Social Media

Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” –Brett …

Learn more

Interdisciplinary Interaction Design: A Visual Guide to Basic Theories, Models and Ideas for Thinking and Designing for Interactive Web Design and Digital Device Experiences

Interaction design has many dimensions to it. It addresses how people deal with words, read images, explore physical space, think about time and motion, and how actions and responses affect human behavior. Various disciplines make up interaction design, such as industrial design, cognitive psychology, user interface design and many others. It is my hope that this book is …

Learn more

Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker’s Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy …

Learn more

Test-Driven Development with Python

By taking you through the development of a real web application from beginning to end, this hands-on guide demonstrates the practical advantages of test-driven development (TDD) with Python. You’ll learn how to write and run tests before building each part of your app, and then develop the minimum amount of code required to pass those tests. The result? …

Learn more

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber …

Learn more

eBay For Dummies

The leading guide for eBay buyers and sellers, updated to give you all the essentials for buying and selling on eBay More than 112 million people regularly use eBay. To find the best deals and make the best profits, you need the guidance in this book from eBay expert Marsha Collier! With more than half a million copies …

Learn more

Advanced Google AdWords

The ultimate guide to Google AdWords is fully updated for its third editionThis is the ultimate guide for those who want to quickly get beyond AdWords basics to learn and apply the advanced techniques and tactics that are used by Fortune 500 companies. The book provides insight into AdWords’ functionality and advanced features, explaining how they work and …

Learn more

Hatching Twitter: A True Story of Money, Power, Friendship, and Betrayal

A New York Times bestsellerEv told Jack he had to “chill out” with the deluge of media he was doing. “It’s bad for the company,” Ev said. “It’s sending the wrong message.” Biz sat between them, watching like a spectator at a tennis match. “But I invented Twitter,” Jack said. “No, you didn’t invent Twitter,” Ev replied. “I didn’t invent Twitter either. …

Learn more

CSS: The Missing Manual

CSS lets you create professional-looking websites, but learning its finer points can be tricky—even for seasoned web developers. This fully updated edition provides the most modern and effective tips, tricks, and tutorial-based instruction on CSS available today. Learn how to use new tools such as Flexbox and Sass to build web pages that look great and run fast …

Learn more