Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
2321
-
2322
-
2323
-
2324Publicado 2022Libro electrónico
-
2325Publicado 2021“…Chart an overview of the techniques and tools of machine learning including all the non-technological aspects necessary to be successful Gain practical understanding of machine learning used in oil and gas operations through contributed case studies Learn change management skills that will help gain confidence in pursuing the technology Understand the workflow of a full-scale project and where machine learning benefits (and where it does not)…”
Libro electrónico -
2326Publicado 2020Libro electrónico
-
2327Publicado 2018Tabla de Contenidos: “…Testing SSL configuration using Nmap -- Exploiting Heartbleed -- POODLE -- Custom encryption protocols -- Identifying encrypted and hashed information -- Hashing algorithms -- hash-identifier -- Frequency analysis -- Entropy analysis -- Identifying the encryption algorithm -- Common flaws in sensitive data storage and transmission -- Using offline cracking tools -- Using John the Ripper -- Using Hashcat -- Preventing flaws in cryptographic implementations -- Summary -- Chapter 9: AJAX, HTML5, and Client-Side Attacks -- Crawling AJAX applications -- AJAX Crawling Tool -- Sprajax -- The AJAX Spider - OWASP ZAP -- Analyzing the client-side code and storage -- Browser developer tools -- The Inspector panel -- The Debugger panel -- The Console panel -- The Network panel -- The Storage panel -- The DOM panel -- HTML5 for penetration testers -- New XSS vectors -- New elements -- New properties -- Local storage and client databases -- Web Storage -- IndexedDB -- Web Messaging -- WebSockets -- Intercepting and modifying WebSockets -- Other relevant features of HTML5 -- Cross-Origin Resource Sharing (CORS) -- Geolocation -- Web Workers -- Bypassing client-side controls -- Mitigating AJAX, HTML5, and client-side vulnerabilities -- Summary -- Chapter 10: Other Common Security Flaws in Web Applications -- Insecure direct object references -- Direct object references in web services -- Path traversal -- File inclusion vulnerabilities -- Local File Inclusion -- Remote File Inclusion -- HTTP parameter pollution -- Information disclosure -- Mitigation -- Insecure direct object references -- File inclusion attacks -- HTTP parameter pollution -- Information disclosure -- Summary -- Chapter 11: Using Automated Scanners on Web Applications -- Considerations before using an automated scanner -- Web application vulnerability scanners in Kali Linux -- Nikto -- Skipfish…”
Libro electrónico -
2328Publicado 2021“…Windows developers will begin with the basics of installation and then be introduced to the vast library of open source tools that they can integrate into their own workflows, using their existing development tools, such as Code, Visual Studio, and JetBrains IDEs. …”
Libro electrónico -
2329Publicado 2018“…Master shell basics and Unix tools and discover easy commands to perform complex tasks with speed Key Features Learn why the Bash shell is widely used on Linux and iOS Explore advanced shell concepts, such as pipes and redirection Understand how to use Unix command-line tools as building blocks for different tasks Book Description The most basic interface to a computer - the command line - remains the most flexible and powerful way of processing data and performing and automating various day-to-day tasks. …”
Libro electrónico -
2330“…Explore and learn the key building blocks of Microsoft Azure services and tools for implementing a disaster-recovery solution of any on-premises or cloud-based application. …”
Libro electrónico -
2331Publicado 2022“…It covers tools deep learning engineers can use in a wide range of fields, from biology to computer vision to business. …”
Libro electrónico -
2332
-
2333Publicado 2016Libro electrónico
-
2334Publicado 2017“…Examine the techniques and Java tools supporting the growing field of data science About This Book Your entry ticket to the world of data science with the stability and power of Java Explore, analyse, and visualize your data effectively using easy-to-follow examples Make your Java applications more capable using machine learning Who This Book Is For This book is for Java developers who are comfortable developing applications in Java. …”
Libro electrónico -
2335por Xu, Jun. authorTabla de Contenidos: “…Chapter 1: Introduction -- Chapter 2: Trace Characteristics -- Chapter 3: Trace Collection -- Chapter 4: Trace Analysis -- Chapter 5: Case Study: Benchmarking Tools -- Chapter 6: Case Study: Modern Disks -- Chapter 7: Case Study: RAID -- Chapter 8: Case Study: Hadoop -- Chapter 9: Case Study: Ceph -- Appendix A: Tools and Functions -- Appendix B: Blktrace and Tools…”
Publicado 2018
Libro electrónico -
2336Publicado 2019Tabla de Contenidos: “…A.3 Common x86 Instructions -- A.4 Common Code Constructs in Assembly -- B IMPLEMENTING PT_NOTE OVERWRITING USING LIBELF -- B.1 Required Headers -- B.2 Data Structures Used in elfinject -- B.3 Initializing libelf -- B.4 Getting the Executable Header -- B.5 Finding the PT_NOTE Segment -- B.6 Injecting the Code Bytes -- B.7 Aligning the Load Address for the Injected Section -- B.8 Overwriting the .note.ABI-tag Section Header -- B.9 Setting the Name of the Injected Section -- B.10 Overwriting the PT_NOTE Program Header -- B.11 Modifying the Entry Point -- C LIST OF BINARY ANALYSIS TOOLS -- C.1 Disassemblers -- C.2 Debuggers -- C.3 Disassembly Frameworks -- C.4 Binary Analysis Frameworks -- D FURTHER READING -- D.1 Standards and References -- D.2 Papers and Articles -- D.3 Books -- INDEX…”
Libro electrónico -
2337Publicado 2021Tabla de Contenidos: “…Getting Started -- Getting the Data -- Installing the Docker Image -- Essential Unix Concepts -- The Environment -- Executing a Command-Line Tool -- Five Types of Command-Line Tools -- Combining Command-Line Tools -- Redirecting Input and Output -- Working with Files and Directories -- Managing Output -- Help! …”
Libro electrónico -
2338Publicado 2015“…The third edition includes a new introduction and epilogue and two powerful new tools that show how Question Thinking can dramatically improve coaching and leadership. …”
Libro electrónico -
2339Publicado 2014Libro electrónico
-
2340Publicado 2019Tabla de Contenidos: “…Mastering Ethereum: implement advanced blockchain applications using Ethereum-supported tools, services, and protocols -- Contributors -- Table of Contents -- Preface -- Section 1: Blockchain -- Ethereum Refresher -- Chapter 1: Blockchain Architecture -- Chapter 2: Ethereum Ecosystems -- Chapter 3: Ethereum Assets -- Section 2: Decentralized Application Development Workflow -- Chapter 4: Mastering Smart Contracts -- Chapter 5: Mastering dApps -- Chapter 6: Tools, Frameworks, Components, and Services -- Chapter 7: Deployment on Testnet -- Chapter 8: Various dApps Integrations -- Chapter 9: Decentralized Exchanges Workflow -- Section 3: Ethereum Implementations -- Chapter 10: Machine Learning on the Ethereum Blockchain -- Chapter 11: Creating a Blockchain-based Social Media Platform -- Chapter 12: Creating a Blockchain-Based E-Commerce Marketplace -- Other Books You May Enjoy -- Index…”
Libro electrónico