> Skip to content
Cracking Codes With Python
Cracking Codes With Python AL SWEIGART
In Cracking Codes with Python, you’ll learn how to program in Python while making and breaking ciphers, which are used to encrypt secret messages. (No programming experience required!).
Read More
The Lego Architecture Idea Book
The Lego Architecture Idea Book Alice Finch
Take your creations to the next level with The LEGO Architecture Idea Book! These clever building tips will give you endless inspiration for making your own amazing mansions, castles, houses, spooky shacks, and more.
Read More
The Manga Guide To Cryptography
The Manga Guide To Cryptography Masaaki Mitani, Shinichi Sato, Idero Hinoki
Cryptography is hard but it’s less hard when it’s filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English.
Read More
Practical SQL
Practical SQL Anthony DeBarros
Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as its primary tools.
Read More
20 Easy Raspberry Pi Projects
20 Easy Raspberry Pi Projects Rui Santos, Sara Santos
Twenty projects using the Raspberry Pi, a tiny and affordable computer, for beginners looking to make cool things right away. Projects are explained with full-color visuals and simple step-by-step instructions.
Read More
Pentesting Azure
Pentesting Azure Matt Burrough
A comprehensive guide to penetration testing cloud services deployed with Microsoft Azure, the popular cloud computing service provider used by companies like Warner Brothers and Apple.
Read More
Real-World Bug Hunting
Real-World Bug Hunting Peter Yaworkski
Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications.
Read More
Load more