reverse engineers.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-540" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/PracticalVulnerability"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/PracticalVulnerabilityMgmt_fcvr.png?itok=U9FaYu--" width="170" height="225" alt="Practical Vulnerability Management cover" title="Practical Vulnerability Management cover" /></a></div></div></div> <header> <h2><a href="/PracticalVulnerability">Practical Vulnerability Management</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Andrew Magnusson</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/PracticalVulnerability">Practical Vulnerability Management</a> shows you how to weed out system security weaknesses and squash cyber threats in their tracks.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-525" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/websecurity"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/WebSecurityforDevelopers_frontcvr_final.png?itok=Ic8u8vSx" width="170" height="225" alt="Web Security for Developers" title="Web Security for Developers" /></a></div></div></div> <header> <h2><a href="/websecurity">Web Security for Developers</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Malcolm McDonald</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/websecurity">Web Security for Developers</a> explores the most common ways websites get hacked and how web developers can defend themselves.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-521" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/foundationsinfosec"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781718500044.png?itok=jxRbTU0u" width="172" height="225" alt="Foundations of Information Security cover" title="Foundations of Information Security cover" /></a></div></div></div> <header> <h2><a href="/foundationsinfosec">Foundations of Information Security</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jason Andress</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/foundationsinfosec">Foundations of Information Security</a> provides a high-level overview of the information security field.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-508" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/hardwarehackerpaperback"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/HardwareHacker_cover_0.png?itok=YrjxoWfY" width="149" height="225" alt="The Hardware Hacker" title="The Hardware Hacker" /></a></div></div></div> <header> <h2><a href="/hardwarehackerpaperback">The Hardware Hacker (Paperback edition)</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Andrew “bunnie” Huang</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><b><a href="/hardwarehackerpaperback">The Hardware Hacker</a></b> is an illuminating career retrospective from Andrew “bunnie” Huang, one of the world’s most esteemed hackers.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-483" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/binaryanalysis"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781593279127.png?itok=LsHY2jDp" width="170" height="225" alt="Practical Binary Analysis cover" title="Practical Binary Analysis cover" /></a></div></div></div> <header> <h2><a href="/binaryanalysis">Practical Binary Analysis</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Dennis Andriesse</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/binary">Practical Binary Analysis</a> covers advanced binary analysis topics like binary instrumentation, dynamic taint analysis, and symbolic execution.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-472" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/gtfo2"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/gtfo_cover_vol2_oblique.png?itok=0lB6ZMRe" width="170" height="225" alt="PoC GTFO, Volume 2 Cover" title="PoC GTFO, Volume 2" /></a></div></div></div> <header> <h2><a href="/gtfo2">PoC||GTFO, Volume 2</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Manul Laphroaig</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://www.nostarch.com/gtfo2">PoC||GTFO (Proof of Concept or Get The Fuck Out), Volume 2</a> follows-up the wildly popular first volume with issues 9 through 13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-460" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/malwaredatascience"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781593278595.png?itok=bgfb-Vt7" width="171" height="225" alt="Malware Data Science cover" title="Malware Data Science cover" /></a></div></div></div> <header> <h2><a href="/malwaredatascience">Malware Data Science</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Joshua Saxe with Hillary Sanders</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/malwaredatascience">Malware Data Science</a> explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-453" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/linuxbasicsforhackers"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/LinuxBasicsforHackers_cover-front.png?itok=ocK4Ltr7" width="170" height="225" alt="Linux Basics for Hackers" title="Linux Basics for Hackers" /></a></div></div></div> <header> <h2><a href="/linuxbasicsforhackers">Linux Basics for Hackers</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">OccupyTheWeb</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/linuxforhackers">Linux Basics for Hackers</a> uses the Kali Linux distribution to explain core Linux topics like filesystems, networking, package management, and BASH.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-456" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/hardwarehacking"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/HardwareHacking_revised.png?itok=bKcOPd7Q" width="169" height="225" alt="The Hardware Hacking Handbook" title="The Hardware Hacking Handbook" /></a></div></div></div> <header> <h2><a href="/hardwarehacking">The Hardware Hacking Handbook</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Colin O'Flynn and Jasper van Woudenberg</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Cracks open embedded security to show how hardware attacks work from the inside out.