eBooks-it.org Logo
eBooks-IT.org Inner Image

No Starch eBooks Page 4

Download free No Starch eBooks Page 4

Super Scratch Programming Adventure

Learn to Program by Making Cool Games
Super Scratch Programming Adventure Image
2nd Edition
Scratch is the wildly popular educational programming language used by millions of first-time learners in classrooms and homes worldwide. By dragging together colorful blocks of code, kids can learn computer programming concepts and make cool games and animations. The latest version, Scratch 2, brings the language right into your web browser, with no need to download software. In Super Scratch Programming Adventure!, kids learn programming fundamentals as they make their very own playable video games. They'll create projects inspired by classic arcade games that can be programmed (and played!) in an afternoon. Patient, step-by-step explanations of the ...

Black Hat Python

Python Programming for Hackers and Pentesters
Black Hat Python Image
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities-writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the pop...

If Hemingway Wrote JavaScript

If Hemingway Wrote JavaScript Image
What if William Shakespeare were asked to generate the Fibonacci series or Jane Austen had to write a factorial program? In If Hemingway Wrote JavaScript, author Angus Croll imagines short JavaScript programs as written by famous wordsmiths. The result is a peculiar and charming combination of prose, poetry, and programming.The best authors are those who obsess about language-and the same goes for JavaScript developers. To master either craft, you must experiment with language to develop your own style, your own idioms, and your own expressions. To that end, If Hemingway Wrote JavaScript playfully bridges the worlds of programming and literature for the literary geek in all of us.Featuring original artwork by Miran Lipovaca....

The Official GNOME 2

Developer's Guide
The Official GNOME 2 Image
Developers who write programs for GNOME use the GNOME API. Working with the GNOME API is preferable because the program will conform to the standard GNOME program look and feel. It also allows the developer to use the GNOME specific libraries in the program, greatly simplifying the development process. The Official GNOME 2 Developer's Guide is the official GNOME Foundation guide to programming GUIs and applications using the GTK+ and GNOME API. Developed in partnership with the GNOME Foundation, this book is for programmers working with the GNOME 2 desktop environment. Each section begins with an example program that serves as a tutorial, then develops into a reference on the topic. Includes abundant, well-annotated examples. Knowledge of the C progr...

Practical Malware Analysis

The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis Image
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You'll learn how to:Set up a safe virtual environment to analyze malwareQuickly extract network signatures and host-based indicatorsUse key analysis tools like IDA Pro, OllyDbg, and WinDbgOvercome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-v...



2007 - 2017 © eBooks-IT.org