Category:Literature
Jump to navigation
Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.
This page contains books and magazines, which you can lend from ElvisLab.
Pages in category "Literature"
The following 109 pages are in this category, out of 109 total.
A
- A Short Course in Discrete Mathematics
- Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
- Advanced Penetration Testing - Hacking IoT
- Android User 08/2013
- Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd Edition
- AWS Certified Solutions Architect Official Study Guide
B
C
- C't Make 5/2019 magazine
- C't Make 6/2019 magazine
- C't Make: 02/18 magazine
- C't Make: 02/18 Magazine
- C't Security 2018 magazine
- Click Here to Kill Everybody: Security and Survival in a Hyper-connected World
- Computernetze und Internet-of-Things
- Coole Projekte mit Raspberry Pi
- Cracking Codes with Python: Introduction to Building and Breaking Ciphers
- Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design 1st Edition
- Cryptography for Developers
- Cryptography in C and C++ 1st Edition
E
H
- Hacking - The Art of Exploitation - 2nd Edition
- Hacking for Beginners
- Hacking Internet of Things: Bluetooth Low Energy
- Hacking mit Python: Fehlersuche, Programmanalyse, Reverse Engineering
- Hands-On Mobile App Testing: A Guide for Mobile Testers and Anyone Involved in the Mobile App Business
- Hardware Security - A Hands-On Approach
- Hash Crack: Password Cracking Manual (v3)
- Hausautomation mit Raspberry Pi
- HCS08 Unleashed: Designer's Guide To the HCS08 Microcontrollers
- Head First C
I
- Internet Cryptography 1st Edition
- Internet of Things Manifest
- Internet of Things Manifest: Das Handbuch zur digitalen Weltrevolution
- Internet-of-Things (IoT) Systems: Architectures, Algorithms, Methodologies
- IoT Hackers Handbook
- IoT Penetration Testing Cookbook
- IoT-Hacking Sicherheitslücken im Internet der Dinge erkennen und schließen
- IoT-Hacking: Sicherheitslücken im Internet der Dinge erkennen und schließen
- IoTNOW 02-03/2016
- IX Magazin für professionelle Informationstechnik 3/2021
- IX Magazin für professionelle Informationstechnik 5/2021
- IX Magazin für professionelle Informationstechnik 8/2020
J
M
- Malware Analysis Techniques: Tricks for the triage of adversarial software 1st Edition
- Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code 1st Edition
- Memory Allocation Problems in Embedded Systems
- Metasploit - The Penetration Tester's Guide
- MicroPython for the Internet of Things: A Beginner’s Guide to Programming with Python on Microcontrollers
- MicroPython Projects
- Mobile App Testing
- Mobile Hacking: Ein kompakter Einstieg ins Penetration Testing mobiler Applikationen - iOS, Android und Windows Mobile
- MySQL for the Internet of Things
P
R
S
- Secure Coding in C and C++, Second Edition
- Secure Smart Embedded Devices, Platforms and Applications
- Securing Docker: The Attack and Defense Way
- Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations
- Security Automation with Ansible 2: Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
- Security Testing with Raspberry Pi
- Smart Home Hacks
- SmartHome Hacks Hausautomatisierung selber machen
- Social Engineering: The Science of Human Hacking, 2nd Edition
- Softwareentwicklung in C für Mikroprozessoren und Mikrocontroller, 4. Auflage
- Softwareentwicklung in C für Mikroprozessoren und Mikrocontroller, 7. Auflage
- Sprechen Sie Java?: Eine Einführung in das systematische Programmieren, 5. Auflage
T
- Test-Driven Development: A Practical Guide
- The Amazon Way on IoT: 10 Principles for Every Leader from the World's Leading Internet of Things Strategies
- The Art of Deception: Controlling the Human Element of Security
- The Car Hacker's Handbook: A Guide for the Penetration Tester
- The definitive guide to ARM Cortex-M0 and Cortex-M0+ ProcessorsThe Definitive Guide to Arm® Cortex®-M0 and Cortex-M0+ Processors, Second Edition
- The Gameduino 2
- The Hacker Playbook 1
- The Hacker Playbook 2
- The Hacker Playbook 3
- The Hardware Hacker
- The Internet of Things: Enabling Technologies, Platforms, and Use Cases 1st Edition
- The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
- The Silent Intelligence: The Internet of Things
- Threat Modeling: Designing for Security
- Train the Trainer