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-440" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/azure"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/azure_cover-front-retitle_REV_HM.png?itok=ZRJSupp6" width="170" height="225" alt="Pentesting Azure Applications" title="Pentesting Azure Applications" /></a></div></div></div> <header> <h2><a href="/azure">Pentesting Azure Applications</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Matt Burrough</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/azure">Pentesting Azure Applications</a> is a comprehensive guide to penetration testing cloud services deployed in Microsoft Azure.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-442" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/blackhatgo"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/BHG_frontcover_REV_HM.png?itok=ns0fk-16" width="170" height="225" alt="Black Hat Go" title="Black Hat Go" /></a></div></div></div> <header> <h2><a href="/blackhatgo">Black Hat Go</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Tom Steele, Chris Patten, and Dan Kottmann</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/blackhatgo">Black Hat Go</a> will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. </p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-439" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/bughunting"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/bughunting_frontcvr_rgb_REV2%20HM.png?itok=AQmJUAIK" width="170" height="225" alt="Real-World Bug Hunting" title="Real-World Bug Hunting" /></a></div></div></div> <header> <h2><a href="/bughunting">Real-World Bug Hunting</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Peter Yaworski</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/webhacking">Real-World Bug Hunting</a> uses real-world bug reports to teach programmers how to discover and protect vulnerabilities in web applications. </p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-428" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/seriouscrypto"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/crypto_cover-front-final_REV_HM.png?itok=orLQYGhk" width="170" height="225" alt="Serious Cryptography" title="Serious Cryptography" /></a></div></div></div> <header> <h2><a href="/seriouscrypto">Serious Cryptography</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jean-Philippe Aumasson</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/SeriousCrypto">Serious Cryptography</a> is a practical guide to the past, present, and future of cryptographic systems and algorithms. </p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-423" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/gtfo"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/GTFO_cover_new.png?itok=lBWCPvx-" width="170" height="225" alt="PoC||GTFO" title="PoC||GTFO" /></a></div></div></div> <header> <h2><a href="/gtfo">PoC||GTFO</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Manul Laphroaig</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://www.nostarch.com/gtfo">PoC||GTFO</a> (Proof of Concept or Get The Fuck Out) is a compilation of the wildly popular hacker zine of the same name. Contributions range from humorous poems to deeply technical essays.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-392" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/packetanalysis3"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/PracticalPacketAnalysis3E_cover.png?itok=6NiKIgj4" width="170" height="225" alt="Practical Packet Analysis, 3rd Edition" title="Practical Packet Analysis, 3rd Edition" /></a></div></div></div> <header> <h2><a href="/packetanalysis3">Practical Packet Analysis, 3rd Edition</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Chris Sanders</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/packetanalysis3">Practical Packet Analysis, 3rd Ed.</a> teaches you how to use Wireshark for packet capture and analysis.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-389" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/grayhatcsharp"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/GrayHatC_cover.png?itok=SQlRafXY" width="170" height="225" alt="Gray Hat C#" title="Gray Hat C#" /></a></div></div></div> <header> <h2><a href="/grayhatcsharp">Gray Hat C#</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Brandon Perry</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://www.nostarch.com/GrayHatCSharp">Gray Hat C#</a> shows you how to use C#'s powerful set of core libraries to create and automate security tools.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-390" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/networkprotocols"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/anp_cover-front-final_REV%20HM.png?itok=kGDrVQG8" width="170" height="225" alt="Attacking Network Protocols" title="Attacking Network Protocols" /></a></div></div></div> <header> <h2><a href="/networkprotocols">Attacking Network Protocols</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">James Forshaw</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><b><a href="/networkprotocols">Attacking Network Protocols</a></b> is a deep dive into network protocol security from James Forshaw, one of the world’s leading bug hunters.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-377" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/forensicimaging"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/pfi_cover-front_new_REV%20HM.png?itok=qWeqRwFs" width="170" height="225" alt="Practical Forensic Imaging" title="Practical Forensic Imaging" /></a></div></div></div> <header> <h2><a href="/forensicimaging">Practical Forensic Imaging </a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Bruce Nikkel</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/forensicimaging">Practical Forensic Imaging</a> takes a detailed look at how to secure digital evidence using Linux-based command line tools.