Written for experienced systems administrators and engineers, this book teaches you from scratch how to configure Nginx for any situation. Step-by-step instructions and real-world code snippets clarify even the most complex areas.
An in-depth configuration guide to help you understand how to best...
Kinematic Analysis of Robot Manipulators
This text provides a first-level understanding of the structure, mobility, and analysis of serial manipulators. A serial manipulator is an unclosed or open movable polygon consisting of a series of links and joints. One end is fixed to ground, and attached to the open end is a hand or end effector that can move freely in space.
You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.
Python Web Penetration Testing Cookbook
Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
About This Book
Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
Find the script you need to deal with any...
Learning Penetration Testing with Python
Utilize Python scripting to execute effective and efficient penetration tests
About This Book
Understand how and where Python scripts meet the need for penetration testing
Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Advances in Object-Oriented Data Modeling (Cooperative Information Systems) This book focuses on recent developments in representational and processing aspects of complex data-intensive applications.
Focuses on recent developments in representational and processing aspects of object-oriented data modeling, covering hot topics such as reverse engineering and work-flow modeling. Each chapter contains a...
WHEN COREL BOUGHT WordPerfect for almost $200 million from the Novell
Corporation in the mid 1990s, nobody would have thought that in a matter of
months they would have been giving away the source code free. However, when
Corel ported WordPerfect to Java and released it as a beta product, a simple
program called Mocha1 could...
Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
|Result Page: 14 13 12 11 10 9 8 7 6 5 |