The Wireless Cookbook
Learn the ins and outs of Wi-Fi, Bluetooth, and Long Range wireless technologies through practical, step-by-step projects using Raspberry Pi and other inexpensive hardware.
Learn the ins and outs of Wi-Fi, Bluetooth, and Long Range wireless technologies through practical, step-by-step projects using Raspberry Pi and other inexpensive hardware.
This long-awaited second edition folds years of updates into its beginner-friendly lessons on using R for data and statistical analysis.
A comprehensive tutorial on programming in assembly using the iconic Game Boy, teaching the basics of computer science in a fun and engaging way.
You’ve seen what Python can do. Now go deeper.
Learn to write real Linux software—not just run it.
Real-world threats demand real-world teamwork.
You know how to write Python. Now master the computer science that makes it work.
Build your own 3D solutions from 28 basic bricks. So many "Aha!" moments.
When Excel isn’t enough, it’s time to learn Python.
How real engineers build electronics—one working piece at a time.
A friendly introduction to quantum programming for complete beginners.
Turn raw logs into real intelligence.
Find vulnerabilities before anyone else does.
Master the tools. Build the workflow. Own the shell.
Dive into deep learning without drowning in theory with this fully updated edition from AI expert Ronald T. Kneusel.
The second edition of this bestselling introduction to the Linux operating system for hackers and penetration testers has been fully updated and revised, covering the latest version of Kali.
Learn to automate even more boring stuff in this fully updated edition of the classic bestseller, now with new chapters and the latest Python features.
Master the inner workings of your x64 Linux system and expand your OS expertise by writing your very own debugger using C++.
Discover the exciting world of software-defined radio (SDR) through this fun, project-based introduction.
A one-stop-shop for all the math you should have learned for your programming career.
Add valuable skills to your programming toolkit by learning to write complete applications in ARM, a popular low-level assembly language.
This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.
A complete guide to deep neural networks – the technology behind AI – covering fundamental and advanced techniques to apply machine learning in real-world scenarios.
This exhaustive guide to the Linux memory subsystem is the first major resource since 2004 to cover key concepts and essential techniques for developers.
You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.
Build a more secure network with PF.
The Ghidra Book is a practical introduction to Ghidra, a comprehensive, open-source tool suite for reverse engineers.
A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration testing, or "red team," operations.
Building on two successful editions (135,000 copies sold), this book adds essential updates to a title considered the Rust programming language’s official documentation.
Everything you need to know to build a TypeScript product from scratch.
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.
This comprehensive introduction to the information security field covers the industry’s essential concepts, using real-world security breaches to illustrate key lessons.
Learn how to build a web app that can monitor millions of posts across social media to chart public opinion in real time.
AI is no longer a futuristic concept—it’s embedded in critical systems shaping finance, healthcare, infrastructure, and national security. But with this power comes unprecedented risk.
A forward-looking primer on how AI models and systems work, the attacks that can disrupt them, and what security measures the industry uses to keep them safe.
Aspiring hackers will learn foundational programming in C and assembly languages from a veteran hacker and develop the skills to create their own hacking tools.
Satellites power our internet, GPS, weather forecasts, defense systems—and they’re all at risk.
Build intelligent applications—no data science degree required.