A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure
Key Features
Advanced exploitation techniques to breach modern operating systems and complex network devices
Take your Python machine learning ideas and create serverless web applications accessible by anyone with an Internet connection. Some of the most popular serverless cloud providers are covered in this book?Amazon, Microsoft, Google, and PythonAnywhere.
You will work through a series of common Python data science problems...
Examine business problems and use a practical analytical approach to solve them by implementing predictive models and machine learning techniques using SAS and the R analytical language.
This book is ideal for those who are well-versed in writing code and have a basic understanding of statistics, but have limited...
Gain a clear understanding of the most important concepts in the decoupled CMS landscape. You will learn how to architect and implement decoupled Drupal architectures across the stack?from building the back end and designing APIs to integrating with front-end technologies. You'll also review presenting data through consumer...