Singh, Manish, Kumar, Dr. Balraj, Arora, Dr. Mohit
This book offers a comprehensive guide to MicroPython programming, covering both the fundamentals and advanced concepts. It begins with a solid foundation in MicroPython, enabling readers to understand its core principles, syntax, and structure. The book delves deep into the implementation of MicroPython on various IoT platforms such as the ESP8266/ESP32, Micro: bit, and Raspberry Pi. Each chapter provides step-by-step instructions for programming and integrating sensors and actuators, allowing readers to create real-world IoT applications. The book emphasizes the importance of hands-on...
This book offers a comprehensive guide to MicroPython programming, covering both the fundamentals and advanced concepts. It begins with a solid founda...
Dive into the intricate world of Capture the Flag (CTF) challenges with this comprehensive guide that goes beyond basic security testing. Written with both humour and expertise, this book transforms you from a challenge-taker to a masterful challenge-creator. Drawing from real-world experience across four countries and countless security scenarios, the authors share invaluable insights into crafting engaging, educational, and meaningful CTF challenges. You'll learn how to design scenarios that teach while they test, create compelling narratives that enhance the learning experience, and build...
Dive into the intricate world of Capture the Flag (CTF) challenges with this comprehensive guide that goes beyond basic security testing. Written with...
This book transforms the Raspberry Pi into a portable cybersecurity lab, guiding readers through practical ethical hacking projects. It covers network scanning, Wi-Fi hacking, web application testing, and IoT security using open-source tools. Designed for both beginners and professionals, the book emphasizes hands-on learning and responsible hacking practices.What You'll Learn:Set up your own portable penetration testing lab using a Raspberry Pi and open-source tools;Perform network scanning, wireless hacking, and web vulnerability testing;Automate cybersecurity tasks with Python scripts and...
This book transforms the Raspberry Pi into a portable cybersecurity lab, guiding readers through practical ethical hacking projects. It covers network...
This second edition builds upon the success of the original by expanding into advanced applications, smarter integrations, and broader hardware support. Whether you're working with the ESP32, Raspberry Pi Pico, or other microcontrollers, this book provides a practical guide to designing intelligent, connected systems using MicroPython.With step-by-step tutorials, real-world use cases, and hands-on projects, you'll explore how to interface with sensors, manage data, and communicate over wireless protocols, all through efficient and readable Python code. New chapters cover cloud connectivity,...
This second edition builds upon the success of the original by expanding into advanced applications, smarter integrations, and broader hardware suppor...
This book is your step-by-step guide to designing and exploiting custom Capture the Flag (CTF) environments. From Windows and Linux labs to mobile, wireless, and crypto challenges, you'll craft realistic targets, weaponize vulnerabilities, and chain exploits like a pro. Using Kali Linux, Metasploit, Nmap, and custom scripts, you'll master both the art of CTF design and the tactics of advanced offensive security. Perfect for red teamers, penetration testers, and cyber range builders.More than just a hacking manual, this is a blueprint for creating scalable, reusable CTF ranges that sharpen...
This book is your step-by-step guide to designing and exploiting custom Capture the Flag (CTF) environments. From Windows and Linux labs to mobile, wi...
In today's rapidly evolving threat landscape, organizations face an overwhelming flood of logs, alerts, and potential security incidents. Security Information and Event Management (SIEM) provides the visibility, correlation, and intelligence needed to transform raw data into actionable security insights. SIEM Essentials: Building Your First Security Monitoring System is your step-by-step guide to understanding, deploying, and optimizing SIEM solutions. Written for students, IT professionals, and security practitioners, this book offers a clear roadmap to mastering the foundations of SIEM and...
In today's rapidly evolving threat landscape, organizations face an overwhelming flood of logs, alerts, and potential security incidents. Security Inf...
Singh, Manish, Kumar, Dr. Balraj, Arora, Dr. Mohit
Ce livre propose un guide complet de la programmation en MicroPython, couvrant à la fois les principes fondamentaux et les concepts avancés. Il commence par une base solide de MicroPython, permettant aux lecteurs de comprendre ses principes fondamentaux, sa syntaxe et sa structure. Le livre approfondit l'implémentation de MicroPython sur diverses plateformes IoT telles que ESP8266/ESP32, Micro : bit et Raspberry Pi. Chaque chapitre fournit des instructions pas à pas pour la programmation et l'intégration de capteurs et d'actionneurs, permettant aux lecteurs de créer des applications IoT...
Ce livre propose un guide complet de la programmation en MicroPython, couvrant à la fois les principes fondamentaux et les concepts avancés. Il comm...
Singh, Manish, Kumar, Dr. Balraj, Arora, Dr. Mohit
Dieses Buch bietet einen umfassenden Leitfaden zur MicroPython-Programmierung, der sowohl die Grundlagen als auch fortgeschrittene Konzepte abdeckt. Es beginnt mit einer soliden Grundlage in MicroPython, die es dem Leser ermöglicht, die Kernprinzipien, die Syntax und die Struktur zu verstehen. Das Buch befasst sich eingehend mit der Implementierung von MicroPython auf verschiedenen IoT-Plattformen wie ESP8266/ESP32, Micro:bit und Raspberry Pi. Jedes Kapitel enthält Schritt-für-Schritt-Anleitungen zur Programmierung und Integration von Sensoren und Aktoren, die es dem Leser ermöglichen,...
Dieses Buch bietet einen umfassenden Leitfaden zur MicroPython-Programmierung, der sowohl die Grundlagen als auch fortgeschrittene Konzepte abdeckt. E...