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-353" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/carhacking"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/carhackers_cover.png?itok=bDWMq4M9" width="170" height="225" alt="The Car Hacker's Handbook" title="The Car Hacker's Handbook" /></a></div></div></div> <header> <h2><a href="/carhacking">Car Hacker's Handbook</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Craig Smith</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://www.nostarch.com/carhacking">The Car Hacker’s Handbook</a> shows how to identify and exploit vulnerabilities in modern vehicles.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-352" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/rootkits"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/9781593277161.png?itok=pANsFf1q" width="170" height="225" alt="Rootkits and Bootkits cover" title="Rootkits and Bootkits cover" /></a></div></div></div> <header> <h2><a href="/rootkits">Rootkits and Bootkits</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Alex Matrosov, Eugene Rodionov, and Sergey Bratus</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/rootkits">Rootkits and Bootkits</a> shows you how to analyze, identify, and defend against rootkits and bootkits.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-338" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/gamehacking"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/gameHacking_cover-front.png?itok=NQjgkmBT" width="170" height="225" alt="Game Hacking" title="Game Hacking" /></a></div></div></div> <header> <h2><a href="/gamehacking">Game Hacking</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Nick Cano</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://www.nostarch.com/gamehacking">Game Hacking</a> shows programmers how to dissect computer games and create bots.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-328" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/smartgirlsguide"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/sggp_frontcvr_final.png?itok=6U6eQeom" width="149" height="225" alt="The Smart Girl's Guide to Privacy" title="The Smart Girl's Guide to Privacy" /></a></div></div></div> <header> <h2><a href="/smartgirlsguide">Smart Girl's Guide to Privacy</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Violet Blue</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://www.nostarch.com/smartgirlsguide">The Smart Girl's Guide to Privacy</a> teaches you how to protect yourself online.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-310" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/iossecurity"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/iOSApplicationSecurity_cover.png?itok=u5DUMzJc" width="170" height="225" alt="iOS Application Security" title="iOS Application Security" /></a></div></div></div> <header> <h2><a href="/iossecurity">iOS Application Security</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">David Thiel</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="https://nostarch.com/iossecurity">iOS Application Security</a> covers everything you need to know to design secure iOS apps from the ground up.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-298" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/pf3"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/pf3E_cover01.png?itok=pdd1eA7X" width="170" height="225" alt="The Book of PF, 3rd Edition" title="The Book of PF, 3rd Edition" /></a></div></div></div> <header> <h2><a href="/pf3">Book of PF, 3rd Edition</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Peter N. M. Hansteen</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="pf3">The Book of PF, 3rd Edition</a> is the essential guide to building a secure network with PF, the OpenBSD packet filtering tool.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-292" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/androidsecurity"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/ASI_COVER_LAKE_web_0.png?itok=tUop7oT8" width="170" height="225" alt="Android Security Internals" title="Android Security Internals Cover" /></a></div></div></div> <header> <h2><a href="/androidsecurity">Android Security Internals</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Nikolay Elenkov</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="http://www.nostarch.com/androidsecurity">Android Security Internals</a> gives you a complete understanding of the security internals of Android devices.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-278" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/pentesting"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/pentest_cover-web.png?itok=uIVwKOZY" width="170" height="225" alt="Penetration Testing: A Hands-on Introduction to Hacking" title="Penetration Testing: A Hands-on Introduction to Hacking" /></a></div></div></div> <header> <h2><a href="/pentesting">Penetration Testing</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Georgia Weidman</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In <em>Penetration Testing</em>, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-255" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/nsm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/pnsm_cover_WEB.png?itok=5AZWvNLZ" width="170" height="225" alt="The Practice Of Network Security Monitoring" title="The Practice Of Network Security Monitoring" /></a></div></div></div> <header> <h2><a href="/nsm">The Practice of Network Security Monitoring</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Richard Bejtlich</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="nsm">The Practice of Network Security Monitoring</a> teaches IT and security staff how to leverage powerful NSM tools to identify threats quickly and effectively.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-192" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/tangledweb"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/tangledWeb_cvr-webquality.png?itok=wwEFaZFs" width="170" height="225" alt="The Tangled Web" title="The Tangled Web" /></a></div></div></div> <header> <h2><a href="/tangledweb">Tangled Web</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Michal Zalewski</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/tangledweb">The Tangled Web</a> sheds light on the security challenges that engineers, developers, and users face on the Web today. Join security expert Michal Zalewski for an in-depth look at how browsers actually work, and what pitfalls lurk in the shadows.