All bookmarks1122 Python 69 Misc 48 Java 38 Algorithms & Data Structures 33 JavaScript 33 Linux 32 Mathematics 27 Software Architecture 27 Meta-Lists 25 Machine Learning 23 SQL Server 23 Perl 22 Ruby 21 Lisp 20 C++ 20 Prolog 19 Git 18 Scala 18 Haskell 17 C 16 Force.com 15 PHP 15 R 14 HTML / CSS 14 Assembly Language 13 Open Source Ecosystem 13 Theoretical Computer Science 13 Graphics Programming 12 MATLAB 12 Clojure 12 J 12 Android 10 Compiler Design 10 Go 10 NoSQL 10 Ruby on Rails 10 Operating systems 10 .NET Framework 9 Parallel Programming 9 Django 8 Vim 8 Datamining 8 Bash 8 Scheme 8 C Sharp 7 Networking 7 Professional Development 7 Forth 6 OCaml 6 Security 6 Node.js 6 Ada 6 Erlang 5 Graphical User Interfaces 5 Mathematica 5 Database 5 Basic 5 Objective-C 5 Windows Phone 5 MOOC 5 Smalltalk 5 SQL (implementation agnostic) 5 F Sharp 4 TeX 4 Non-X86 4 Maven 4 Unix 4 VHDL 4 Information Retrieval 4 Lift 4 PowerShell 4 LaTeX 4 APL 3 Lua 3 Flask 3 Awk 3 Gradle 3 Racket 3 Grails 3 xBase (dBase / Clipper / Harbour) 3 iOS 3 CoffeeScript 3 Scilab 3 DB2 3 Emacs 3 Swift 2 Tcl 2 Flex 2 Arduino 2 TypeScript 2 Cellular Automata 2 Fortran 2 Cloud Computing 2 FreeBSD 2 Mercurial 2 Autotools 2 MySQL 2 Visual Prolog 2 Licensing 2 Spock Framework 2 Hadoop 2 Oberon 2 Windows 8 2 Rust 2 Chapel 2 IDL 2 Sage 2 OpenMP 2 Isabelle/HOL 2 COBOL 2 Play Scala 2 Oracle PL/SQL 2 ColdFusion 2 Programming Paradigms 2 Parrot / Perl 6 2 Coq 2 Regular Expressions 2 D 2 Reverse Engineering 2 PicoLisp 2 PostgreSQL 2 Elasticsearch 2 Web Performance 2 Subversion 2 Constraint Logic Programming (extended Prolog) 1 Agda 1 Limbo 1 PureScript 1 Alef 1 Teradata 1 Firefox OS 1 Markdown 1 Tizen 1 ASP.NET MVC 1 TLA 1 Kivy 1 Pandas 1 Pyramid 1 AutoHotkey 1 Verilog 1 QML 1 Mercury 1 Visual Basic 1 Raspberry Pi 1 Neo4J 1 REBOL 1 BETA 1 Web Services 1 RSpec 1 Sinatra 1 Bootstrap 1 Workflow 1 Icon 1 Octave 1 Cilk 1 OpenGL ES 1 OpenSCAD 1 Partial Evaluation 1 Oracle Server 1 Spring 1 Cool 1 PC-BSD 1 Spring Boot 1 Scratch 1 Spring Security 1 Sed 1 Dart 1 Wicket 1 Silverlight 1 Delphi / Pascal 1 Standards 1 Javascript Frameworks 1 DTrace 1 Processing 1 Jenkins 1 Standard ML 1

More Free Programming Books: Security search results:

Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It
The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S.
Advice from a Real Hacker: How to Create Stronger Passwords
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me.
The Secret Life of Passwords
Howard Lutnick, the chief executive of Cantor Fitzgerald, one of the world’s largest financial-services firms, still cries when he talks about it.
The Internet’s Telltale Heartbleed
The cryptography expert Bruce Schneier, who has been writing about computer security for more than fifteen years, is not given to panic or hyperbole.
How Russian Hackers Stole the Nasdaq
In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert. The signal was coming from Nasdaq (NDAQ). It looked like malware had snuck into the company’s central servers.
Everything Is Broken
Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piece of software and started playing with it. In the process, he figured out how to get total administration access over a network.
Inside The Billion-Dollar Hacker Club
For this group of old friends, assembled for an impromptu reunion, the venue would feel familiar: an online chat room running on a secure private server.
Secrets, lies and Snowden's email: why I was forced to shut down Lavabit
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company's network.
The Ultra-Simple App That Lets Anyone Encrypt Anything
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.