No Starch Press

The LEGO MINDSTORMS EV3 Idea Book: 181 Simple Machines and Clever Contraptions

The LEGO® MINDSTORMS® EV3 Idea Book explores dozens of creative ways to build amazing mechanisms with the LEGO MINDSTORMS EV3 set. Each model includes a list of the required parts, minimal text, and colorful photographs from multiple angles so you can re-create it without the need for step-by-step instructions.You’ll learn to build cars with real suspension, steerable crawlers, …

Learn more

Arduino Workshop: A Hands-On Introduction with 65 Projects

Learn the Basics, Build the Projects, Create Your OwnThe Arduino is a cheap, flexible, open source microcontroller platform designed to make it easy for hobbyists to use electronics in homemade projects. With an almost unlimited range of input and output add-ons, sensors, indicators, displays, motors, and more, the Arduino offers you countless ways to create devices that interact …

Learn more

The LEGO Technic Idea Book: Simple Machines

The LEGO® Technic Idea Book: Simple Machines is a collection of hundreds of working examples of simple yet fascinating Technic models that you can build based on their pictures alone. Each project uses color-coded pieces and is photographed from multiple angles, making …

Learn more

Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating …

Learn more

Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable …

Learn more

Android Security Internals: An In-Depth Guide to Android’s Security Architecture

“I honestly didn’t believe I’d learn much from the book because I’ve been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf.”—Jon “jcase” Sawyer, from the ForewordThere are more than one billion Android devices in use today, each one a …

Learn more

How Linux Works: What Every Superuser Should Know

Unlike some operating systems, Linux doesn’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.In this completely revised second edition of the perennial best seller How Linux …

Learn more

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With …

Learn more