Mastering Linux Network Administration
¥90.46
Master the skills and techniques that are required to design, deploy, and administer real Linux-based networksAbout This BookMaster the art of using Linux and administering network services for enterprise environmentsPerform hands-on activities to reinforce expert-level knowledgeGet full coverage of both the CentOS and Debian systems, including how networking concepts differ for each Who This Book Is For Mastering Linux Network Administration is recommended for those who already understand the basics of using Linux and networking, and would like to push those skills to a higher level through real-world Linux networking scenarios. Whether you intend to run a home office consisting of Linux nodes or a rollout of a Linux network within your organization, this book is a great fit for those that desire to learn how to manage networked systems with the power of Linux.What You Will LearnInstall and configure the Debian and CentOS systemsSet up and configure file serversAdminister networked nodes remotelyDiscover how to monitor system performance for peak healthConfigure network services such as DNS and DHCPHost HTTP content via ApacheTroubleshoot Linux networking issues In Detail Linux is everywhere. Whether you run a home office, a small business, or manage enterprise systems, Linux can empower your network to perform at its very best. Armed with the advanced tools and best practice guidance of this practical guide, you'll be able to mold Linux networks to your will, empowering your systems and their users to take advantage of all that Linux-based networks have to offer. Understand how Linux networks function and get to grips with essential tips and tricks to manage them - whether you're already managing a networks, or even just starting out. With Debian and CentOS as its source, this book will divulge all the details you need to manage a real Linux-based network. With detailed activities and instructions based on real-world scenarios, this book will be your guide to the exciting world of Linux networking.Style and approach This practical guide will walk you through all the core concepts required to manage real Linux-based networks.
Microsoft SQL Azure: Enterprise Application Development
¥90.46
Each chapter starts with a general overview reviewing the software architecture related information or the underpinning programming concepts followed by an example of working with specific examples. This is then followed by a de*ion of the specific software used in the chapter. The topics that require you to write code are fully explained using annotations and the code is presented in both VB and C# (in most cases). If you are a .Net developer, an architect, or a DBA who wants to develop enterprise applications and projects and extend your on-site skills with SQL Azure, then this book is for you. This book does not assume experience in Windows Azure or SQL Azure, nor is a high level of competency in SQL Server or the .NET Framework and associated technology required. However, a basic understanding of Visual Studio, C#, VB, SQL Servers, XML, web and WCF is required. If you decide to work with SQL Azure, then this book will provide you with the most up to date and practical information.
PostgreSQL 9.0 High Performance
¥90.46
Improving database performance requires an equal mix of understanding theoretical concepts and working through hands-on examples. You'll find both here. Many of the examples given will be immediately useful for monitoring and improving your PostgreSQL deployments, providing insight into hard-to-obtain information about your database. This book is aimed at intermediate to advanced database administrators using or planning to use PostgreSQL. Portions will also interest systems administrators looking to build or monitor a PostgreSQL installation, as well as developers interested in advanced database internals that impact application design.
Implementing Splunk: Big Data Reporting and Development for Operational Intellig
¥90.46
A step-by-step practical implementation tutorial that equips you with high-level knowledge of configuring, deploying, extending, and integrating Splunk to bring machine-generated operational intelligence (?)to your advantage. The book targets professionals and organizations who want to implement or have already implemented Splunk for log analysis and indexing. Analysts and IT staff for end-to-end investigation, performance monitoring, and so on will also learn from the practical examples. It would even help managers to build reports and summarize the health, performance, and activity of their IT infrastructure and business. You will also find it helpful as a technical administrator, consultant, or end user. This book aims to be useful to Splunk users of all levels, from complete newbie to seasoned user. The book assumes that you have access to a copy of Splunk, ideally not in production. Many examples also assume your user has admin rights.