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-188" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/bughunter"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/bhd.png?itok=6uzU9_P8" width="150" height="225" alt="A Bug Hunter's Diary" title="A Bug Hunter's Diary" /></a></div></div></div> <header> <h2><a href="/bughunter">A Bug Hunter's Diary</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Tobias Klein</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><a href="/bughunter">A Bug Hunter's Diary</a> follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software.<br /><br /></p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-184" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/malware"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/practical_malware_analysis.png?itok=LgOtRr5y" width="170" height="225" alt="Practical Malware Analysis" title="Practical Malware Analysis" /></a></div></div></div> <header> <h2><a href="/malware">Practical Malware Analysis</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Michael Sikorski and Andrew Honig</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-181" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/idapro2.htm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/idaPro2e_frontcvr.png?itok=kjmVwaeh" width="170" height="225" alt="IDA Pro Book, 2nd Edition" title="IDA Pro Book, 2nd Edition" /></a></div></div></div> <header> <h2><a href="/idapro2.htm">IDA Pro Book, 2nd Edition</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Chris Eagle</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>No source code? No problem! This second edition of the <a href="/idapro2">The IDA Pro Book</a> is the definitive guide to IDA Pro, arguably the most sophisticated disassembler in the world. <br /><br /></p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-178" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/metasploit"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/metasploit_front_final_1.png?itok=QXh1K0aY" width="170" height="225" alt="Metasploit Cover" title="Metasploit" /></a></div></div></div> <header> <h2><a href="/metasploit">Metasploit</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Whether your goal is to secure your own network or discover vulnerabilities for a client, <a href="/metasploit.htm">Metasploit: The Penetration Tester's Guide</a> is the definitive guide to using this dynamic and powerful tool.<br /> </p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-46" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/firewalls.htm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/firewalls_big.jpg?itok=gLdEVMB0" width="170" height="225" alt="Linux Firewalls" title="Linux Firewalls" /></a></div></div></div> <header> <h2><a href="/firewalls.htm">Linux Firewalls</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Michael Rash</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>If you're responsible for keeping a network secure, you'll find <em>Linux Firewalls</em> invaluable in your attempt to understand attacks and to detect and even prevent compromises.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-48" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/silence.htm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/silence_big.jpg?itok=C4l0DFR-" width="170" height="225" alt="Silence on the Wire" title="Silence on the Wire" /></a></div></div></div> <header> <h2><a href="/silence.htm">Silence on the Wire</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Michal Zalewski</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>View a sample chapter, <a href="download/silence_ch05.pdf" target="new">Chapter 5: Blinkenlights</a><br /></p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-49" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/stcb4.htm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/stcb4_big.jpg?itok=co0Eutsa" width="175" height="225" alt="Steal This Computer Book 4.0" title="Steal This Computer Book 4.0" /></a></div></div></div> <header> <h2><a href="/stcb4.htm">Steal This Computer Book 4.0</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Wallace Wang</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>If you thought hacking was just about mischief-makers hunched over computers in the basement, think again.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-45" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/voip.htm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/voip_big.jpg?itok=D8wCgN29" width="171" height="225" alt="Hacking VoIP" title="Hacking VoIP" /></a></div></div></div> <header> <h2><a href="/voip.htm">Hacking VoIP</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Himanshu Dwivedi</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p><em>Hacking VoIP</em> is your map and guidebook to where VoIP's biggest weaknesses lie and how to shore up your security</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-44" class="node node-product node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/rootkits.htm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/rootkits_big.jpg?itok=TQ4wkaB0" width="169" height="225" alt="Designing BSD Rootkits" title="Designing BSD Rootkits" /></a></div></div></div> <header> <h2><a href="/rootkits.htm">Designing BSD Rootkits</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Joseph Kong</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Hack the FreeBSD kernel for yourself!