13 resultater (0,26347 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

DevOps, DBAs, and DBaaS - Managing Data Platforms to Support Continuous Integration - Bog af Michael S. Cuppett - Paperback

Practical Arduino Engineering - Harold Timmis - Bog - APress - Booktok.dk

Practical Arduino Engineering - Harold Timmis - Bog - APress - Booktok.dk

Implement Arduino-based designs in your project, and build, debug, and extend it using a solid engineering approach. This second edition is expanded to provide a better understanding of the engineering process and what it means to be an end-to-end developer. You''ll start out by reviewing basic engineering procedures, from the fundamental requirements and preliminary design to prototyping and testing. You''ll then apply those principles to single devices like LCDs, potentiometers and GPS modules, and move on to the integration of several modules into a larger project, a sub-autonomous robot. This robot will include devices such as GPS, Bluetooth, an OLED screen, an accelerometer, humidity and temp sensor, motor drivers, and ultrasonic sensor. This version goes on to cover how to create 3D models with Fusion360, make your own PCBs using Eagle, and use and maintain a 3D printer. Each and every chapter exemplifies this process and demonstrates how you can profit from the implementation of solid engineering principles-regardless of whether you just play in your basement or you want to publicize and sell your devices. With Practical Adruino Engineering you''ll be able to review and improve this process, and even extend its scope. What You''ll Learn ● Set up the Arduino software landscape and project for testing ● Review the process of hardware engineering as applicable to Arduino projects ● Create 3D models for 3D printing using Fusion360 in a robot chassis project ● Make PCBs using Eagle and incorporate it into a sensor station shield project ● Use and maintain a 3D printer with your own project ● Create Arduino shields in Eagle ● Debug Arduino projects of varying complexities via LabVIEW ● Use a special Arduino board for Bluetooth to control domestic and mobile Arduino projects Who This Book Is For Primarily aimed at intermediate engineers or engineering students. However, this book is also great for beginners and any maker who wants to expand their abilities in a single book.

DKK 827.00
2

Beginning Ethical Hacking with Kali Linux - Sanjib Sinha - Bog - APress - Booktok.dk

Beginning Ethical Hacking with Kali Linux - Sanjib Sinha - Bog - APress - Booktok.dk

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux . With the theory out of the way, you''ll move on to an introduction to VirtualBox, networking, and common Linux commands, followed by the step-by-step procedure to build your own web server and acquire the skill to be anonymous . When you have finished the examples in the first part of your book, you will have all you need to carry out safe and ethical hacking experiments. After an introduction to Kali Linux, you will carry out your first penetration tests with Python and code raw binary packets for use in those tests. You will learn how to find secret directories on a target system, use a TCP client in Python, and scan ports using NMAP. Along the way you will discover effective ways to collect important information, track email, and use important tools such as DMITRY and Maltego, as well as take a look at the five phases of penetration testing. The coverage of vulnerability analysis includes sniffing and spoofing, why ARP poisoning is a threat, how SniffJoke prevents poisoning, how to analyze protocols with Wireshark, and using sniffing packets with Scapy. The next part of the book shows you detecting SQL injection vulnerabilities, using sqlmap, and applying brute force or password attacks. Besides learning these tools, you will see how to use OpenVas, Nikto, Vega, and Burp Suite. The book will explain the information assurance model and the hacking framework Metasploit, taking you through important commands, exploit and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosystem. In the final chapter you will acquire the skill of exploiting remote Windows and Linux systems and you will learn how to own a target completely. What You Will Learn - Master common Linux commands and networking techniques - Build your own Kali web server and learn to be anonymous - Carry out penetration testing using Python - Detect sniffing attacks and SQL injection vulnerabilities - Learn tools such as SniffJoke, Wireshark, Scapy, sqlmap, OpenVas, Nikto, and Burp Suite - Use Metasploit with Kali Linux - Exploit remote Windows and Linux systems Who This Book Is For Developers new to ethical hacking with a basic understanding of Linux programming.

DKK 827.00
1

Learn Rails 6 - Adam Notodikromo - Bog - APress - Booktok.dk

Agile Machine Learning - Matthew Hurst - Bog - APress - Booktok.dk

Agile Machine Learning - Matthew Hurst - Bog - APress - Booktok.dk

Build resilient applied machine learning teams that deliver better data products through adapting the guiding principles of the Agile Manifesto. Bringing together talented people to create a great applied machine learning team is no small feat. With developers and data scientists both contributing expertise in their respective fields, communication alone can be a challenge. Agile Machine Learning teaches you how to deliver superior data products through agile processes and to learn, by example, how to organize and manage a fast-paced team challenged with solving novel data problems at scale, in a production environment. The authors'' approach models the ground-breaking engineering principles described in the Agile Manifesto. The book provides further context, and contrasts the original principles with the requirements of systems that deliver a data product. What You''ll Learn - Effectively run a data engineering team that is metrics-focused, experiment-focused, and data-focused - Make sound implementation and model exploration decisions based on the data and the metrics - Know the importance of data wallowing: analyzing data in real time in a group setting - Recognize the value of always being able to measure your current state objectively - Understand data literacy, a key attribute of a reliable data engineer, from definitions to expectations Who This Book Is For Anyone who manages a machine learning team, or is responsible for creating production-ready inference components. Anyone responsible for data project workflow of sampling data; labeling, training, testing, improving, and maintaining models; and system and data metrics will also find this book useful. Readers should be familiar with software engineering and understand the basics of machine learning and working with data.

DKK 827.00
1

Cisco Networks - Chris Carthern - Bog - APress - Plusbog.dk

Cisco Networks - Chris Carthern - Bog - APress - Plusbog.dk

For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices. Cisco Networks, 2nd Edition is a practical guide and desk reference for Cisco engineers. This new edition will discuss tools that can be used to automate and troubleshoot networks. A new chapter on quality of service has been added to teach managing network resources by prioritizing specific types of network traffic. The new edition has an updated wireless section which focuses on an updated controller and integration with Cisco Identity Services Engine (ISE) and Cisco Prime Infrastructure. This practical desk companion doubles as a comprehensive overview of the basic knowledge and skills needed by CCNA and CCNP exam takers. Prior familiarity with Cisco routing and switching is desirable but not necessary, as Chris Carthern, Dr. Will Wilson, and Noel Rivera start their book with a review of network basics. Further they explain practical considerations and troubleshooting when establishing a physical medium for network communications. Later they explain the concept of network layers, intermediate LAN switching, and routing. Next they introduce you to the tools and automation used with Cisco networks. Moving forward they explain management planes, data planes, and control planes. Next they describe advanced security, trouble shooting, and network management. They conclude the book with a section which focuses on using network automation to automate Cisco IOS networks. What You Will Learn - Configure Cisco switches, routers, and data center devices in typical corporate network architectures - Use black-hat tools to conduct penetration testing on the security of your network - Configure and secure virtual private networks (VPNs) - Enable identity management in your network with the Cisco Identity Services Engine (ISE) Who This Book Is For Network designers, engineers, programmers, managers, and students.

DKK 986.00
2

Cyber Operations - Mike O'leary - Bog - APress - Booktok.dk

Cyber Operations - Mike O'leary - Bog - APress - Booktok.dk

Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. Systems from 2011 through 2017 are covered, including Windows 7, Windows 8, Windows 10, Windows Server 2012, and Windows Server 2016 as well as a range of Linux distributions, including Ubuntu, CentOS, Mint, and OpenSUSE. Key defensive techniques are integrated throughout and you will develop situational awareness of your network and build a complete defensive infrastructure, including log servers, network firewalls, web application firewalls, and intrusion detection systems. Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways. You will learn about Metasploit, browser attacks, privilege escalation, pass-the-hash attacks, malware, man-in-the-middle attacks, database attacks, and web application attacks. What You''ll Learn - Construct a testing laboratory to experiment with software and attack techniques - Build realistic networks that include active directory, file servers, databases, web servers, and web applications such as WordPress and Joomla! - Manage networks remotely with tools, including PowerShell, WMI, and WinRM - Use offensive tools such as Metasploit, Mimikatz, Veil, Burp Suite, and John the Ripper - Exploit networks starting from malware and initial intrusion to privilege escalation through password cracking and persistence mechanisms - Defend networks by developing operational awareness using auditd and Sysmon to analyze logs, and deploying defensive tools such as the Snort intrusion detection system, IPFire firewalls, and ModSecurity web application firewalls Who This Book Is For This study guide is intended for everyone involved in or interested in cybersecurity operations (e.g., cybersecurity professionals, IT professionals, business professionals, and students)

DKK 946.00
1