Mastering Metasploit
¥90.46
A comprehensive and detailed, step by step tutorial guide that takes you through important aspects of the Metasploit framework. If you are a penetration tester, security engineer, or someone who is looking to extend their penetration testing skills with Metasploit, then this book is ideal for you. The readers ofthis book must have a basic knowledge of using Metasploit. They are also expected to have knowledge of exploitation and an indepth understanding of object-oriented programming languages.
iOS Development with Xamarin Cookbook
¥90.46
The book is written in a recipe format with practical examples, allowing you to go directly to your topic of interest or follow topics throughout a chapter to gain an indepth knowledge. There are also plenty of hints and best practices along the way. If you are a C#/.NET developer with no previous experience in iOS development or an ObjectiveC developer who wants to create complete iOS applications and deploy them to the App Store, then this book is ideal for you. No experience with Xamarin is needed.
SAP Business ONE Implementation
¥90.46
With clear instructions and plenty of screenshots, this book will provide you all the support and guidance you need to implement SAP Business One in your business. We will work with a project plan in each chapter and implement new techniques in the related case study. Alongside this hands-on approach tips and tricks are provided that you can use for your own project. This book is written for technically savvy business owners, entrepreneurs, and departmental managers. If you are a departmental sales manager you can benefit from the advanced sales stages and workflow concept in this book. The seasoned inventory and warehouse manager can immediately utilize the inventory optimization and warehouse management concepts. Your web technicians will benefit from the e-commerce information and understand how your web strategy can be aligned with SAP B1. As a business owner your key players from sales to fulfillment gain back control and you can grow your business to the next level using modern franchising concepts. If you have SQL skills you can leverage your knowledge, connecting with SAP tools and features that are built on queries. No previous experience with SAP or ERP is assumed.
SignalR Real-time Application Cookbook
¥90.46
This book contains illustrated code examples to help you create realtime, asynchronous, and bidirectional clientserver applications. Each recipe will concentrate on one specific aspect of application development with SignalR showing you how that aspect can be used proficiently. Different levels of developers will find this book useful. Beginners will be able to learn all the fundamental concepts of SignalR, quickly becoming productive in a difficult arena. Experienced programmers will find in this book a handy and useful collection of readymade solutions to common use cases, which they will be able to enhance as needed. Developers can also use the book as a quick reference to the most important SignalR features. No previous practical experience either with SignalR or with realtime communication in general is required.
Implementing Samba 4
¥90.46
This book is an implementation tutorial covering stepbystep procedures, examples, and sample code, and has a practical approach to set up a Samba 4 Server as an Active Directory Domain Controller and also set up different Samba 4 server roles. This book is ideal for system administrators who are new to the Samba 4 software, and who are looking to get a good grounding in how to use Samba 4 to implement Active Directory Services. It's assumed that you will have some experience with general system administration, Active Directory, and GNU/Linux systems. Readers are expected to have some test machines (virtual machines), which will be used to execute the examples within this book.
Administering ArcGIS for Server
¥90.46
This book is a practical, stepbystep tutorial providing a complete reference guide to the setup, installation, and administration of ArcGIS Server technology. If you are a GIS user, analyst, DBA, or programmer with a basic knowledge of ESRI GIS, then this book is for you.
OpenStack Networking Cookbook
¥90.46
Harness the power of OpenStack Networking for public and private clouds using 90 hands-on recipesAbout This BookBuild and manage virtual switching, routing, and firewall-based networks in OpenStack using NeutronDevelop plugins and drivers for Neutron to enhance the built-in networking capabilitiesMonitor and automate OpenStack networks using tools like Ceilometer and Heat Who This Book Is For This book is aimed at network and system administrators who want to deploy and manage OpenStack-based cloud and IT infrastructure. If you have basic knowledge of OpenStack and virtualization, this book will help you leverage the rich functionality of OpenStack Networking in your cloud deployments.What You Will LearnOperate OpenStack Networking for public and private cloudsConfigure advanced routing services for your workloadsSecure data traffic using firewall-as-a-service capabilities of OpenStackDiscover how to leverage VXLAN to implement SDN in your OpenStack cloudMonitor the virtual networks using CeilometerDevelop plugins to enhance and customize OpenStack NetworkingProvide HA and VPN connectivity for your virtual machinesTroubleshoot and solve common problems with OpenStack Networking In Detail Networking in OpenStack has evolved from Nova Network to Neutron. This has resulted in a rich suite of networking services available to OpenStack users and administrators. Advanced services such as routers, firewall, and load balancers use building blocks such as network and subnets. Recent improvements support powerful customization using plugins. The evolution of Neutron continues as it integrates with tools like Ceilometer and Heat. This book will explore the built-in capabilities of Neutron to effectively deploy cloud solutions. You will begin with the most fundamental constructs of OpenStack Networking for switching and routing. You will then learn how to provide your tenants with services like firewalls and load-balancers. The step-by-step recipes will help you configure and troubleshoot networking problems in your cloud. This book will also introduce you to advanced topics like Ceilometer, Heat, and other upcoming tools in OpenStackStyle and approach The book is full of step-by-step recipes to configure and manage the networking aspects of your OpenStack cloud. In addition to covering basic configuration involved in OpenStack Networking, the books also shares various troubleshooting tips and techniques. As much as possible the book uses OpenStack dashboard (Horizon) to help the user get a feel of real OpenStack Networking
Troubleshooting Citrix XenDesktop?
¥90.46
The ultimate troubleshooting guide for clear, concise, and real-world solutions to a wide range of common Citrix XenDesktop problemsAbout This BookExplore the XenDesktop architecture and work with various troubleshooting tools that every Citrix admin should know aboutDiscover how to troubleshoot performance, VDA registration, and NetScaler integration issuesA fast-paced troubleshooting guide to help you identify and resolve any kind of problem you might face while working with Citrix XenDesktop Who This Book Is For Troubleshooting Citrix XenDesktop is targeted at Citrix Administrators or Citrix Engineers who are working on Xendesktop and want to learn tips and techniques required to deal with the issues they face in their day-to-day life. A working knowledge of core elements and concepts of Xendesktop would be an added advantage.What You Will LearnSolve VDA registration problems and Citrix session launch difficultiesIdentify and resolve XenDesktop service issuesTroubleshoot performance issues related to the XenDesktop architectureWork around common printing issuesUnderstand the Citrix XenDesktop HDX policies and deal with the HDX MediaStream challengesResolve the common MCS and PVS configuration issues in your XenDesktop environmentFind solutions to some general issues that have been identified and recorded by Citrix in their database that every administrator must be aware of In Detail In today’s world, many organizations have decided to move to secure and stable VDI platforms to benefit their organization to meet their security needs. To meet an organization’s requirements, Citrix XenDesktop serves as the best desktop virtualization solution available, providing the optimum user experience. Troubleshooting Citrix XenDesktop is a single resource guide that will help you dig deep into all the technical issues you encounter to resolve them using an autonomous and well-defined approach. The book starts by walking you through the XenDesktop architecture and the troubleshooting toolkit for Citrix XenDesktop. The subsequent chapters will help you identify possible causes of various types of Citrix XenDesktop problems that may arise while installing, configuring, or troubleshooting day-to-day problems. You will also be dealing with the most common and important VDA registration problems that you might often face while working with the XenDesktop product suite. Additionally, you will resolve issues that arise while launching Citrix sessions, troubleshoot performance issues, and learn how to integrate Citrix NetScaler with your XenDesktop environment.Style and approach This book is an easy-to-follow troubleshooting guide with real-world examples of resolving XenDesktop issues. Each chapter is focused on a specific troubleshooting area, giving you the time to learn about and apply relevant tools and practices to troubleshoot the problems using a systematic approach.
Scala Functional Programming Patterns
¥90.46
Grok and perform effective functional programming in Scala About This Book Understand functional programming patterns by comparing them with the traditional object-oriented design patterns Write robust, safer, and better code using the declarative programming paradigm An illustrative guide for programmers to create functional programming patterns with Scala Who This Book Is For If you have done Java programming before and have a basic knowledge of Scala and its syntax, then this book is an ideal choice to help you to understand the context, the traditional design pattern applicable, and the Scala way. Having previous knowledge of design patterns will help, though it is not strictly necessary. What You Will Learn Get to know about functional programming and the value Scala's FP idioms bring to the table Solve day-to-day programming problems using functional programming idioms Cut down the boiler-plate and express patterns simply and elegantly using Scala's concise syntax Tame system complexity by reducing the moving parts Write easier to reason about concurrent code using the actor paradigm and the Akka library Apply recursive thinking and understand how to create solutions without mutation Reuse existing code to compose new behavior Combine the object-oriented and functional programming approaches for effective programming using Scala In Detail Scala is used to construct elegant class hierarchies for maximum code reuse and extensibility and to implement their behavior using higher-order functions. Its functional programming (FP) features are a boon to help you design “easy to reason about” systems to control the growing software complexities. Knowing how and where to apply the many Scala techniques is challenging. Looking at Scala best practices in the context of what you already know helps you grasp these concepts quickly, and helps you see where and why to use them. This book begins with the rationale behind patterns to help you understand where and why each pattern is applied. You will discover what tail recursion brings to your table and will get an understanding of how to create solutions without mutations. We then explain the concept of memorization and infinite sequences for on-demand computation. Further, the book takes you through Scala’s stackable traits and dependency injection, a popular technique to produce loosely-coupled software systems. You will also explore how to currying favors to your code and how to simplify it by de-construction via pattern matching. We also show you how to do pipeline transformations using higher order functions such as the pipes and filters pattern. Then we guide you through the increasing importance of concurrent programming and the pitfalls of traditional code concurrency. Lastly, the book takes a paradigm shift to show you the different techniques that functional programming brings to your plate. This book is an invaluable source to help you understand and perform functional programming and solve common programming problems using Scala’s programming patterns. Style and approach This is a hands-on guide to Scala's game-changing features for programming. It is filled with many code examples and figures that illustrate various Scala idioms and best practices.
Optimizing Citrix? XenDesktop? for High Performance
¥90.46
Successfully deploy XenDesktop sites for a high performance Virtual Desktop Infrastructure (VDI) About This Book Size the VDI environment so the administrator has breathing room to design and build their XenDesktop systems efficiently Use desktop virtualization tools to provide users fast, convenient access to their Windows Desktops Understand the key pinch points in the resource layers such as; the Client layer, Network Layer, Access Layer, Control Layer, Services Layer and Resources Layer Who This Book Is For Citrix XenDesktop High Performance is written for administrators who would like to deploy Citrix XenDesktop in their enterprises with the aim of providing high efficiency. Basic familiarity with Citrix XenDesktop is assumed. What You Will Learn Understand key concepts, terminology, and system requirements Discover how components work in regards to virtualization and performance Identify architectural resource layers and components Explore the hypervisor virtualization software that runs on top of the hardware and learn how to tune it for maximum performance Analyze client hardware and software, including thin clients and mobile devices In Detail Citrix XenDesktop is a suite of desktop virtualization tools designed to provide users with fast and convenient access to their Windows desktops and applications through any device. Virtual desktops mean that rather than setting up hundreds or thousands of individual computers in an enterprise, companies can instead opt to create servers with large amounts of memory, disk, and processing resources, and use virtualization to offer these resources to end users. The result of this is that users are provided with an experience that appears to be identical to having an individual desktop PC. Each user has some disk space, processor time, and memory allocated to them, as though it is present on their own physical machine, when in reality, the resources are physically present on a centralized server. This book starts by answering the basic questions you need to ask when considering XenDesktop, followed by methods of how you can properly size your server infrastructure for XenDesktop. You’ll discover how to optimize the virtual machines used in XenDesktop, how to optimize your network for XenDesktop, and how to optimize the hypervisor and the cloud. You’ll also learn how to monitor XenDesktop to maximize performance. By the end of the book, you will be able to plan, design, build, and deploy high performance XenDesktop Virtualization systems in enterprises. You will also know how to monitor and maintain your systems to ensure smooth operation. Style and approach This book is an all-inclusive guide that uncovers hidden and previously unpublished performance improvement areas for any XenDesktop site.
Mastering Flask
¥90.46
Gain expertise in Flask to create dynamic and powerful web applications About This Book Work with scalable Flask application structures to create complex web apps Discover the most powerful Flask extensions and learn how to create one Deploy your application to real-world platforms using this step-by-step guide Who This Book Is For If you are a Flask user who knows the basics of the library and how to create basic web pages with HTML and CSS, and you want to take your applications to the next level, this is the book for you. Harnessing the full power of Flask will allow you to create complex web applications with ease. What You Will Learn Set up a best practices Python environment Use SQLAlchemy to programmatically query a database Develop templates in Jinja Set up an MVC environment for Flask Discover NoSQL, when to use it, when not to, and how to use it Develop a custom Flask extension Use Celery to create asynchronous tasks In Detail Flask is a library that allows programmers to create web applications in Python. Flask is a micro-framework that boasts a low learning curve, a large community, and the power to create complex web apps. However, Flask is easy to learn but difficult to master. Starting from a simple Flask app, this book will walk through advanced topics while providing practical examples of the lessons learned. After building a simple Flask app, a proper app structure is demonstrated by transforming the app to use a Model-View-Controller (MVC) architecture. With a scalable structure in hand, the next chapters use Flask extensions to provide extra functionality to the app, including user login and registration, NoSQL querying, a REST API, an admin interface, and more. Next, you’ll discover how to use unit testing to take the guesswork away from making sure the code is performing as it should. The book closes with a discussion of the different platforms that are available to deploy a Flask app on, the pros and cons of each one, and how to deploy on each one. Style and approach With plenty of useful examples, this guide introduces new concepts and then shows you how those concepts can be used in a real-world environment. Most sections are based around a single example app that is developed throughout the book.
Unity Character Animation with Mecanim
¥90.46
A detailed guide to the complex new animation tools in Unity, packed with clear instructions and illustrated with original content in the context of a next generation zombie apocalypse adventure game About This Book Create and export models and animation sequences to Unity from 3ds max and Maya Prepare character models and animation for games using Mecanim’s rigging tools Retarget, adjust, and mix and match motion capture and other animation data Write and edit *s compatible with Mecanim Animation Controllers Who This Book Is For If you are a Unity developer looking to get to grips with the character animation specific tools, a 3D software user who is new to Unity, or a beginner game developer who is interested in character animation and interaction, this book is ideal for you. Some experience with either the Unity interface or basic 3D coordinates is recommended, but not required. What You Will Learn Learn how to prepare a rigged character model to receive animation within Unity Acquire efficient techniques to refine and optimize motion capture data Retarget animation sequences between different character rigs Discover how to rig a humanoid character and export for use in Unity Script character interaction for a First Person character model Create dynamic animation sequences from scratch using keyframe techniques, in a variety of 3D software packages Learn Project Management in Unity Understand how to set up a complex facial rig for speech Set up Animation Controllers with masked states and blend trees to create seamless and additive animation transitions Construct a ragdoll game object and instantiate it in a game Devise Mecanim animation integration for the player and AI driven animation for enemy characters In Detail Game animation for independent developers has taken a giant leap forward with Unity's Mecanim toolset, which streamlines the import/export, retargeting, and many other aspects of the character animation workflow. Unity Character Animation with Mecanim is a great primer for getting to know the nuts and bolts of Mecanim and other character animation related tools in Unity. It offers you step-by-step instructions for preparing and exporting rigged models and animation sequences from commonly used 3D packages, such as Maya, 3ds Max and Blender. This book explores the new set of animation tools introduced with Mecanim in Unity. Approaching its subject matter through a typical genre–a zombie action game, character animation techniques are explored using real examples of player input and interaction, enemy behavior, and other aspects of game dynamics. As the book progresses, the reader will understand how these elements fit together in a small game development workflow. We will begin with a demonstration of the process of getting a rigged character into Unity and setting it up to use provided animation sequences. We will also consider a few industry standard 3D packages and how these can be used to rig a humanoid character for use in Unity. We will demonstrate the retargeting capabilities of Mecanim’s Humanoid Animation type by adjusting motion sequences to fit disparate character types in our game. After this, we will look at Ragdoll physics and the implementation of this commonly used technique in a Mecanim workflow. The book culminates with a thorough dissection of the enemy character AI * incorporating the Mecanim elements detailed in the previous chapters. Unity Character Animation with Mecanim will provide you with a detailed exploration of the interaction between game development and character animation, and will broaden your understanding of the rich animation toolset within Unity. Style and approach A comprehensive guide, featuring step- by- step practical tutorials using sample assets, showing you how to build fully controllable characters and non-player characters/enemies.
