The Quick Python Book

The Quick Python Book, Second Edition, is a clear, concise introduction to Python 3, aimed at programmers new to Python. This updated edition includes all the changes in Python 3, itself a significant shift from earlier versions...

Download or read The Quick Python Book in PDF formats. You may also find other subjects related with The Quick Python Book.

View
Building Secure Software: How to Avoid Security Problems the Right Way

Download or read Building Secure Software: How to Avoid Security Problems the Right Way in PDF formats. You may also find other subjects related with Building Secure Software: How to Avoid Security Problems the Right Way.

View
Threat Modeling: Designing for Security

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is...

Download or read Threat Modeling: Designing for Security in PDF formats. You may also find other subjects related with Threat Modeling: Designing for Security.

View
Learning Android

Want to build apps for Android devices? This book is the perfect way to master the fundamentals. Written by an expert who's taught this mobile platform to hundreds of developers in large organizations, this gentle introduction shows experienced object-oriented programmers how to use Android’s basic building blocks to create...

Download or read Learning Android in PDF formats. You may also find other subjects related with Learning Android.

View
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

This book provides a systematic approach to reverse engineering. Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book...

Download or read Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation in PDF formats. You may also find other subjects related with Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation.

View
Exploiting Software: How to Break Code

Download or read Exploiting Software: How to Break Code in PDF formats. You may also find other subjects related with Exploiting Software: How to Break Code.

View