Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX.
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...
Discover best practices for data analysis and software development in R and start on the path to becoming a fully-fledged data scientist. This book teaches you techniques for both data manipulation and visualization and shows you the best way for developing new software packages for R.
Build GPU-accelerated high performing applications with Python 2.7, CUDA 9, and open source libraries such as PyCUDA and scikit-cuda. We recommend the use of Python 2.7 as this version has stable support across all libraries used in this book.
Learn everything you need to master the AdonisJs framework, including topics such as interacting with a database, rendering templates, writing asynchronous code, and hosting sites with SSL. Along the way, you’ll see how to build a commerce application, which lists products and allows shoppers to register and purchase those...
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Learn how to make an impact in the web world. This short book shows you that the best way to become an expert and a thought leader is to thoroughly research a topic and then publish a book on it.
The great thing about writing a book is that you don’t have to risk anything - all you need is a few hours of...
This book discusses how sediments compact with depth and applications of the compaction trends. Porosity reduction in sediment conveniently indicates the degree of sediments compacted after deposition. Published empirical curves- the compaction curves- are depth-wise porosity variation through which change in pore spaces from sediment surface to...