Processing ......
processing
FreeComputerBooks.com
Links to Free Computer, Mathematics, Technical Books all over the World
 
Free Hacking and Hackers Books
Related Book Categories:
  • Hacking: The Art of Exploitation (Jon Erickson)

    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Few 'Hackers' have the strong technical foundation needed to really push the envelope.

  • Hacking Street: The Way of Hacking (Kirandeep Singh Sandhu)

    Focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware.

  • Defense against the Black Arts: How Hackers Do What They Do?

    The best way to secure a system is to understand the tools hackers use and know how to circumvent them. This book provides hands-on instruction to a host of techniques used to hack into a variety of systems.

  • The Hacker's Underground Handbook (David Melnichuk)

    This book will put you into a hacker's mindset and teach you all of the hacker's secret ways. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware.

  • Hack, Hack, Who's There? A Gentle Introduction to Model Theory

    The skeleton of this narrative nonfiction book is a science fiction story without the usual mangling of physics. The flesh is composed of self-contained non-technical mainstream explanations and examples of the field of mathematics called Model Theory.

  • The Hacker Playbook 2: Practical Guide To Penetration Testing

    Through a series of football-style "plays," this straightforward guide gets to the roadblocks in penetration testing - including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

  • Mind Hacking: How to Change Your Mind for Good in 21 Days

    Teaches you how to reprogram your thinking - like reprogramming a computer - to give you increased mental efficiency and happiness. Learn to take charge of your mind and banish negative thoughts, habits, and anxiety - in just 21 days!

  • Learn Ethical Hacking from Scratch (Zaid Sabih)

    You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices.

  • How to Become Anonymous, Secure and Free Online (Amy Awol)

    This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources.

  • Unauthorized Access: The Crisis in Online Privacy and Security

    Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security.

  • Hacking Kubernetes: Threat-Driven Analysis and Defense

    It begins with a vanilla Kubernetes installation with built-in defaults, then examines an abstract threat model of a distributed system running arbitrary workloads, and then progress to a detailed assessment of each component of a secure Kubernetes system.

  • A Beginner's Guide to Understanding Game Hacking Techniques

    Game hacking allows you to add functionality and change how games work. Whether your goal is to add a new unit to an RTS game or create an aimbot for a FPS game, this book will teach you what you need to become a true game hacker.

  • Coding Freedom: The Ethics and Aesthetics of Hacking

    Who are computer hackers? What is free software? This book is insightful and fascinating, a superbly observed picture of the motives, divisions and history of the free software and software freedom world.

  • Hacker, Hoaxer, Whistleblower, Spy: Many Faces of Anonymous

    The ultimate book on the worldwide movement of hackers, pranksters, and activists collectively known as Anonymous. It is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age.

  • Bayesian Methods for Hackers: Probabilistic Programming

    This book illuminates Bayesian inference through probabilistic programming with the powerful PyMC language and the closely related Python tools NumPy, SciPy, Matplotlib, through practical examples and computation - no advanced mathematics required.

  • Hacking with Swift (Paul Hudson)

    This book is a complete Swift tutorial written for Swift 3 and iOS 10. It takes you from absolutely beginner with no knowledge of Swift to an advanced Swift developer through 39 finished hands-on projects, all utilizing the latest frameworks from Apple.

  • Firewalls and Internet Security: Repelling the Wily Hacker

    This book gives invaluable advice and practical tools for protecting our computers. Learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your easy access to Internet services.

  • Hacking Exposed Computer Forensics (Aaron Philipp, et al)

    This book explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents.

  • Hacking with React (Paul Hudson)

    In short, this book is the fastest way to get up to speed with React development, and is guaranteed to jump start your learning. Even better, your purchase includes any future updates free of charge!

  • The C++ Hackers Guide (Steve Oualline)

    This book collects more than 120 of the best C++ veteran secrets and puts them in one accessible place. The techniques presented have all been used in actual programs, and more importantly, have made actual programs better.

  • Hacking Secret Ciphers with Python (Albert Sweigart)

    This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers. It also provides the source code to several fun programming projects.

  • The New Hacker's Dictionary (The Jargon File) by Eric S. Raymond

    A collection of slang terms used by various subcultures of computer hackers. Though some technical material is included for background and flavor, it is not a technical dictionary. What we describe here is the language hackers use among themselves for fun, etc.

  • Hacking the Xbox: An Introduction to Reverse Engineering

    This book shows Xbox owners how to increase the value and utility of their system, Hacking the Xbox features step-by-step tutorials on hardware modification that teach basic hacking techniques as well as essential reverse engineering skills.

  • Linux 101 Hacks - Examples to Build a Strong Fundation in Linux

    There are total of 101 hacks in this book that will help you build a strong foundation in Linux. All the hacks are explained with appropriate Linux command examples that are easy to follow.

  • O'Reilly® Ubuntu Hacks: Tips/Tools for Exploring, Using Linux

    This is your one-stop source for all of the community knowledge you need to get the most out of Ubuntu: a collection of 100 tips and tools to help new and experienced Linux users install, configure, and customize Ubuntu.

  • O'Reilly® Greasemonkey Hacks: Tips & Tools for Remixing the Web

    This book is an invaluable compendium 100 ingenious hacks for power users who want to master Greasemonkey, the hot new Firefox extension that allows you to write scripts that alter the web pages you visit.

  • Ruby Hacking Guide (Minero Aoki)

    The Ruby Hacking Guide is a book that explains how the ruby interpreter (the official C implementation of the Ruby language) works internally. To fully understand it, you need a good knowledge of C and Ruby.

  • Lisp Hackers: Interviews with 100x More Productive Programmers

    Overall, this book should give an insight into why people use Lisp, as well as help the readers gain some new experience and improve as programmers. It's a collection of short interviews with 14 prominent individuals from different parts of the world.

  • A Hacker's Guide to Git (Joseph Wynn)

    This guide explains some of Git's core concepts including basic object storage, commits, branches and tags. It also contains in-depth explanations about the different kinds of merging in Git, including the much-feared rebase.

  • Network Security Tools: Writing, Hacking, and Modifying Security

    This concise, high-end free book discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment.

  • Hacknot - Essays on Software Development (Ed Johnson)

    This book contains 46 essays originally published on the Hacknot web site. The version of each essay appearing in the book is substantially the same as the online version, with some minor revisions and editing.

Book Categories
:
Other Categories
Resources and Links