<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://nostarch.com/taxonomy/term/5/pf3" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Hacking &amp;amp; Computer Security</title>
    <link>https://nostarch.com/taxonomy/term/5/pf3</link>
    <description></description>
    <language>en</language>
     <atom:link href="https://nostarch.com/taxonomy/term/5/pf3/feed" rel="self" type="application/rss+xml" />
      <item>
    <title>From Day Zero to Zero Day</title>
    <link>https://nostarch.com/zero-day</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/zero-day&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/ZeroDay_placeholder.png?itok=Cmg5Yqir&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;From Day Zero to Zero Day placeholder cover&quot; title=&quot;From Day Zero to Zero Day placeholder cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Eugene Lim&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt; &lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 18 Jun 2024 16:44:20 +0000</pubDate>
 <dc:creator>CMason</dc:creator>
 <guid isPermaLink="false">797 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Microcontroller Exploits</title>
    <link>https://nostarch.com/microcontroller-exploits</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/microcontroller-exploits&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/MicrocontrollerExploits_frontcover.png?itok=cmaNghjD&quot; width=&quot;159&quot; height=&quot;225&quot; alt=&quot;Microcontroller Exploits cover&quot; title=&quot;Microcontroller Exploits cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Travis Goodspeed&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;font-family:Roboto,sans-serif&quot;&gt;&lt;span style=&quot;color:#000000&quot;&gt;A deep dive into advanced hardware hacking with detailed examples of real-world techniques and a comprehensive survey of vulnerabilities.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;
 &lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 01 May 2024 16:24:42 +0000</pubDate>
 <dc:creator>Sdevos</dc:creator>
 <guid isPermaLink="false">788 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Serious Cryptography, 2nd Edition</title>
    <link>https://nostarch.com/serious-cryptography-2nd-edition</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/serious-cryptography-2nd-edition&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/SeriousCryptography2e_frontcover.png?itok=2AFD540W&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Serious Cryptography, 2nd Edition placeholder cover&quot; title=&quot;Serious Cryptography, 2nd Edition placeholder cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Jean-Philippe Aumasson&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;h4&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;font-family:Arial,sans-serif&quot;&gt;&lt;span style=&quot;color:#000000&quot;&gt;&lt;span style=&quot;background-color:#ffffff&quot;&gt;&lt;em&gt;Serious Cryptography&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;font-family:Arial,sans-serif&quot;&gt;&lt;span style=&quot;color:#333333&quot;&gt;&lt;span style=&quot;background-color:#ffffff&quot;&gt;, 2nd edition, is a practical guide to the past, present, and future of cryptographic systems and algorithms.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 23 Feb 2024 17:06:40 +0000</pubDate>
 <dc:creator>sarah.devos</dc:creator>
 <guid isPermaLink="false">785 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Cybersecurity Tabletop Exercises</title>
    <link>https://nostarch.com/cybersecurity-tabletop-exercises</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/cybersecurity-tabletop-exercises&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/CybersecutiryTabletopExercises_frontcover.png?itok=kpHzLSXv&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Cybersecurity Tabletop Exercises cover&quot; title=&quot;Cybersecurity Tabletop Exercises cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Robert Lelewski and John Hollenberger&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 23 Feb 2024 16:57:51 +0000</pubDate>
 <dc:creator>sarah.devos</dc:creator>
 <guid isPermaLink="false">784 at https://nostarch.com</guid>
  </item>
  <item>
    <title>The Art of Mac Malware, Volume 2</title>
    <link>https://nostarch.com/mac-malware-detection</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/mac-malware-detection&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/ArtMacMalwarev2_frontcover.png?itok=yC6y7p3e&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;The Art of Mac Malware, Volume 2 placeholder cover&quot; title=&quot;The Art of Mac Malware, Volume 2 placeholder cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Patrick Wardle&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;This first-of-its-kind guide to detecting stealthy Mac malware gives you the tools and techniques to counter even the most sophisticated threats targeting the Apple ecosystem.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Wed, 02 Aug 2023 16:37:14 +0000</pubDate>
 <dc:creator>No Starch Press</dc:creator>
 <guid isPermaLink="false">778 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Black Hat Bash</title>
    <link>https://nostarch.com/black-hat-bash</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/black-hat-bash&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/BlackHatBash_frontcover.png?itok=OR-g4wKU&quot; width=&quot;168&quot; height=&quot;225&quot; alt=&quot;Black Hat Bash cover&quot; title=&quot;Black Hat Bash cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Dolev Farhi, Nick Aleks&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Fri, 28 Jul 2023 16:19:35 +0000</pubDate>
 <dc:creator>briana.blackwell</dc:creator>
 <guid isPermaLink="false">777 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Engineering Secure Devices</title>
    <link>https://nostarch.com/engineering-secure-devices</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/engineering-secure-devices&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/EngineeringSecureDevices_frontcover.png?itok=-CSItHq5&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Engineering Secure Devices cover&quot; title=&quot;Engineering Secure Devices cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Dominik Merli&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;An essential resource for current and future developers tasked with protecting users from the potential threats of these ubiquitous devices.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 10 Jul 2023 20:12:14 +0000</pubDate>
 <dc:creator>No Starch Press</dc:creator>
 <guid isPermaLink="false">768 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Windows Security Internals</title>
    <link>https://nostarch.com/windows-security-internals</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/windows-security-internals&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/WindowsSecurityInternals_placeholder.png?itok=tLx_7Tfn&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Windows Security Internals placeholder cover&quot; title=&quot;Windows Security Internals placeholder cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;James Forshaw&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Power up your Windows security skills with expert guidance, in-depth technical insights, and lots of real-world vulnerability examples.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 10 Jul 2023 18:37:04 +0000</pubDate>
