All bookmarks1122 Python 69 Misc 48 Java 38 Algorithms & Data Structures 33 JavaScript 33 Linux 32 Mathematics 27 Software Architecture 27 Meta-Lists 25 Machine Learning 23 SQL Server 23 Perl 22 Ruby 21 C++ 20 Lisp 20 Prolog 19 Git 18 Scala 18 Haskell 17 C 16 Force.com 15 PHP 15 HTML / CSS 14 R 14 Open Source Ecosystem 13 Theoretical Computer Science 13 Assembly Language 13 Graphics Programming 12 Clojure 12 J 12 MATLAB 12 Compiler Design 10 Operating systems 10 Android 10 Go 10 NoSQL 10 Ruby on Rails 10 Parallel Programming 9 .NET Framework 9 Datamining 8 Bash 8 Django 8 Scheme 8 Vim 8 Networking 7 Professional Development 7 C Sharp 7 Security 6 Ada 6 Forth 6 Node.js 6 OCaml 6 Graphical User Interfaces 5 Database 5 MOOC 5 Basic 5 Erlang 5 Mathematica 5 Objective-C 5 Smalltalk 5 SQL (implementation agnostic) 5 Windows Phone 5 Information Retrieval 4 Non-X86 4 F Sharp 4 LaTeX 4 Maven 4 PowerShell 4 Lift 4 TeX 4 Unix 4 VHDL 4 APL 3 Awk 3 CoffeeScript 3 DB2 3 Emacs 3 Gradle 3 Grails 3 iOS 3 Lua 3 Flask 3 Racket 3 Scilab 3 xBase (dBase / Clipper / Harbour) 3 Cellular Automata 2 Cloud Computing 2 Licensing 2 Programming Paradigms 2 Regular Expressions 2 Reverse Engineering 2 Web Performance 2 Arduino 2 Autotools 2 Chapel 2 COBOL 2 ColdFusion 2 Coq 2 D 2 Elasticsearch 2 Flex 2 Fortran 2 FreeBSD 2 Spock Framework 2 Hadoop 2 IDL 2 Isabelle/HOL 2 Mercurial 2 MySQL 2 Oberon 2 OpenMP 2 Oracle PL/SQL 2 Parrot / Perl 6 2 PicoLisp 2 PostgreSQL 2 Rust 2 Sage 2 Play Scala 2 Subversion 2 Swift 2 Tcl 2 TypeScript 2 Visual Prolog 2 Windows 8 2 Partial Evaluation 1 Standards 1 Agda 1 Alef 1 ASP.NET MVC 1 AutoHotkey 1 BETA 1 Cilk 1 Cool 1 Dart 1 Delphi / Pascal 1 DTrace 1 Firefox OS 1 Bootstrap 1 Icon 1 Spring 1 Spring Boot 1 Spring Security 1 Wicket 1 Javascript Frameworks 1 Jenkins 1 Limbo 1 Markdown 1 Mercury 1 Neo4J 1 Octave 1 OpenGL ES 1 OpenSCAD 1 Oracle Server 1 PC-BSD 1 Processing 1 Constraint Logic Programming (extended Prolog) 1 PureScript 1 Kivy 1 Pandas 1 Pyramid 1 QML 1 Raspberry Pi 1 REBOL 1 RSpec 1 Sinatra 1 Scratch 1 Sed 1 Silverlight 1 Standard ML 1 Teradata 1 Tizen 1 TLA 1 Verilog 1 Visual Basic 1 Web Services 1 Workflow 1

More Free Programming Books: Security search results:

Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It
The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S.
Advice from a Real Hacker: How to Create Stronger Passwords
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me.
The Secret Life of Passwords
Howard Lutnick, the chief executive of Cantor Fitzgerald, one of the world’s largest financial-services firms, still cries when he talks about it.
The Internet’s Telltale Heartbleed
The cryptography expert Bruce Schneier, who has been writing about computer security for more than fifteen years, is not given to panic or hyperbole.
How Russian Hackers Stole the Nasdaq
In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert. The signal was coming from Nasdaq (NDAQ). It looked like malware had snuck into the company’s central servers.
Everything Is Broken
Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piece of software and started playing with it. In the process, he figured out how to get total administration access over a network.
Inside The Billion-Dollar Hacker Club
For this group of old friends, assembled for an impromptu reunion, the venue would feel familiar: an online chat room running on a secure private server.
Secrets, lies and Snowden's email: why I was forced to shut down Lavabit
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company's network.
The Ultra-Simple App That Lets Anyone Encrypt Anything
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.