Difference between revisions of "Category:Literature"
Jump to navigation
Jump to search
(Created page with "This page contains books and magazines, which you can lend from ElvisLab.") |
(No difference)
|
Revision as of 14:06, 4 March 2020
This page contains books and magazines, which you can lend from ElvisLab.
Pages in category "Literature"
The following 109 pages are in this category, out of 109 total.
A
- A Short Course in Discrete Mathematics
- Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
- Advanced Penetration Testing - Hacking IoT
- Android User 08/2013
- Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition
- AWS Certified Solutions Architect Official Study Guide
B
C
- C't Make 5/2019 magazine
- C't Make 6/2019 magazine
- C't Make: 02/18 magazine
- C't Make: 02/18 Magazine
- C't Security 2018 magazine
- Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
- Computernetze und Internet-of-Things
- Coole Projekte mit Raspberry Pi
- Cracking Codes with Python: Introduction to Building and Breaking Ciphers
- Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design 1st Edition
- Cryptography for Developers
- Cryptography in C and C++ 1st Edition
E
H
- Hacking - The Art of Exploitation - 2nd Edition
- Hacking for Beginners
- Hacking Internet of Things: Bluetooth Low Energy
- Hacking mit Python: Fehlersuche, Programmanalyse, Reverse Engineering
- Hands-On Mobile App Testing: A Guide for Mobile Testers and Anyone Involved in the Mobile App Business
- Hardware Security - A Hands-On Approach
- Hash Crack: Password Cracking Manual (v3)
- Hausautomation mit Raspberry Pi
- HCS08 Unleashed: Designer's Guide To the HCS08 Microcontrollers
- Head First C
I
- Internet Cryptography 1st Edition
- Internet of Things Manifest
- Internet of Things Manifest: Das Handbuch zur digitalen Weltrevolution
- Internet-of-Things (IoT) Systems: Architectures, Algorithms, Methodologies
- IoT Hackers Handbook
- IoT Penetration Testing Cookbook
- IoT-Hacking Sicherheitslücken im Internet der Dinge erkennen und schließen
- IoT-Hacking: Sicherheitslücken im Internet der Dinge erkennen und schließen
- IoTNOW 02-03/2016
- IX Magazin für professionelle Informationstechnik 3/2021
- IX Magazin für professionelle Informationstechnik 5/2021
- IX Magazin für professionelle Informationstechnik 8/2020
J
M
- Malware Analysis Techniques: Tricks for the triage of adversarial software 1st Edition
- Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code 1st Edition
- Memory Allocation Problems in Embedded Systems
- Metasploit - The Penetration Tester's Guide
- MicroPython for the Internet of Things: A Beginner’s Guide to Programming with Python on Microcontrollers
- MicroPython Projects
- Mobile App Testing
- Mobile Hacking: Ein kompakter Einstieg ins Penetration Testing mobiler Applikationen - iOS, Android und Windows Mobile
- MySQL for the Internet of Things
P
R
S
- Secure Coding in C and C++, Second Edition
- Secure Smart Embedded Devices, Platforms and Applications
- Securing Docker: The Attack and Defense Way
- Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations
- Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
- Security Testing with Raspberry Pi
- Smart Home Hacks
- SmartHome Hacks Hausautomatisierung selber machen
- Social Engineering: The Science of Human Hacking, 2nd Edition
- Softwareentwicklung in C für Mikroprozessoren und Mikrocontroller, 4. Auflage
- Softwareentwicklung in C für Mikroprozessoren und Mikrocontroller, 7. Auflage
- Sprechen Sie Java?: Eine Einführung in das systematische Programmieren, 5. Auflage
T
- Test-Driven Development: A Practical Guide
- The Amazon Way on IoT: 10 Principles for Every Leader from the World's Leading Internet of Things Strategies
- The Art of Deception: Controlling the Human Element of Security
- The Car Hacker's Handbook: A Guide for the Penetration Tester
- The definitive guide to ARM Cortex-M0 and Cortex-M0+ ProcessorsThe Definitive Guide to Arm® Cortex®-M0 and Cortex-M0+ Processors, Second Edition
- The Gameduino 2
- The Hacker Playbook 1
- The Hacker Playbook 2
- The Hacker Playbook 3
- The Hardware Hacker
- The Internet of Things: Enabling Technologies, Platforms, and Use Cases 1st Edition
- The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
- The Silent Intelligence: The Internet of Things
- Threat Modeling: Designing for Security
- Train the Trainer