free tracker
Categories Unlimited Books

Linux Basics for Hackers: Getting Started with Networking, Bash, and Securi…

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.

Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker;…

The Art Of Memory Forensics

Pub Date : 2014-07-22 | Author : Michael Hale Ligh | Publisher : John Wiley & Sons

ISBN 10 : 9781118824993
ISBN 13 : 1118824997

Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a f..

Steve Jobs

Pub Date : 2011-10-24 | Author : Walter Isaacson | Publisher : Simon and Schuster

ISBN 10 : 9781451648539
ISBN 13 : 1451648537

Draws on more than forty interviews with Steve Jobs, as well as interviews with family members, friends, competitors, and colleagues to offer a look at the co-founder and leading c..

Learning The Bash Shell

Pub Date : 2005-03-29 | Author : Cameron Newham | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 0596555008
ISBN 13 : 9780596555009

O'Reilly's bestselling book on Linux's bash shell is at it again. Now that Linux is an established player both as a server and on the desktop Learning the bash Shell has been updat..

Penetration Testing

Pub Date : 2014-06-14 | Author : Georgia Weidman | Publisher : No Starch Press

ISBN 10 : 9781593275648
ISBN 13 : 1593275641

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration tech..

Malware Analyst S Cookbook And Dvd

Pub Date : 2010-09-29 | Author : Michael Ligh | Publisher : John Wiley & Sons

ISBN 10 : 1118003365
ISBN 13 : 9781118003367

A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security pro..

Hadoop The Definitive Guide

Pub Date : 2012-05-10 | Author : Tom White | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781449338770
ISBN 13 : 1449338771

Ready to unlock the power of your data? With this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. This boo..


Pub Date : 2012-01-05 | Author : Suelette Dreyfus | Publisher : Canongate Books

ISBN 10 : 9780857862600
ISBN 13 : 085786260X

Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ri..

Leave a Reply

Your email address will not be published. Required fields are marked *