Windows Malware Analysis Essentials
¥90.46
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware Understand how to decipher x86 assembly code from source code inside your favourite development environment A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes Get introduced to static and dynamic analysis methodologies and build your own malware lab Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario Deal with other malware vectors such as pdf and MS-Office based malware as well as *s and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with de*ions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.
Linux Shell Scripting Essentials
¥90.46
Learn shell *ing to solve complex shell-related problems and to efficiently automate your day-to-day tasks About This Book Familiarize yourself with the terminal by learning about powerful shell features Automate tasks by writing shell *s for repetitive work Packed with easy-to-follow, hands-on examples to help you write any type of shell * with confidence Who This Book Is For This book is aimed at administrators and those who have a basic knowledge of shell *ing and who want to learn how to get the most out of writing shell *s. What You Will Learn Write effective shell *s easily Perform search operations and manipulate large text data with a single shell command Modularize reusable shell *s by creating shell libraries Redirect input, output, and errors of a command or * execution to other streams Debug code with different shell debugging techniques to make your *s bug-free Manage processes, along with the environment variables needed to execute them properly Execute and embed other languages in your *s Manage creation, deletion, and search operations in files In Detail Shell *ing is a quick method to prototype complex applications or problems. Shell *s are a collection of commands to automate tasks, usually those for which the user has a repeated need, when working on Linux-based systems. Using simple commands or a combination of them in a shell can solve complex problems easily. This book starts with the basics, including essential commands that can be executed on Linux systems to perform tasks within a few nanoseconds. You’ll learn to use outputs from commands and transform them to show the data you require. Discover how to write shell *s easily, execute * files, debug, and handle errors. Next, you’ll explore environment variables in shell programming and learn how to customize them and add a new environment. Finally, the book walks you through processes and how these interact with your shell *s, along with how to use *s to automate tasks and how to embed other languages and execute them. Style and approach This book is a pragmatic guide to writing efficient shell programs, complete with hands-on examples and tips.
Web Penetration Testing with Kali Linux - Second Edition
¥90.46
Build your defense against web attacks with Kali Linux 2.0 About This Book Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0 Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide. What You Will Learn Set up your lab with Kali Linux 2.0 Identify the difference between hacking a web application and network hacking Understand the different techniques used to identify the flavor of web applications Expose vulnerabilities present in web servers and their applications using server-side attacks Use SQL and cross-site *ing (XSS) attacks Check for XSS flaws using the burp suite proxy Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about *ing and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.
PostgreSQL for Data Architects
¥90.46
This book is for developers and data architects who have some exposure to databases. It is assumed that you understand the basic concepts of tables and common database objects, including privileges and security.
Mastering Responsive Web Design with HTML5 and CSS3
¥90.46
If you already know some HTML and CSS and understand the principles of responsive web design, this book is for you. There's something here for you to learn regardless of whether you're a web designer or web developer, or whether you're a seasoned expert web professional.

购物车
个人中心