 <dc:creator>No Starch Press</dc:creator>
 <guid isPermaLink="false">763 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Evasive Malware</title>
    <link>https://nostarch.com/evasive-malware</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/evasive-malware&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/EvasiveMalware_CV_frontcover.png?itok=xUY1i1MW&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Evasive Malware Cover&quot; title=&quot;Evasive Malware Cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Kyle Cucci&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;font-family:Roboto,sans-serif&quot;&gt;&lt;span style=&quot;color:#000000&quot;&gt;The first-ever guide to analyzing malicious Windows software designed to avoid detection and forensic tools.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 07 Mar 2023 20:26:53 +0000</pubDate>
 <dc:creator>No Starch Press</dc:creator>
 <guid isPermaLink="false">746 at https://nostarch.com</guid>
  </item>
  <item>
    <title>The Android Malware Handbook</title>
    <link>https://nostarch.com/androidmalwarehandbook</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/androidmalwarehandbook&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/AndroidMalwareHanbook_cover.png?itok=l2U4dMJU&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;The Android Malware Handbook cover&quot; title=&quot;The Android Malware Handbook cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Qian Han, Salvador Mandujano, Sebastian Porst, V.S. Subrahmanian, Sai Deep Tetali, and Yanhai Xiong&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;An all-star guide to tackling the analysis and detection of malware that targets the Android operating system.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 06 Mar 2023 16:52:47 +0000</pubDate>
 <dc:creator>CMason</dc:creator>
 <guid isPermaLink="false">743 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Evading EDR</title>
    <link>https://nostarch.com/evading-edr</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/evading-edr&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/EvadingEDR_cover.png?itok=fZKYgSxh&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Evading EDR cover&quot; title=&quot;Evading EDR cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Matt Hand&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Mon, 06 Mar 2023 15:41:41 +0000</pubDate>
 <dc:creator>sarah.devos</dc:creator>
 <guid isPermaLink="false">741 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Black Hat GraphQL</title>
    <link>https://nostarch.com/black-hat-graphql</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/black-hat-graphql&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/BlackHatGraphQL_CV_F.png?itok=gafi6bTY&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Black Hat GraphQL Cover&quot; title=&quot;Black Hat GraphQL Cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Dolev Farhi, Nick Aleks&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;Written by hackers for hackers, this hands-on book shows how to identify vulnerabilities in apps that use GraphQL.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 26 Jul 2022 23:02:32 +0000</pubDate>
 <dc:creator>No Starch Press</dc:creator>
 <guid isPermaLink="false">718 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Metasploit, 2nd Edition</title>
    <link>https://nostarch.com/metasploit-2nd-edition</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/metasploit-2nd-edition&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/metasploit2e_frontcover.png?itok=bf14B__S&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Metasploit, 2nd Edition cover&quot; title=&quot;Metasploit, 2nd Edition cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt; David Kennedy, Mati Aharoni, Devon Kearns, Jim O’Gorman, and Daniel Graham&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;font-family:Arial&quot;&gt;&lt;span style=&quot;color:#000000&quot;&gt;The second edition of the international bestseller &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;font-family:Arial&quot;&gt;&lt;span style=&quot;color:#000000&quot;&gt;&lt;em&gt;Metasploit&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:10pt&quot;&gt;&lt;span style=&quot;font-family:Arial&quot;&gt;&lt;span style=&quot;color:#000000&quot;&gt; is written by some of the world’s best hackers and is the only introduction you’ll ever need to the legendary Framework. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 26 Jul 2022 22:43:40 +0000</pubDate>
 <dc:creator>No Starch Press</dc:creator>
 <guid isPermaLink="false">716 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Hacks, Leaks, and Revelations</title>
    <link>https://nostarch.com/hacks-leaks-and-revelations</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/hacks-leaks-and-revelations&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/HacksLeaksandRevelations_cover.png?itok=Vjrodloj&quot; width=&quot;172&quot; height=&quot;225&quot; alt=&quot;Hacks, Leaks, and Revelations cover&quot; title=&quot;Hacks, Leaks, and Revelations cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Micah Lee&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;&lt;span style=&quot;color:#000000; font-family:Roboto,sans-serif; font-size:10pt&quot;&gt;Learn the tools and develop the skills for uncovering big secrets hiding in public datasets.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Tue, 26 Jul 2022 22:34:54 +0000</pubDate>
 <dc:creator>No Starch Press</dc:creator>
 <guid isPermaLink="false">715 at https://nostarch.com</guid>
  </item>
  <item>
    <title>Codebreaking</title>
    <link>https://nostarch.com/codebreaking</link>
    <description>&lt;div class=&quot;field field-name-field-image-cache field-type-image field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;a href=&quot;/codebreaking&quot;&gt;&lt;img class=&quot;img-responsive&quot; src=&quot;https://nostarch.com/sites/default/files/styles/uc_product/public/Codebreaking_cover.png?itok=psZtK6XG&quot; width=&quot;170&quot; height=&quot;225&quot; alt=&quot;Codebreaking cover&quot; title=&quot;Codebreaking cover&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-field-author field-type-text field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;Elonka Dunin and Klaus Schmeh&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot;&gt;&lt;div class=&quot;field-items&quot;&gt;&lt;div class=&quot;field-item even&quot;&gt;&lt;p&gt;A tour through history’s real codes and ciphers written by two of today’s best cipher crackers.&lt;/p&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description>
     <pubDate>Thu, 10 Mar 2022 16:22:31 +0000</pubDate>
 <dc:creator>Morgan Vega</dc:creator>
 <guid isPermaLink="false">687 at https://nostarch.com</guid>
  </item>
  </channel>
</rss>