</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-9" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/ghpython.htm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/ghpython_big.png?itok=5MvJjBot" width="170" height="225" alt="Gray Hat Python" title="Gray Hat Python" /></a></div></div></div> <header> <h2><a href="/ghpython.htm">Gray Hat Python</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Justin Seitz</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>The first Python book written for security analysts, Gray Hat Python explains the intricacies of using Python to assist in security analysis tasks. You'll learn how to design your own debuggers, create powerful fuzzers, utilize open source libraries to automate tedious tasks, interface with security tools, and more.</p> </div></div></div> <footer> </footer> </article> </div> <div class="col-xs-6 col-sm-6 col-md-6 col-lg-6 with-padding-bottom nostrach-views-row"> <article id="node-6" class="node node-product node-promoted node-teaser clearfix"> <div class="field field-name-field-image-cache field-type-image field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/hacking2.htm"><img class="img-responsive" src="https://nostarch.com/sites/default/files/styles/uc_product/public/hacking_2E_big.png?itok=YE-mWK3g" width="171" height="225" alt="Hacking: The Art of Exploitation (2nd Edition)" title="Hacking: The Art of Exploitation (2nd Edition)" /></a></div></div></div> <header> <h2><a href="/hacking2.htm">Hacking, 2nd Edition</a></h2> </header> <div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Jon Erickson</div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even"><p>Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.</p> </div></div></div> <footer> </footer> </article> </div> </div> </div> </section> <section id="block-shariff-shariff-block" class="block block-shariff clearfix"> <div class="shariff" data-services="["facebook","print","twitter"]" data-theme="colored" data-orientation="horizontal" data-twitter-via="nostarch" data-lang="en"></div> </section> </div> </section> <aside class="col-sm-3" role="complementary"> <div class="region region-sidebar-second"> <section id="block-views-856b6b243d5a0c8ed3983ae34f160717" class="block block-views clearfix"> <form class="ctools-auto-submit-full-form" action="/catalog/security" method="get" id="views-exposed-form-nostarch-taxonomy-term-page" accept-charset="UTF-8"><div><div class="views-exposed-form"> <div class="views-exposed-widgets clearfix"> <div class="views-exposed-widget views-widget-sort-by"> <div class="form-item form-item-sort-by form-type-select form-group"> <label class="control-label" for="edit-sort-by">Sort by</label> <select class="form-control form-select" id="edit-sort-by" name="sort_by"><option value="created_1" selected="selected">Date: newer first</option><option value="title">Alphabetical by title</option><option value="created_2">Date: older first</option><option value="sell_price">Price: lowest first</option><option value="sell_price_1">Price: highest first</option></select></div> </div> <div class="views-exposed-widget views-widget-sort-order"> </div> <div class="views-exposed-widget views-submit-button"> <div class="col-md-6"></div><div class="col-md-6"></div><div class="clearfix"></div><div class="col-md-6"></div><div class="col-md-6"></div><button class="ctools-use-ajax ctools-auto-submit-click js-hide element-hidden btn btn-info form-submit" type="submit" id="edit-submit-nostarch-taxonomy-term" name="" value="Apply">Apply</button> </div> </div> </div> </div></form> </section> <section id="block-system-navigation" class="block block-system block-menu clearfix"> <h2 class="block-title">Navigation</h2> <ul class="menu nav"><li class="first last leaf"><a href="/user" title="">My account</a></li> </ul> </section> <section id="block-block-52" class="block block-block clearfix"> <p><a href="/mailchimp/subscribe">Want sweet deals? <br />Sign up for our newsletter.</a></p> </section> </div> </aside> <!-- /#sidebar-second --> </div> </div> <footer class="footer container"> <div class="region region-footer"> <section id="block-block-16" class="block block-block clearfix"> <div id="footer-links"> <br> <a class="footer-links" href="/about.htm">About Us</a> <span class="footer-divider">|</span> <a class="footer-links" href="/Jobs.htm">Jobs!</a> <span class="footer-divider">|</span> <a class="footer-links" href="/distribution.htm">Sales and Distribution</a> <span class="footer-divider">|</span> <a class="footer-links" href="/rights">Rights</a> <span class="footer-divider">|</span> <a class="footer-links" href="/media.htm">Media</a> <span class="footer-divider">|</span> <a class="footer-links" href="/academic.htm">Academic Requests</a> <span class="footer-divider">|</span> <a class="footer-links" href="/conferences.htm">Conferences</a> <span class="footer-divider">|</span> <a class="footer-links" href="/orderfaq.htm">FAQ</a> <span class="footer-divider">|</span> <a class="footer-links" href="/contactus">Contact Us</a> <span class="footer-divider">|</span> <a class="footer-links" href="/writeforus">Write for Us</a> <span class="footer-divider">|</span> <a class="footer-links" href="/privacypolicy.htm">Privacy</a> </div> </section> <section id="block-nostarch-custom-custom-footer-copyright" class="block block-nostarch-custom clearfix"> <div class="block-block"> <p>Copyright 2024. No Starch Press, Inc</p> </div> </section> </div> </footer> <script src="https://nostarch.com/sites/all/modules/contrib/addthis/addthis.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/libraries/shariff/shariff.min.js?snvsu3"></script> <script src="https://nostarch.com/sites/all/themes/contrib/bootstrap/js/bootstrap.js?snvsu3"></script> <!-- Reddit Pixel --> <script> !function(w,d){if(!w.rdt){var p=w.rdt=function(){p.sendEvent?p.sendEvent.apply(p,arguments):p.callQueue.push(arguments)};p.callQueue=[];var t=d.createElement("script");t.src="https://www.redditstatic.com/ads/pixel.js",t.async=!0;var s=d.getElementsByTagName("script")[0];s.parentNode.insertBefore(t,s)}}(window,document);rdt('init','t2_6acpsf9y');rdt('track', 'PageVisit'); </script> <!-- DO NOT MODIFY UNLESS TO REPLACE A USER IDENTIFIER --> <!-- End Reddit Pixel --> <script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'8ebe3b4b182040a9',t:'MTczMzE3MzA3MC4wMDAwMDA='};var a=document.createElement('script');a.nonce='';a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></body> </html>