Quantum Computing
A friendly introduction to quantum programming.
A friendly introduction to quantum programming.
How real engineers build electronics—one working piece at a time.
Build your own 3D solutions from 28 basic bricks. So many "Aha!" moments.
When Excel isn’t enough, it’s time to learn Python.
You know how to write Python. Now master the computer science that makes it work.
Learn to write real Linux software—not just run it.
This practical introduction to collaborative security testing, or “purple teaming,” is a hands-on, lab-based guide to key methodologies for cybersecurity practitioners in any field.
This companion to the bestselling Automate the Boring Stuff with Python (500,000+ copies sold) provides hundreds of hands-on exercises to reinforce core material.
A comprehensive tutorial on programming in assembly using the iconic Game Boy, teaching the basics of computer science in a fun and engaging way.
Building on two successful editions (135,000 copies sold), this book adds essential updates to a title considered the Rust programming language’s official documentation.
This long-awaited second edition folds years of updates into its beginner-friendly lessons on using R for data and statistical analysis.
Learn the ins and outs of Wi-Fi, Bluetooth, and Long Range wireless technologies through practical, step-by-step projects using Raspberry Pi and other inexpensive hardware.
A complete guide to deep neural networks – the technology behind AI – covering fundamental and advanced techniques to apply machine learning in real-world scenarios.
This exhaustive guide to the Linux memory subsystem is the first major resource since 2004 to cover key concepts and essential techniques for developers.
Learn how to build a web app that can monitor millions of posts across social media to chart public opinion in real time.
Build a more secure network with PF.
Everything you need to know to build a TypeScript product from scratch.
A comprehensive, hacker-written guide for security professionals looking to plan and implement real-world penetration testing, or “red team,” operations.
A technical exploration of the malicious software bought and sold on the dark web, where bad actors offer malware-as-a-service (MaaS) to the highest bidders.