IT eBooks
Download, Read, Use
Attacking Network Protocols
Attacking Network Protocols

Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world's leading bug ­hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately ­protect vulnerabilities. You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to: Capture, manipulate, and replay packets; Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol; Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service; Use capture and analysis tools like ­Wireshark and develop your ow ...
Gray Hat C#
Gray Hat C#

Learn to use C#'s powerful set of core ­libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices. After a crash course in C# and some of its advanced features, you'll learn how to: Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads; Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections; Write a .NET decompiler for OS X and Linux; Parse and read offline registry hives to dump system information; Automate the security tools Arachni and Metasploit using their MSGPACK RPCs. Streamline and simplify your workday by making the most of C#'s extensive repertoire of powerful tools and libraries with Gray Hat C#. ...
Cracking Codes with Python
Cracking Codes with Python

Learn how to program in Python while making and breaking ciphers - algorithms used to create and send secret messages! After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today's online transactions, including digital signatures, email, and Bitcoin. Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you'll have learned how to code in Python and you'll have the clever programs to prove it! You'll also learn how to: Combine loops, variables, and flow control statements into real working programs; Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish; Create test programs to make sur ...
Spark: The Definitive Guide
Spark: The Definitive Guide

Learn how to use, deploy, and maintain Apache Spark with this comprehensive guide, written by the creators of the open-source cluster-computing framework. With an emphasis on improvements and new features in Spark 2.0, authors Bill Chambers and Matei Zaharia break down Spark topics into distinct sections, each with unique goals. You'll explore the basic operations and common functions of Spark's structured APIs, as well as Structured Streaming, a new high-level API for building end-to-end streaming applications. Developers and system administrators will learn the fundamentals of monitoring, tuning, and debugging Spark, and explore machine learning techniques and scenarios for employing MLlib, Spark's scalable machine-learning library. Get a gentle overview of big data and Spark; Learn about DataFrames, SQL, and Datasets - Spark's core APIs - through worked examples; Dive into Spark's low-level APIs, RDDs, and execution of SQL and DataFrames; Understand how Spark runs on a cluster ...
Concurrency in Go
Concurrency in Go

Concurrency can be notoriously difficult to get right, but fortunately, the Go open source programming language makes working with concurrency tractable and even easy. If you're a developer familiar with Go, this practical book demonstrates best practices and patterns to help you incorporate concurrency into your systems. Author Katherine Cox-Buday takes you step-by-step through the process. You'll understand how Go chooses to model concurrency, what issues arise from this model, and how you can compose primitives within this model to solve problems. Learn the skills and tooling you need to confidently write and implement concurrent systems of any size. Understand how Go addresses fundamental problems that make concurrency difficult to do correctly; Learn the key differences between concurrency and parallelism; Dig into the syntax of Go's memory synchronization primitives; Form patterns with these primitives to write maintainable concurrent code; Compose patterns into a series of ...
Getting Started with Dwarf Fortress
Getting Started with Dwarf Fortress

Dwarf Fortress may be the most complex video game ever made, but all that detail makes for fascinating game play, as various elements collide in interesting and challenging ways. The trick is getting started. In this guide, Fortress geek Peter Tyson takes you through the basics of this menacing realm, and helps you overcome the formidable learning curve. The book's focus is the game's simulation mode, in which you're tasked with building a dwarf city. Once you learn how to establish and maintain your very first fortress, you can consult the more advanced chapters on resource management and training a dwarf military. You'll soon have stories to share from your interactions with the Dwarf Fortress universe. Create your own world, then locate a site for an underground fortress; Equip your party of dwarves and have them build workshops and rooms; Produce a healthy food supply so your dwarves won't starve (or go insane); Retain control over a fortress and dozens of dwarves, their chil ...
Embedded Linux Projects Using Yocto Project Cookbook
Embedded Linux Projects Using Yocto Project Cookbook

The embedded Linux world is standardizing around Yocto Project as the best integration framework to create reliable embedded Linux products. Yocto Project effectively shortens the time it takes to develop and maintain an embedded Linux product, and it increases its reliability and robustness by using proven and tested components. This book begins with the installation of a professional embedded Yocto setup, then advises you on best practices, and finally explains how to quickly get hands on with the Freescale ARM ecosystem and community layer, using the affordable and open source Wandboard embedded board. ...
Mastering Probabilistic Graphical Models Using Python
Mastering Probabilistic Graphical Models Using Python

Probabilistic graphical models is a technique in machine learning that uses the concepts of graph theory to concisely represent and optimally predict values in our data problems. Graphical models gives us techniques to find complex patterns in the data and are widely used in the field of speech recognition, information extraction, image segmentation, and modeling gene regulatory networks. This book starts with the basics of probability theory and graph theory, then goes on to discuss various models and inference algorithms. All the different types of models are discussed along with code examples to create and modify them, and also run different inference algorithms on them. There is an entire chapter that goes on to cover Naive Bayes model and Hidden Markov models. These models have been thoroughly discussed using real-world examples. ...
BEA WebLogic Server 8 For Dummies
BEA WebLogic Server 8 For Dummies

Provides an introduction to J2EE using the WebLogic platform, which claims the largest market share-about forty percent-of the Java application server market. Features the most comprehensive coverage of the component types of WebLogic in the friendly For Dummies style. Covers static resources, JSPs, taglibs and servlets, EJBs, and WebLogic's Web service development and deployment capabilities and tools. Teaches readers the basic administration and monitoring capabilities built into WebLogic, using a conversational and example-driven approach. ...
Arduino Music and Audio Projects
Arduino Music and Audio Projects

This book is for musical makers and artists who want to gain knowledge and inspiration for your own amazing creations. "Grumpy Mike" Cook, co-author of several books on the Raspberry Pi and frequent answerer of questions of the Arduino forums, brings you a fun and instructive mix and simple and complex projects to help you understand how the Arduino can work with the MIDI system to create musical instruments and manipulate sound. In Part I you'll find a set of projects to show you the possibilities of MIDI plus Arduino, covering both the hardware and software aspects of creating musical instruments. In Part II, you learn how to directly synthesize a wave form to create your own sounds with Arduino and concludes with another instrument project: the SpoonDuino. Finally, in Part III, you'll learn about signal processing with the Arduino Uno and the Due — how to create effects like delay, echo, pitch changes, and realtime backwards audio output. If you want to learn more ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026