Go To English Version 超过100万源码资源,1000万源码文件免费下载
  • Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra,... ... a cheap but effective cluster infrastructure. How to make queries, reports, and graphs that business demands. How to manage and exploit unstructured and No-SQL data sources. How use tools to monitor the performance of your architecture. How to integrate ...
  • Big.Data.SMACK.A.Guide.to.Apache.Spark.Mesos.Akka.Cassandra.and.... ... a cheap but effective cluster infrastructure. How to make queries, reports, and graphs that business demands. How to manage and exploit unstructured and No-SQL data sources. How use tools to monitor the performance of your architecture. How to integrate ...
  • Expert.Oracle.Indexing.and.Access.Paths.2nd.epub ... that makes appropriate use of indexing, and especially of the vendor-specific indexing features on offer. Few databases fully exploit the wealth of data access mechanisms provided by Oracle. Expert Oracle Indexing and Access Paths helps by bringing ...
  • Python: Penetration Testing for Developers ... yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting ...
  • Python.Penetration.Testing.for.Developers ... use the Metasploit Remote Procedure Call to automate exploit generation and execution Exploit the Remote File Inclusion to gain ... Chapter 7: Cracking the Perimeter with Python Chapter 8: Exploit Development with Python, Metasploit, and Immunity Chapter 9: ...
  • Big Data SMACKBig Data SMACK(Apress,2016) ... a cheap but effective cluster infrastructure. How to make queries, reports, and graphs that business demands. How to manage and exploit unstructured and No-SQL data sources. How use tools to monitor the performance of your architecture. How to integrate ...
  • sip for python ... so that the easiest way of creating a specification file is to edit the corresponding header file. SIP makes it easy to exploit existing C or C++ libraries in a productive interpretive programming environment. SIP also makes it easy to take a Python ...
  • Mastering.Modern.Web.Penetration.Testing ... of the redundant tasks See different kinds of newly-designed security headers and how they help to provide security Exploit and detect different kinds of XSS vulnerabilities Protect your web application using filtering mechanisms Understand old school and ...
  • An.Introduction.to.Machine.Learning ... networks, and support vector machines. Later chapters show how to combine these simple tools by way of “boosting,” how to exploit them in more complicated domains, and how to deal with diverse advanced practical issues. One chapter is dedicated to the ...
  • Penetration.Testing.with.Raspberry.Pi.2nd.Edition.epub ... Chapter 2. Preparing for Battle Chapter 3. Planning the Attack Chapter 4. Explore the Target - Recon and Weaponize Chapter 5. Taking Action - Intrude and Exploit Chapter 6. Finishing the Attack - Report and Withdraw Chapter 7. Alternative Pi Projects