Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

Beginning C++17: From Novice to Professional
Beginning C++17: From Novice to Professional
Learn how to program using the updated C++17 language. You'll start with the basics and progress through step-by-step examples to become a working C++ programmer. All you need are Beginning C++17 and any recent C++ compiler and you'll soon be writing real C++ programs. There is no assumption of prior programming knowledge.

...
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

MySQL and JSON: A Practical Programming Guide
MySQL and JSON: A Practical Programming Guide
Practical instruction on using JavaScript Object Notation (JSON) with MySQL


This hands-on guide teaches, step by step, how to use JavaScript Object Notation (JSON) with MySQL. Written by a MySQL Community Manager for Oracle, MySQL and JSON: A Practical Programming Guide...
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)

Now diffused among end-user devices in mobile and wireline networks, the "cloud" is becoming the "fog." This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation,...

Microsoft Azure IAAS Essentials
Microsoft Azure IAAS Essentials

Design, configure, and build your cloud-based infrastructure using Microsoft Azure

About This Book

  • Deploy both Windows-based and Linux-based virtual machines to Microsoft Azure
  • Utilize SQL Server Azure to build a robust, highly available solution that can be recovered in the event of...
Building Python Real-Time Applications with Storm
Building Python Real-Time Applications with Storm

Learn to process massive real-time data streams using Storm and Python―no Java required!

About This Book

  • Learn to use Apache Storm and the Python Petrel library to build distributed applications that process large streams of data
  • Explore sample applications in real-time and analyze...
Spark for Python Developers
Spark for Python Developers

Key Features

  • Set up real-time streaming and batch data intensive infrastructure using Spark and Python
  • Deliver insightful visualizations in a web app using Spark (PySpark)
  • Inject live data using Spark Streaming with real-time events

Book Description

Looking...

Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network...

Result Page: 96 95 94 93 92 91 90 89 88 87 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy