万本电子书0元读

万本电子书0元读

Practical DevOps
Practical DevOps
Joakim Verona
¥81.74
Understand the benefits of DevOps and continuous delivery and see how they support the agile software development process About This Book ? Learn how DevOps can accelerate your entire software development life cycle ? Improve your organization's performance to ensure the smooth production of software and services ? Get hands-on experience in using efficient DevOps tools to better effect Who This Book Is For If you're a developer or system administrator looking to take on larger responsibilities and understand how the infrastructure that builds today's enterprises works, this is the book for you. This book will also help you greatly if you're an operations worker who would like to better support developers. You do not need any previous knowledge of DevOps to understand the concepts in this book. What You Will Learn ? Understand how all deployment systems fit together to form a larger system ? Set up and familiarize yourself with all the tools you need to be efficient with DevOps ? Design an application suitable for continuous deployment systems with DevOps in mind ? Store and manage your code effectively using Git, Gerrit, Gitlab, and more ? Configure a job to build a sample CRUD application ? Test your code using automated regression testing with Jenkins Selenium ? Deploy your code using tools such as Puppet, Ansible, Palletops, Chef, and Vagrant In Detail DevOps is a practical field that focuses on delivering business value as efficiently as possible. DevOps encompasses all code workflows from testing environments to production environments. It stresses cooperation between different roles, and how they can work together more closely, as the roots of the word imply—Development and Operations. Practical DevOps begins with a quick refresher on DevOps and continuous delivery and quickly moves on to show you how DevOps affects software architectures. You'll create a sample enterprise Java application that you’'ll continue to work with through the remaining chapters. Following this, you will explore various code storage and build server options. You will then learn how to test your code with a few tools and deploy your test successfully. In addition to this, you will also see how to monitor code for any anomalies and make sure that it runs as expected. Finally, you will discover how to handle logs and keep track of the issues that affect different processes. By the end of the book, you will be familiar with all the tools needed to deploy, integrate, and deliver efficiently with DevOps. Style and approach This book is primarily a technical guide to DevOps with practical examples suitable for people who like to learn by implementing concrete working code.
Python Penetration Testing Essentials
Python Penetration Testing Essentials
Mohit
¥54.49
This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. About This Book ? Detect and avoid various attack types that put the privacy of a system at risk ? Leverage Python to build efficient code and eventually build a robust environment ? Learn about securing wireless applications and information gathering on a web server Who This Book Is For If you are a Python programmer, a security researcher, or an ethical hacker and are interested in penetration testing with the help of Python, then this book is for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. What You Will Learn ? The basics of network pentesting including network scanning and sniffing ? Wireless, wired attacks, and building traps for attack and torrent detection ? Web server footprinting and web application attacks, including the XSS and SQL injection attack ? Wireless frames and how to obtain information such as SSID, BSSID, and the channel number from a wireless frame using a Python script ? The importance of web server signatures, email gathering, and why knowing the server signature is the first step in hacking In Detail This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking—such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks. Style and approach The book starts at a basic level and moves to a higher level of network and web security. The execution and performance of code are both taken into account.
Django 2 by Example
Django 2 by Example
Antonio Melé
¥90.46
Learn Django 2.0 with four end-to-end projects About This Book ? Learn Django by building real-world web applications from scratch ? Develop powerful web applications quickly using the best coding practices ? Integrate other technologies into your application with clear, step-by-step explanations and comprehensive example code Who This Book Is For If you are a web developer who wants to see how to build professional sites with Django, this book is for you. You will need a basic knowledge of Python, HTML, and JavaScript, but you don't need to have worked with Django before. What You Will Learn ? Build practical, real-world web applications with Django ? Use Django with other technologies, such as Redis and Celery ? Develop pluggable Django applications ? Create advanced features, optimize your code, and use the cache framework ? Add internationalization to your Django projects ? Enhance your user experience using JavaScript and AJAX ? Add social features to your projects ? Build RESTful APIs for your applications In Detail If you want to learn about the entire process of developing professional web applications with Django, then this book is for you. This book will walk you through the creation of four professional Django projects, teaching you how to solve common problems and implement best practices. You will learn how to build a blog application, a social image-bookmarking website, an online shop, and an e-learning platform. The book will teach you how to enhance your applications with AJAX, create RESTful APIs, and set up a production environment for your Django projects. The book walks you through the creation of real-world applications, while solving common problems and implementing best practices. By the end of this book, you will have a deep understanding of Django and how to build advanced web applications Style and approach This easy-to-follow guide takes you through the process of building four different production-ready Django projects with a simple step-by-step approach.
Mastering JavaFX 10
Mastering JavaFX 10
Sergey Grinev
¥81.74
Design modern, rich interfaces for Java apps using JavaFX 10 About This Book ? Become a pro with the latest JavaFX 10 framework ? Create dynamic content using the animation API ? Create and customize plugins and use them efficiently in different applications Who This Book Is For If you’re a Java developer who wants to upgrade to the latest version of JavaFX to create stunning, feature-rich graphical applications, this book is for you. What You Will Learn ? Construct and customize JavaFX windows ? Manage UI elements and arrange them on the Scene ? Explore the Bindings API and use it to coordinate various UI elements ? Use FXML to design amazing FX applications ? Write and manage CSS to style your applications ? Add audio and video to your projects ? Prepare your application to be launched on the target platform In Detail JavaFX 10 is used to create media-rich client applications. This book takes you on a journey to use JavaFX 10 to build applications that display information in a high-performance, modern user interface featuring audio, video, graphics, and animation. Mastering JavaFX 10 begins by introducing you to the JavaFX API. You will understand the steps involved in setting up your development environment and build the necessary dependencies. This is followed by exploring how to work with the assets, modules, and APIs of JavaFX. This book is filled with practical examples to guide you through the major features of JavaFX 10. In addition to this, you will acquire a practical understanding of JavaFX custom animations, merging different application layers smoothly, and creating a user-friendly GUI with ease. By the end of the book, you will be able to create a complete, feature-rich Java graphical application using JavaFX. Style and approach The book adopts a practical, step-by-step approach.
Mastering Wireshark 2
Mastering Wireshark 2
Andrew Crouthamel
¥73.02
Use Wireshark 2 to overcome real-world network problems About This Book ? Delve into the core functionalities of the latest version of Wireshark ? Master network security skills with Wireshark 2 ? Efficiently find the root cause of network-related issues Who This Book Is For If you are a security professional or a network enthusiast and are interested in understanding the internal working of networks, and if you have some prior knowledge of using Wireshark, then this book is for you. What You Will Learn ? Understand what network and protocol analysis is and how it can help you ? Use Wireshark to capture packets in your network ? Filter captured traffic to only show what you need ? Explore useful statistic displays to make it easier to diagnose issues ? Customize Wireshark to your own specifications ? Analyze common network and network application protocols In Detail Wireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is presented in a form that can be easily read by people. Mastering Wireshark 2 helps you gain expertise in securing your network. We start with installing and setting up Wireshark2.0, and then explore its interface in order to understand all of its functionalities. As you progress through the chapters, you will discover different ways to create, use, capture, and display filters. By halfway through the book, you will have mastered Wireshark features, analyzed different layers of the network protocol, and searched for anomalies. You’ll learn about plugins and APIs in depth. Finally, the book focuses on pocket analysis for security tasks, command-line utilities, and tools that manage trace files. By the end of the book, you'll have learned how to use Wireshark for network security analysis and configured it for troubleshooting purposes. Style and approach This step-by-step guide on Wireshark 2 starts with capturing and filtering traffic and follows with analysis and statistics, as well as all the new features of Wireshark 2.
Big Data Analytics with Hadoop 3
Big Data Analytics with Hadoop 3
Sridhar Alla
¥73.02
Explore big data concepts, platforms, analytics, and their applications using the power of Hadoop 3 About This Book ? Learn Hadoop 3 to build effective big data analytics solutions on-premise and on cloud ? Integrate Hadoop with other big data tools such as R, Python, Apache Spark, and Apache Flink ? Exploit big data using Hadoop 3 with real-world examples Who This Book Is For Big Data Analytics with Hadoop 3 is for you if you are looking to build high-performance analytics solutions for your enterprise or business using Hadoop 3’s powerful features, or you’re new to big data analytics. A basic understanding of the Java programming language is required. What You Will Learn ? Explore the new features of Hadoop 3 along with HDFS, YARN, and MapReduce ? Get well-versed with the analytical capabilities of Hadoop ecosystem using practical examples ? Integrate Hadoop with R and Python for more efficient big data processing ? Learn to use Hadoop with Apache Spark and Apache Flink for real-time data analytics ? Set up a Hadoop cluster on AWS cloud ? Perform big data analytics on AWS using Elastic Map Reduce In Detail Apache Hadoop is the most popular platform for big data processing, and can be combined with a host of other big data tools to build powerful analytics solutions. Big Data Analytics with Hadoop 3 shows you how to do just that, by providing insights into the software as well as its benefits with the help of practical examples. Once you have taken a tour of Hadoop 3’s latest features, you will get an overview of HDFS, MapReduce, and YARN, and how they enable faster, more efficient big data processing. You will then move on to learning how to integrate Hadoop with the open source tools, such as Python and R, to analyze and visualize data and perform statistical computing on big data. As you get acquainted with all this, you will explore how to use Hadoop 3 with Apache Spark and Apache Flink for real-time data analytics and stream processing. In addition to this, you will understand how to use Hadoop to build analytics solutions on the cloud and an end-to-end pipeline to perform big data analysis using practical use cases. By the end of this book, you will be well-versed with the analytical capabilities of the Hadoop ecosystem. You will be able to build powerful solutions to perform big data analytics and get insight effortlessly. Style and approach Filled with practical examples and use cases, this book will not only help you get up and running with Hadoop, but will also take you farther down the road to deal with Big Data Analytics
Hands-On Concurrency with Rust
Hands-On Concurrency with Rust
Brian L. Troutwine
¥81.74
Get to grips with modern software demands by learning the effective uses of Rust's powerful memory safety. About This Book ? Learn and improve the sequential performance characteristics of your software ? Understand the use of operating system processes in a high-scale concurrent system ? Learn of the various coordination methods available in the Standard library Who This Book Is For This book is aimed at software engineers with a basic understanding of Rust who want to exploit the parallel and concurrent nature of modern computing environments, safely. What You Will Learn ? Probe your programs for performance and accuracy issues ? Create your own threading and multi-processing environment in Rust ? Use coarse locks from Rust’s Standard library ? Solve common synchronization problems or avoid synchronization using atomic programming ? Build lock-free/wait-free structures in Rust and understand their implementations in the crates ecosystem ? Leverage Rust’s memory model and type system to build safety properties into your parallel programs ? Understand the new features of the Rust programming language to ease the writing of parallel programs In Detail Most programming languages can really complicate things, especially with regard to unsafe memory access. The burden on you, the programmer, lies across two domains: understanding the modern machine and your language's pain-points. This book will teach you to how to manage program performance on modern machines and build fast, memory-safe, and concurrent software in Rust. It starts with the fundamentals of Rust and discusses machine architecture concepts. You will be taken through ways to measure and improve the performance of Rust code systematically and how to write collections with confidence. You will learn about the Sync and Send traits applied to threads, and coordinate thread execution with locks, atomic primitives, data-parallelism, and more. The book will show you how to efficiently embed Rust in C++ code and explore the functionalities of various crates for multithreaded applications. It explores implementations in depth. You will know how a mutex works and build several yourself. You will master radically different approaches that exist in the ecosystem for structuring and managing high-scale systems. By the end of the book, you will feel comfortable with designing safe, consistent, parallel, and high-performance applications in Rust. Style and approach Readers will be taken through various ways to improve the performance of their Rust code.
Building RESTful Web Services with .NET Core
Building RESTful Web Services with .NET Core
Gaurav Aroraa,Tadit Dash
¥73.02
Building Complete E-commerce/Shopping Cart Application About This Book ? Follow best practices and explore techniques such as clustering and caching to achieve a reactive, scalable web service ? Leverage the .NET Framework to quickly implement RESTful endpoints. ? Learn to implement a client library for a RESTful web service using ASP.NET Core. Who This Book Is For This book is intended for those who want to learn to build RESTful web services with the latest .NET Core Framework. To make best use of the code samples included in the book, you should have a basic knowledge of C# and .NET Core. What You Will Learn ? Add basic authentication to your RESTful API ? Create a Carts Controller and Orders Controller to manage and process Orders ? Intercept HTTP requests and responses by building your own middleware ? Test service calls using Postman and Advanced REST Client ? Secure your data/application using annotations In Detail REST is an architectural style that tackles the challenges of building scalable web services. In today's connected world, APIs have taken a central role on the web. APIs provide the fabric through which systems interact, and REST has become synonymous with APIs. The depth, breadth, and ease of use of ASP.NET Core makes it a breeze for developers to work with for building robust web APIs. This book takes you through the design of RESTful web services and leverages the ASP.NET Core framework to implement these services. This book begins by introducing you to the basics of the philosophy behind REST. You'll go through the steps of designing and implementing an enterprise-grade RESTful web service. This book takes a practical approach, that you can apply to your own circumstances. This book brings forth the power of the latest .NET Core release, working with MVC. Later, you will learn about the use of the framework to explore approaches to tackle resilience, security, and scalability concerns. You will explore the steps to improve the performance of your applications. You'll also learn techniques to deal with security in web APIs and discover how to implement unit and integration test strategies. By the end of the book, you will have a complete understanding of Building a client for RESTful web services, along with some scaling techniques. Style and approach This book is a step-by-step, hands-on guide to designing and building RESTful web services.
Expert AWS Development
Expert AWS Development
Atul V. Mistry
¥81.74
Key concepts, sample applications, best practices, and troubleshooting tips to build highly scalable applications in AWS. About This Book ? Design highly available, cost efficient, fault tolerant, and scalable distributed systems ? A practical guide that will help you build, deploy, and manage applications with ease. ? Develop effective solutions with AWS SDK and Lambda Who This Book Is For This book targets developers who would like to build and manage web and mobile applications and services on the AWS platform. If you are an architect you will be able to take a deep dive and use examples that can be readily applied to real world scenarios. Some prior programming experience is assumed along with familiarity of cloud computing. What You Will Learn ? Learn how to get up and running with AWS Developer Tools. ? Integrate the four major phases in the Release Processes. Source, Build, Test and Production. ? Learn how to integrate Continuous Integration, Continuous Delivery, and Continuous Deployment in AWS. ? Make secure, scalable and fault tolerant applications. ? Understand different architectures and deploy complex architectures within minutes In Detail Continuous deployment and Agile methodology have enabled huge advances in modern applications. This book will enable the reader to make use of this rapidly evolving technology to build highly scalable applications within AWS using different architectures. You will begin with installation of AWS SDK and you will get hands-on experience on creating an application using AWS Management Console and AWS Command Line Interface (CLI). Next you will be integrating Applications with AWS services such as DynamoDB, Amazon Kinesis, AWS Lambda, Amazon SQS and Amazon SWF Following this you will get well versed with CI/CD workflow and work with four major phases in Release processes – Source, Build, Test and Production. Next you will learn to apply AWS developer tools in your Continuous Integration (CI) and Continuous Deployment (CD) WorkFlow. Later you will learn about User Authentication using Amazon Cognito and also how you can evaluate the best architecture as per your infrastructure costs. You will learn about Amazon EC2 service and deploy an app using Amazon EC2.You will also get well versed with container service which is Amazon EC2 Container Service (Amazon ECS) and you will learn to deploy an app using Amazon ECS. Along with EC2 and ECS, you will also deploying a practical real-world example of a CI/CD application with the Serverless Application Framework which is known as AWS Lambda. Finally you will learn how to build, develop and deploy the Application using AWS Developer tools like AWS CodeCommit, AWS CodeBuild, AWS CodeDeploy and AWS CodePipeline as per project needs. Also you can develop and deploy applications within minutes using AWS CodeStar from wizard. By the end of this book, the reader will effectively build, deploy, and manage applications on AWS along with scaling and securing applications with best practices and troubleshooting tips. Style and approach This book covers follows an approach where you will learn the key concepts followed by a real world example and some tips and tricks to make building and deploying easier
VMware NSX Cookbook
VMware NSX Cookbook
Bayu Wibowo,Tony Sangha
¥90.46
Network virtualization at your fingertips About This Book ? Over 70 practical recipes created by two VCIX-NV certified NSX experts ? Explore best practices to deploy, operate, and upgrade VMware NSX for vSphere ? Leverage NSX REST API using various tools from Python in VMware vRealize Orchestrator Who This Book Is For If you are a security and network administrator and looking to gain an intermediate level for network and security virtualization, then this book is for you. The reader should have a basic knowledge with VMware NSX. What You Will Learn ? Understand, install, and configure VMware NSX for vSphere solutions ? Configure logical switching, routing, and Edge Services Gateway in VMware NSX for vSphere ? Learn how to plan and upgrade VMware NSX for vSphere ? Learn how to use built-in monitoring tools such as Flow Monitoring, Traceflow, Application Rule Manager, and Endpoint Monitoring ? Learn how to leverage the NSX REST API for management and automation using various tools from Python to VMware vRealize Orchestrator In Detail This book begins with a brief introduction to VMware's NSX for vSphere Network Virtualization solutions and how to deploy and configure NSX components and features such as Logical Switching, Logical Routing, layer 2 bridging and the Edge Services Gateway. Moving on to security, the book shows you how to enable micro-segmentation through NSX Distributed Firewall and Identity Firewall and how to do service insertion via network and guest introspection. After covering all the feature configurations for single-site deployment, the focus then shifts to multi-site setups using Cross-vCenter NSX. Next, the book covers management, backing up and restoring, upgrading, and monitoring using built-in NSX features such as Flow Monitoring, Traceflow, Application Rule Manager, and Endpoint Monitoring. Towards the end, you will explore how to leverage VMware NSX REST API using various tools from Python to VMware vRealize Orchestrator. Style and approach The book follows a practical, recipe-based approach and teaches readers how to leverage VMware NSX and implement these recipes directly into their enterprise.
Design Patterns and Best Practices in Java
Design Patterns and Best Practices in Java
Kamalmeet Singh,Adrian Ianculescu,Lucian-Paul Torje
¥74.11
Create various design patterns to master the art of solving problems using Java About This Book ? This book demonstrates the shift from OOP to functional programming and covers reactive and functional patterns in a clear and step-by-step manner ? All the design patterns come with a practical use case as part of the explanation, which will improve your productivity ? Tackle all kinds of performance-related issues and streamline your development Who This Book Is For This book is for those who are familiar with Java development and want to be in the driver’s seat when it comes to modern development techniques. Basic OOP Java programming experience and elementary familiarity with Java is expected. What You Will Learn ? Understand the OOP and FP paradigms ? Explore the traditional Java design patterns ? Get to know the new functional features of Java ? See how design patterns are changed and affected by the new features ? Discover what reactive programming is and why is it the natural augmentation of FP ? Work with reactive design patterns and find the best ways to solve common problems using them ? See the latest trends in architecture and the shift from MVC to serverless applications ? Use best practices when working with the new features In Detail Having a knowledge of design patterns enables you, as a developer, to improve your code base, promote code reuse, and make the architecture more robust. As languages evolve, new features take time to fully understand before they are adopted en masse. The mission of this book is to ease the adoption of the latest trends and provide good practices for programmers. We focus on showing you the practical aspects of smarter coding in Java. We'll start off by going over object-oriented (OOP) and functional programming (FP) paradigms, moving on to describe the most frequently used design patterns in their classical format and explain how Java’s functional programming features are changing them. You will learn to enhance implementations by mixing OOP and FP, and finally get to know about the reactive programming model, where FP and OOP are used in conjunction with a view to writing better code. Gradually, the book will show you the latest trends in architecture, moving from MVC to microservices and serverless architecture. We will finish off by highlighting the new Java features and best practices. By the end of the book, you will be able to efficiently address common problems faced while developing applications and be comfortable working on scalable and maintainable projects of any size. Style and approach This book explains design patterns in a step-by-step manner with clear and concise code explanations.
Mastering Machine Learning for Penetration Testing
Mastering Machine Learning for Penetration Testing
Chiheb Chebbi
¥66.48
Become a master at penetration testing using machine learning with Python About This Book ? Identify ambiguities and breach intelligent security systems ? Perform unique cyber attacks to breach robust systems ? Learn to leverage machine learning algorithms Who This Book Is For This book is for pen testers and security professionals who are interested in learning techniques to break an intelligent security system. Basic knowledge of Python is needed, but no prior knowledge of machine learning is necessary. What You Will Learn ? Take an in-depth look at machine learning ? Get to know natural language processing (NLP) ? Understand malware feature engineering ? Build generative adversarial networks using Python libraries ? Work on threat hunting with machine learning and the ELK stack ? Explore the best practices for machine learning In Detail Cyber security is crucial for both businesses and individuals. As systems are getting smarter, we now see machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it’s important for pentesters and security researchers to understand how these systems work, and to breach them for testing purposes. This book begins with the basics of machine learning and the algorithms used to build robust systems. Once you’ve gained a fair understanding of how security products leverage machine learning, you'll dive into the core concepts of breaching such systems. Through practical use cases, you’ll see how to find loopholes and surpass a self-learning security system. As you make your way through the chapters, you’ll focus on topics such as network intrusion detection and AV and IDS evasion. We’ll also cover the best practices when identifying ambiguities, and extensive techniques to breach an intelligent system. By the end of this book, you will be well-versed with identifying loopholes in a self-learning security system and will be able to efficiently breach a machine learning system. Style and approach This book takes a step-by-step approach to identify the loop holes in a self-learning security system. You will be able to efficiently breach a machine learning system with the help of best practices towards the end of the book.
Mastering Selenium WebDriver 3.0
Mastering Selenium WebDriver 3.0
Mark Collin
¥81.74
Complement Selenium with useful additions that fit seamlessly into the rich and well-crafted API that Selenium offers About This Book ? Understand the power, simplicity, and limitations of the core Selenium framework ? Write clear, readable, and reliable tests that perform complex test automation tasks ? Work with ChromeDriver and GeckoDriver in headless mode Who This Book Is For If you are a software tester or a developer with working experience in Selenium and competency with Java, who is interested in automation and are looking forward to taking the next step in their learning journey, then this is the book for you. What You Will Learn ? Provide fast, useful feedback with screenshots ? Create extensible, well-composed page objects ? Utilize ChromeDriver and GeckoDriver in headless mode ? Leverage the full power of Advanced User Interactions APIs ? Use JavascriptExecutor to execute JavaScript snippets in the browser through Selenium ? Build user interaction into your test script using JavascriptExecutor ? Learn the basics of working with Appium In Detail The second edition of Mastering Selenium 3.0 WebDriver starts by showing you how to build your own Selenium framework with Maven. You'll then look at how you can solve the difficult problems that you will undoubtedly come across as you start using Selenium in an enterprise environment and learn how to produce the right feedback when failing. Next, you’ll explore common exceptions that you will come across as you use Selenium, the root causes of these exceptions, and how to fix them. Along the way, you’ll use Advanced User Interactions APIs, running any JavaScript you need through Selenium; and learn how to quickly spin up a Selenium Grid using Docker containers. In the concluding chapters, you‘ll work through a series of scenarios that demonstrate how to extend Selenium to work with external libraries and applications so that you can be sure you are using the right tool for the job. Style and approach This book is a pragmatic guide that takes you through the process of creating a test framework with Selenium 3. It then shows you how you can extend this framework to overcome common obstacles that you will come across whilst using Selenium.
Learning Malware Analysis
Learning Malware Analysis
Monnappa K A
¥90.46
Understand malware analysis and its practical implementation About This Book ? Explore the key concepts of malware analysis and memory forensics using real-world examples ? Learn the art of detecting, analyzing, and investigating malware threats ? Understand adversary tactics and techniques Who This Book Is For This book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book. What You Will Learn ? Create a safe and isolated lab environment for malware analysis ? Extract the metadata associated with malware ? Determine malware's interaction with the system ? Perform code analysis using IDA Pro and x64dbg ? Reverse-engineer various malware functionalities ? Reverse engineer and decode common encoding/encryption algorithms ? Perform different code injection and hooking techniques ? Investigate and hunt malware using memory forensics In Detail Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents. Style and approach The book takes the reader through all the concepts, techniques and tools to understand the behavior and characteristics of malware by using malware analysis and it also teaches the techniques to investigate and hunt malware using memory forensics.
Alexa Skills Projects
Alexa Skills Projects
Madhur Bhargava
¥73.02
Get up and running with the fundamentals of Amazon Alexa and build exciting IoT projects About This Book ? Gain hands-on experience of working with Amazon Echo and Alexa ? Build exciting IoT projects using Amazon Echo ? Learn about voice-enabled smart devices Who This Book Is For Alexa Skills Projects is for individuals who want to have a deep understanding of the underlying technology that drives Amazon Echo and Alexa, and how it can be integrated with the Internet of Things to develop hands-on projects. What You Will Learn ? Understand how Amazon Echo is already being used in various domains ? Discover how an Alexa Skill is architected ? Get a clear understanding of how some of the most popular Alexa Skills work ? Design Alexa Skills for specific purposes and interact with Amazon Echo to execute them ? Gain experience of programming for Amazon Echo ? Explore future applications of Amazon Echo and other voice-activated devices In Detail Amazon Echo is a smart speaker developed by Amazon, which connects to Amazon’s Alexa Voice Service and is entirely controlled by voice commands. Amazon Echo is currently being used for a variety of purposes such as home automation, asking generic queries, and even ordering a cab or pizza. Alexa Skills Projects starts with a basic introduction to Amazon Alexa and Echo. You will then deep dive into Alexa Programming concepts such as Intents, Slots, Lambdas and maintaining your skill’s state using DynamoDB. You will get a clear understanding of how some of the most popular Alexa Skills work, and gain experience of working with real-world Amazon Echo applications. In the concluding chapters, you will explore the future of voice-enabled applications and their coverage with respect to the Internet of Things. By the end of the book, you will have learned to design Alexa Skills for specific purposes and interact with Amazon Echo to execute these skills. Style and approach A practical guide filled with real world examples that will help you understand the process of creating Alexa Skills from scratch and it's real world applications.
Fundamentals of Linux
Fundamentals of Linux
Oliver Pelz
¥54.49
Develop a solid understanding of the important command-line tools and utilities in Linux About This Book ? Delve into the fundamentals of Linux ? Explore and work with virtualization, command lines, and Bash shell scripts ? Use special file permission flags such as setuid and setgid Who This Book Is For Fundamentals of Linux is for individuals looking to work as a Linux system administrator. What You Will Learn ? Explore basic and advanced command-line concepts ? Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox ? Work with the command line efficiently and learn how to navigate through the Linux filesystem ? Create file and user group permissions and edit files ? Use Sticky bit to secure your Linux filesystem ? Define and remove ACL from Linux files In Detail Linux is a Unix-like operating system assembled under the model of free and open source software development and distribution. Fundamentals of Linux will help you learn all the essentials of the Linux command line required to get you started. The book will start by teaching you how to work with virtualization software and install CentOS 7 Linux as a VM. Then, you will get to grips with the workings of various command line operations, such as cursor movement, commands, options, and arguments. As you make your way through the chapters, the book will not only focus on the most essential Linux commands but also give an introduction to Bash shell scripting. Finally, you will explore advanced topics, such as networking and troubleshooting your system, and you will get familiar with the advanced file permissions: ACL, setuid, and setgid. Fundamentals of Linux includes real-world tasks, use cases, and problems that, as a system administrator, you might encounter in your day-to-day activities. Style and approach A step-by-step guide filled with real-world examples that will cover the fundamentals of Linux
GitHub Essentials
GitHub Essentials
Achilleas Pipinellis
¥54.49
This book will teach you what you need to know to start using GitHub effectively for collaborating and working on your software projects. About This Book ? Effectively use GitHub by learning its key features to leverage the power of Git and make collaboration on code easy to work with. ? Be more productive on the development workflow of your projects using the valuable toolset that GitHub provides. ? Explore the world of GitHub by following simple, step-by-step, real-world scenarios accompanied by helpful, explanatory screenshots. Who This Book Is For This book is for experienced or novice developers with a basic knowledge of Git. If you ever wanted to learn how big projects such as Twitter, Google, or even GitHub collaborate on code, then this book is for you. What You Will Learn ? Create and upload repositories to your account ? Create organizations and manage teams with different access levels on repositories ? Use the issue tracker effectively and add context to issues with labels and milestones ? Create, access, and personalize your user account and profile settings ? Build a community around your project using the sophisticated tools GitHub provides ? Create GitHub pages and understand web analytics In Detail Whether you are an experienced developer or a novice, learning to work with Version Control Systems is a must in the software development world. Git is the most popular tool for that purpose, and GitHub was built around it, leveraging its powers by bringing it to the web. Starting with the basics of creating a repository, you will then learn how to manage the issue tracker, the place where discussions about your project take place. Continuing our journey, we will explore how to use the wiki and write rich documentation that will accompany your project. You will also master organization/team management and some of the features that made GitHub so well known, including pull requests. Next, we will focus on creating simple web pages hosted on GitHub and lastly, we will explore the settings that are configurable for a user and a repository. Style and approach This book will take you through some of the most important features of one of the most popular tools, GitHub, which is used to bring developers together from all around the world to discover, share, and build better software. At each step of the way, you will learn about important approaches used in GitHub, including creating a repository, managing teams, creating GitHub pages, and watching your repository's web analytics, among others.
Natural Language Processing and Computational Linguistics
Natural Language Processing and Computational Linguistics
Bhargav Srinivasa-Desikan
¥73.02
Work with Python and powerful open source tools such as Gensim and spaCy to perform modern text analysis, natural language processing, and computational linguistics algorithms. About This Book ? Discover the open source Python text analysis ecosystem, using spaCy, Gensim, scikit-learn, and Keras ? Hands-on text analysis with Python, featuring natural language processing and computational linguistics algorithms ? Learn deep learning techniques for text analysis Who This Book Is For This book is for you if you want to dive in, hands-first, into the interesting world of text analysis and NLP, and you're ready to work with the rich Python ecosystem of tools and datasets waiting for you! What You Will Learn ? Why text analysis is important in our modern age ? Understand NLP terminology and get to know the Python tools and datasets ? Learn how to pre-process and clean textual data ? Convert textual data into vector space representations ? Using spaCy to process text ? Train your own NLP models for computational linguistics ? Use statistical learning and Topic Modeling algorithms for text, using Gensim and scikit-learn ? Employ deep learning techniques for text analysis using Keras In Detail Modern text analysis is now very accessible using Python and open source tools, so discover how you can now perform modern text analysis in this era of textual data. This book shows you how to use natural language processing, and computational linguistics algorithms, to make inferences and gain insights about data you have. These algorithms are based on statistical machine learning and artificial intelligence techniques. The tools to work with these algorithms are available to you right now - with Python, and tools like Gensim and spaCy. You'll start by learning about data cleaning, and then how to perform computational linguistics from first concepts. You're then ready to explore the more sophisticated areas of statistical NLP and deep learning using Python, with realistic language and text samples. You'll learn to tag, parse, and model text using the best tools. You'll gain hands-on knowledge of the best frameworks to use, and you'll know when to choose a tool like Gensim for topic models, and when to work with Keras for deep learning. This book balances theory and practical hands-on examples, so you can learn about and conduct your own natural language processing projects and computational linguistics. You'll discover the rich ecosystem of Python tools you have available to conduct NLP - and enter the interesting world of modern text analysis. Style and approach The book teaches NLP from the angle of a practitioner as well as that of a student. This is a tad unusual, but given the enormous speed at which new algorithms and approaches travel from scientific beginnings to industrial implementation, first principles can be clarified with the help of entirely practical examples.
Hands-On Computer Vision with Julia
Hands-On Computer Vision with Julia
Dmitrijs Cudihins
¥73.02
Explore the various packages in Julia that support image processing and build neural networks for video processing and object tracking. About This Book ? Build a full-fledged image processing application using JuliaImages ? Perform basic to advanced image and video stream processing with Julia's APIs ? Understand and optimize various features of OpenCV with easy examples Who This Book Is For Hands-On Computer Vision with Julia is for Julia developers who are interested in learning how to perform image processing and want to explore the field of computer vision. Basic knowledge of Julia will help you understand the concepts more effectively. What You Will Learn ? Analyze image metadata and identify critical data using JuliaImages ? Apply filters and improve image quality and color schemes ? Extract 2D features for image comparison using JuliaFeatures ? Cluster and classify images with KNN/SVM machine learning algorithms ? Recognize text in an image using the Tesseract library ? Use OpenCV to recognize specific objects or faces in images and videos ? Build neural network and classify images with MXNet In Detail Hands-On Computer Vision with Julia is a thorough guide for developers who want to get started with building computer vision applications using Julia. Julia is well suited to image processing because it’s easy to use and lets you write easy-to-compile and efficient machine code. This book begins by introducing you to Julia's image processing libraries such as Images.jl and ImageCore.jl. You’ll get to grips with analyzing and transforming images using JuliaImages; some of the techniques discussed include enhancing and adjusting images. As you make your way through the chapters, you’ll learn how to classify images, cluster them, and apply neural networks to solve computer vision problems. In the concluding chapters, you will explore OpenCV applications to perform real-time computer vision analysis, for example, face detection and object tracking. You will also understand Julia's interaction with Tesseract to perform optical character recognition and build an application that brings together all the techniques we introduced previously to consolidate the concepts learned. By end of the book, you will have understood how to utilize various Julia packages and a few open source libraries such as Tesseract and OpenCV to solve computer vision problems with ease. Style and approach Readers will be taken through various packages that support image processing in Julia, and will also tap into open-source libraries such as Open CV and Tesseract to find the optimum solution to problems encountered in computer vision.
