A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure
Key Features
Advanced exploitation techniques to breach modern operating systems and complex network devices
Learn to build Rails-based web applications using all the latest features offered in Rails 5.2. Author Stefan Wintermeyer begins by teaching the basics of Ruby 2.5 before proceeding through all aspects of Rails, utilizing clean, succinct examples – rather than a single large...
This book focuses on the application of ionic liquids in flow assurance in the oil and gas industry. It discusses their physiochemical properties, and considers the role of ionic liquids as gas hydrate inhibitors in offshore pipelines.
Gas hydrate occurrence can pose a major threat to pipeline integrity. Therefore, different...
This book introduces you to the world of data science. It reveals the proper way to do data science. It covers essential statistical and programming techniques to help you understand data science from a broad perspective. Not only that, but it provides a theoretical, technical, and mathematical foundation for problem-solving using data...
An examination of how curriculum choices can perpetuate White supremacy, and radical strategies for how schools and teacher education programs can disrupt and transform racism in education
When racist curriculum “goes viral” on social media, it is typically dismissed as an isolated incident from a...
Summary
The best way to learn microservices development is to build something! Bootstrapping Microservices with Docker, Kubernetes, and Terraform guides you from zero through to a complete microservices project, including fast prototyping, development, and deployment. You’ll get your feet wet using...
This detailed volume focuses on the CRISPR-associated guide RNA and how it can be designed, modified, and validated for a broad repertoire of purposes. Beginning with a section on computational design of target-specific guide RNAs, the book continues by covering chemical modifications to alter guide RNA stability, specificity, and...
Deploy deep learning applications into production across multiple platforms. You will work on computer vision applications that use the convolutional neural network (CNN) deep learning model and Python. This bookstarts by explaining the traditional machine-learning pipeline, where you will...