Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python
Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python

Leverage the features and libraries of Python to administrate your environment efficiently.

Key Features

  • Learn how to solve problems of system administrators and automate routine activities
  • Learn to handle regular expressions, network administration
  • ...
Laravel: Up & Running: A Framework for Building Modern PHP Apps
Laravel: Up & Running: A Framework for Building Modern PHP Apps

What sets Laravel apart from other PHP web frameworks? Speed and simplicity, for starters. This rapid application development framework and its ecosystem of tools let you quickly build new sites and applications with clean, readable code. Fully updated to cover Laravel 5.8, the second edition of this practical guide...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Advances in Communication, Devices and Networking: Proceedings of ICCDN 2018 (Lecture Notes in Electrical Engineering (537))
Advances in Communication, Devices and Networking: Proceedings of ICCDN 2018 (Lecture Notes in Electrical Engineering (537))

The book covers recent trends in the field of devices, wireless communication and networking. It presents the outcomes of the International Conference in Communication, Devices and Networking (ICCDN 2018), which was organized by the Department of Electronics and Communication Engineering, Sikkim Manipal Institute of Technology,...

Data Analysis and Visualization Using Python: Analyze Data to Create Visualizations for BI Systems
Data Analysis and Visualization Using Python: Analyze Data to Create Visualizations for BI Systems
Look at Python from a data science point of view and learn proven techniques for data visualization as used in making critical business decisions. Starting with an introduction to data science with Python, you will take a closer look at the Python environment and get acquainted with editors such as...
How to Do Everything with Online Video
How to Do Everything with Online Video
You’re just in time. The online video revolution is under way. Yeah, yeah, I know. Another revolution. It seems like we have a new revolution every 18 months or so. And that’s why you’re just in time. This revolution is gaining momentum, establishing its foundations, and becoming focused. You know something is going on right in...
Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
International News Coverage and the Korean Conflict: The Challenges of Reporting Practices
International News Coverage and the Korean Conflict: The Challenges of Reporting Practices

This book explores journalism practices and the dynamics of international news media in Korea, and examines the ways in which Korean journalists and foreign correspondents cover news stories about the Korean conflict. It notably explores news gathering practices concerning the Korean conflict, and investigates factors that influence...

Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Making Sense of Data: Designing Effective Visualizations
Making Sense of Data: Designing Effective Visualizations

You have a mound of data sitting in front of you and a suite of computation tools at your disposal. And yet, you’re stumped as to how to turn that data into insight. Which part of that data actually matters, and where is this insight hidden?

If you’re a data scientist who struggles to navigate the murky space...

Business and Competitive Analysis: Effective Application of New and Classic Methods
Business and Competitive Analysis: Effective Application of New and Classic Methods

“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.”
--Bill Fiora, Partner and Founder, Outward Insights

  

Result Page: 22 21 20 19 18 17 16 15 14 13 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy