-
-
-
-
Expert.Oracle.Indexing.and.Access.Paths.2nd.epub
... that makes appropriate use of indexing, and especially of the vendor-specific indexing features on offer.
Few databases fully exploit the wealth of data access mechanisms provided by Oracle. Expert Oracle Indexing and Access Paths helps by bringing ...
-
Python: Penetration Testing for Developers
... yourself with the generation of Metasploit resource files and use the Metasploit Remote Procedure Call to automate exploit generation and execution
Exploit the Remote File Inclusion to gain administrative access to systems with Python and other scripting ...
-
Python.Penetration.Testing.for.Developers
... use the Metasploit Remote Procedure Call to automate exploit generation and execution
Exploit the Remote File Inclusion to gain ...
Chapter 7: Cracking the Perimeter with Python
Chapter 8: Exploit Development with Python, Metasploit, and Immunity
Chapter 9: ...
-
Big Data SMACKBig Data SMACK(Apress,2016)
... a cheap but effective cluster infrastructure.
How to make queries, reports, and graphs that business demands.
How to manage and exploit unstructured and No-SQL data sources.
How use tools to monitor the performance of your architecture.
How to integrate ...
-
sip for python
... so that the easiest way of creating a specification file is to edit the corresponding header file.
SIP makes it easy to exploit existing C or C++ libraries in a productive interpretive programming environment. SIP also makes it easy to take a Python ...
-
Mastering.Modern.Web.Penetration.Testing
... of the redundant tasks
See different kinds of newly-designed security headers and how they help to provide security
Exploit and detect different kinds of XSS vulnerabilities
Protect your web application using filtering mechanisms
Understand old school and ...
-
An.Introduction.to.Machine.Learning
... networks, and support vector machines. Later chapters show how to combine these simple tools by way of “boosting,” how to exploit them in more complicated domains, and how to deal with diverse advanced practical issues. One chapter is dedicated to the ...
-
Penetration.Testing.with.Raspberry.Pi.2nd.Edition.epub
...
Chapter 2. Preparing for Battle
Chapter 3. Planning the Attack
Chapter 4. Explore the Target - Recon and Weaponize
Chapter 5. Taking Action - Intrude and Exploit
Chapter 6. Finishing the Attack - Report and Withdraw
Chapter 7. Alternative Pi Projects
-