VMware Cross-Cloud Architecture
VMware Cross-Cloud Architecture
Ajit Pratap Kundan
¥90.46
Enhance your virtualization skills by mastering storage and network virtualization with automation across different Clouds About This Book ? Migrate and build your applications in Hybrid Cloud with VMware Cross Cloud components and services ? Gain in-depth configuration insights of VMware Cross Cloud architecture ? Learn to migrate applications from VMware to AWS and IBM Cloud Who This Book Is For This book is for administrators, Cloud architects and network engineers who want to globalize their infrastructure using VMware and AWS services. An initial setup of workloads and data center is beneficial. What You Will Learn ? Install and configure the Cloud foundation with Cross-Cloud services ? Configure vSphere high availability with the vCenter redundancy setup ? Architect and configure VMware with AWS Cloud ? Deploy VMware components in IBM Soft Layer ? Extend your DR setup with VMware to consume DRaaS ? Design and configure software-defined networking ? Implement compliance regulations to fix violations In Detail Over the past two decades, VMware vSphere has been known as the most trusted and reliable virtualization platform. VMware Cross-Cloud Architecture shows you how to design and configure Cross Cloud Architecture by using VMware Cloud Foundation and vRealize Suite with various use cases across private, public, and hybrid Cloud. This book takes you through everything from a basic understanding of virtualization to advanced aspects of storage and network virtualization, clustering, automation, and management. This book will be your guide to designing all aspects of Cloud. We start with the challenges faced by a traditional data center, define problem statements for you, and then brief you on respective solutions. Moving on, all kinds of virtualization and Cloud offerings from AWS and IBM Soft Layer are introduced and discussed in detail. Then, you'll learn how to design IT infrastructures for new and existing applications with a combination of Cloud Foundation, vRealize Suite, and vSphere enabled with VSAN and NSX. Furthermore, you'll learn how to design and configure high availability, disaster recovery, and apply an appropriate compliance matrix. Toward the end of the book, you will learn how to calculate the TCO/ROI, along with the VMware products packaging and licensing in detail. Style and approach This book follows a step-by-step, practical approach which will help you to have a better understanding of the cloud technology and the steps required to quickly reap its benefits while at the same time lowering your IT implementation risk and cost.
Advanced Node.js Development
Advanced Node.js Development
Andrew Mead
¥73.02
Takes you through creating your own API, building a full real-time web app, securing your Node systems, and practical applications of the latest Async and Await technologies. It maps out everything in a comprehensive, easy-to-follow package designed to get you up and running quickly. About This Book ? Entirely project-based and practical ? Explains the "why" of Node.js features, not just the "how", providing with a deep understanding and enabling you to easily apply concepts in your own applications ? Covers the full range of technologies around Node.js – npm, MongoDB, version control with Git, and many more Who This Book Is For This book is for anyone looking to launch their own Node applications, switch careers, or freelance as a Node developer. You should have a basic understanding of JavaScript in order to follow this book. This book follows directly on from Learning Node.js Development, but more advanced readers can benefit from this book without having read the first part. What You Will Learn ? Develop, test, and deploy real-world Node.js applications ? Master Node.js by building practical, working examples ? Use awesome third-party Node modules such as MongoDB, Mongoose, Socket.io, and Express ? Create real-time web applications ? Explore async and await in ES7 In Detail Advanced Node.js Development is a practical, project-based book that provides you with all you need to progress as a Node.js developer. Node is a ubiquitous technology on the modern web, and an essential part of any web developer’s toolkit. If you're looking to create real-world Node applications, or you want to switch careers or launch a side-project to generate some extra income, then you're in the right place. This book was written around a single goal: turning you into a professional Node developer capable of developing, testing, and deploying real-world production applications. There's no better time to dive in. According to the 2018 Stack Overflow Survey, Node is in the top ten for back-end popularity and back-end salary. This book is built from the ground up around the latest version of Node.js (version 9.x.x). You'll be learning all the cutting-edge features available only in the latest software versions. This book delivers advanced skills that you need to become a professional Node developer. Along this journey you'll create your own API, you'll build a full real-time web app and create projects that apply the latest Async and Await technologies. Andrew Mead maps everything out for you in this book so that you can learn how to build powerful Node.js projects in a comprehensive, easy-to-follow package designed to get you up and running quickly. Style and approach This book is entirely project-based. From the very beginning, you'll be programming every single app and completing various challenges designed to help test and reinforce what you've learned. There's no copying-and-pasting here. This book is about writing code and building projects.