mirror of
https://github.com/EbookFoundation/free-programming-books.git
synced 2024-12-18 17:36:14 +00:00
Compare commits
5 Commits
e941957d02
...
f56d92d57d
Author | SHA1 | Date | |
---|---|---|---|
|
f56d92d57d | ||
|
2d1bd6bf03 | ||
|
1e86318ce2 | ||
|
9b5ad16aab | ||
|
0b0b75614a |
@ -868,6 +868,7 @@ Kerridge (PDF) (email address *requested*, not required)
|
|||||||
* [Crypto 101 - Crypto for everyone](https://www.crypto101.io)
|
* [Crypto 101 - Crypto for everyone](https://www.crypto101.io)
|
||||||
* [Cryptography](https://en.wikibooks.org/wiki/Cryptography) - Wikibooks (HTML) *(:construction: in process)*
|
* [Cryptography](https://en.wikibooks.org/wiki/Cryptography) - Wikibooks (HTML) *(:construction: in process)*
|
||||||
* [CryptoParty Handbook](https://unglue.it/work/141611/)
|
* [CryptoParty Handbook](https://unglue.it/work/141611/)
|
||||||
|
* [Fuzzing Book](https://www.fuzzingbook.org) - Andreas Zeller, Rahul Gopinath, Marcel Böhme, Gordon Fraser, Christian Holler (HTML)
|
||||||
* [Gray Hat Hacking: The Ethical Hacker's Handbook](https://pages.cs.wisc.edu/~ace/media/gray-hat-hacking.pdf) - Allen Harper, Jonathan Ness, Chris Eagle, Shon Harris, Gideon Lenkey, Terron Williams (PDF)
|
* [Gray Hat Hacking: The Ethical Hacker's Handbook](https://pages.cs.wisc.edu/~ace/media/gray-hat-hacking.pdf) - Allen Harper, Jonathan Ness, Chris Eagle, Shon Harris, Gideon Lenkey, Terron Williams (PDF)
|
||||||
* [Handbook of Applied Cryptography](https://cacr.uwaterloo.ca/hac/index.html)
|
* [Handbook of Applied Cryptography](https://cacr.uwaterloo.ca/hac/index.html)
|
||||||
* [How HTTPS works](https://howhttps.works) - dnsimple
|
* [How HTTPS works](https://howhttps.works) - dnsimple
|
||||||
@ -945,6 +946,7 @@ Kerridge (PDF) (email address *requested*, not required)
|
|||||||
* [Category Theory for Programmers](https://github.com/hmemcpy/milewski-ctfp-pdf) - Bartosz Milewski (PDF)
|
* [Category Theory for Programmers](https://github.com/hmemcpy/milewski-ctfp-pdf) - Bartosz Milewski (PDF)
|
||||||
* [Delftse Foundations of Computation](https://textbooks.open.tudelft.nl/textbooks/catalog/book/13) - Stefan Hugtenburgand, Neil Yorke-Smith @ TU Delft Open (PDF)
|
* [Delftse Foundations of Computation](https://textbooks.open.tudelft.nl/textbooks/catalog/book/13) - Stefan Hugtenburgand, Neil Yorke-Smith @ TU Delft Open (PDF)
|
||||||
* [Homotopy Type Theory: Univalent Foundations of Mathematics](https://homotopytypetheory.org/book/) (PDF)
|
* [Homotopy Type Theory: Univalent Foundations of Mathematics](https://homotopytypetheory.org/book/) (PDF)
|
||||||
|
* [Introduction to Theoretical Computer Science](https://files.boazbarak.org/introtcs/lnotes_book.pdf) - Boaz Barak (PDF)
|
||||||
* [Introduction to Theory of Computation](https://cglab.ca/~michiel/TheoryOfComputation/) - Anil Maheshwari, Michiel Smid (PDF)
|
* [Introduction to Theory of Computation](https://cglab.ca/~michiel/TheoryOfComputation/) - Anil Maheshwari, Michiel Smid (PDF)
|
||||||
* [Models of Computation](https://cs.brown.edu/people/jes/book/) - John E. Savage
|
* [Models of Computation](https://cs.brown.edu/people/jes/book/) - John E. Savage
|
||||||
* [Principles of Programming Languages](https://web.archive.org/web/20150418034451/http://www.cs.jhu.edu/~scott/pl/book/dist/) - Scott F. Smith *(:card_file_box: archived)*
