Penetration Testing with Raspberry Pi – Second Edition book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. …
Nginx HTTP Server – Fourth Edition
Nginx HTTP Server – Fourth Edition is a detailed guide to setting up Nginx in ways that correspond to actual production situations: as a standalone server, as a reverse proxy, interacting with applications via FastCGI, and more. …
Mastering Tableau 2019.1 – Second Edition
Tableau is one of the leading business intelligence (BI) tools used to solve BI and analytics challenges. With Mastering Tableau 2019.1 – Second Edition, you will master Tableau’s features and offerings in various paradigms of the BI domain.(Limited-time offer) …
Mastering ServiceNow – Second Edition
With Mastering ServiceNow – Second Edition, give your ServiceNow Helsinki implementation a powerful kick-start by understanding the deep capabilities of the platform. Learn by doing with an extended, comprehensive example, creating a feature-rich, secure and automated application from the ground up. (Limited-time offer) …
Machine Learning for Cybersecurity Cookbook
With Machine Learning for Cybersecurity Cookbook, you’ll learn how to use Python libraries such as TensorFlow and scikit-learn to implement the latest artificial intelligence (AI) techniques and handle challenges faced by cybersecurity researchers. …
Packt – Java Fundamentals
Since its inception, Java has stormed the programming world. Its features and functionalities provide developers with the tools needed to write robust cross-platform applications. Java Fundamentals introduces you to these tools and functionalities that will enable you to create Java programs. …
Information Security Handbook
Information Security Handbook starts with the concept of information security and shows you why it’s important. It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. …
Improving Your Splunk Skills
Splunk makes it easy for you to take control of your data and drive your business with the cutting edge of operational intelligence and business analytics. Through Improving Your Splunk Skills, you’ll implement new services and utilize them to quickly and efficiently process machine-generated big data. …
Hands-on Design Patterns with Kotlin
The mission of this book is to ease the adoption of design patterns in Kotlin and provide good practices for programmers. Hands-on Design Patterns with Kotlin begins by showing you the practical aspects of smarter coding in Kotlin, explaining the basic Kotlin syntax and the impact of design patterns. …
Hands-On Application Penetration Testing with Burp Suite
Hands-On Application Penetration Testing with Burp Suite starts by setting up the environment to begin an application penetration test. You will be able to configure the client and apply target whitelisting. You will also learn to setup and configure Android and IOS devices to work with Burp Suite. …