|
* [Principles of Programming Languages](https://web.archive.org/web/20150418034451/http://www.cs.jhu.edu/~scott/pl/book/dist/) - Scott F. Smith *(:card_file_box: archived)*
|
||||||
|
@ -57,13 +57,18 @@
|
|||||||
### Capture the flag
|
### Capture the flag
|
||||||
|
|
||||||
* [ångstromCTF](https://angstromctf.com)
|
* [ångstromCTF](https://angstromctf.com)
|
||||||
|
* [Attack Defense](https://attackdefense.com) (email address *requested*)
|
||||||
|
* [CryptoHack](https://cryptohack.org) (email address *requested*)
|
||||||
|
* [Cmd Challenge](https://cmdchallenge.com)
|
||||||
* [CTFlearn](https://ctflearn.com) (email address *requested*)
|
* [CTFlearn](https://ctflearn.com) (email address *requested*)
|
||||||
* [CTFtime](https://ctftime.org)
|
* [CTFtime](https://ctftime.org)
|
||||||
* [DamnVulnerableDefi](https://www.damnvulnerabledefi.xyz)
|
* [DamnVulnerableDefi](https://www.damnvulnerabledefi.xyz)
|
||||||
* [echoCTF](https://echoctf.red) (email address *requested*)
|
* [echoCTF](https://echoctf.red) (email address *requested*)
|
||||||
|
* [Exploit Education](https://exploit.education)
|
||||||
* [Google CTF](https://capturetheflag.withgoogle.com) (email address *requested*)
|
* [Google CTF](https://capturetheflag.withgoogle.com) (email address *requested*)
|
||||||
* [Hacker101](https://ctf.hacker101.com) (email address *requested*)
|
* [Hacker101](https://ctf.hacker101.com) (email address *requested*)
|
||||||
* [Hackthebox](https://www.hackthebox.eu) (email address *requested*)
|
* [Hackthebox](https://www.hackthebox.eu) (email address *requested*)
|
||||||
|
* [Hacka Flag](https://hackaflag.com.br) (email address *requested*)
|
||||||
* [HackThisSite](https://www.hackthissite.org) (email address *requested*)
|
* [HackThisSite](https://www.hackthissite.org) (email address *requested*)
|
||||||
* [InCTF](https://inctf.in)
|
* [InCTF](https://inctf.in)
|
||||||
* [Microcorruption](https://microcorruption.com/login)
|
* [Microcorruption](https://microcorruption.com/login)
|
||||||
@ -71,8 +76,12 @@
|
|||||||
* [Picoctf](https://picoctf.org/resources.html) (email address *requested*)
|
* [Picoctf](https://picoctf.org/resources.html) (email address *requested*)
|
||||||
* [ringzer0ctf](https://ringzer0ctf.com/home) (email address *required*)
|
* [ringzer0ctf](https://ringzer0ctf.com/home) (email address *required*)
|
||||||
* [ROP Wargame Repository](https://github.com/xelenonz/game)
|
* [ROP Wargame Repository](https://github.com/xelenonz/game)
|
||||||
|
* [Root Me](https://www.root-me.org) (email address *required*)
|
||||||
* [SmashTheStack](http://www.smashthestack.org/main.html#wargames)
|
* [SmashTheStack](http://www.smashthestack.org/main.html#wargames)
|
||||||
* [TryHackMe](https://tryhackme.com) (email address *requested*)
|
* [TryHackMe](https://tryhackme.com) (email address *requested*)
|
||||||
|
* [Vulnhub](https://www.vulnhub.com)
|
||||||
|
* [W3Challs](https://w3challs.com) (email address *requested*)
|
||||||
|
* [Zenk Security](https://www.zenk-security.com) (email address *requested*)
|
||||||
|
|
||||||
|
|
||||||
### Data science
|
### Data science
|
||||||
|
Loading…
Reference in New Issue
Block a user