Practical Video Game BotsDevelop and use bots in video gaming to automate game processes and see possible ways to avoid this kind of automation. This book explains how bots can be very helpful in games such as multiplayer online games, both for training your character and for automating repetitious game processes in order to start a competition with human opponents much faster.
Some players might use bots for cheating or avoiding game rules to gain an advantage over opponents - a sophisticated form of hacking that includes some elements of artificial intelligence (AI). However, while Practical Video Game Bots considers these topics, it is not a cheater's guide. Rather, this book is an attempt to overcome the information vacuum regarding bot development in video game applications. Through the use of three case study game examples, it covers most methods and technologies that are used by bot developers, and the details of anti-cheating systems.
This book provides answers and useful advice for topics such ...
Beginning Modern UnixDiscover how to leverage modern Unix even if you've never worked with Unix before. This book presents everything in conceptual terms that you can understand, rather than tips to be committed raw to memory.
You will learn everyday tasks ranging from basic system administration - partitioning and mounting filesystems, software installation, network configuration, working from the command line) - to Bourne shell scripting, using graphical applications, as well as fanciful things such as emulation layers for Windows and Linux and virtualization with VirtualBox.
It's now 50 years since the creation of Unix but it is still growing. As Unix now moves to everyone's OS (open-source FreeBSD/Linux), it is the perfect time to start your journey with Beginning Modern Unix as your guide.
Live comfortably in a modern Unix environment, both on the command-line and in the graphical world; Choose the right hardware for Unix; Work with Unix in real world settings; Develop Unix applications; Re ...
Learning OpenStack Networking, 3rd EditionOpenStack Networking is a pluggable, scalable, and API-driven system to manage physical and virtual networking resources in an OpenStack-based cloud. Like other core OpenStack components, OpenStack Networking can be used by administrators and users to increase the value and maximize the use of existing datacenter resources. This third edition of Learning OpenStack Networking walks you through the installation of OpenStack and provides you with a foundation that can be used to build a scalable and production-ready OpenStack cloud.
In the initial chapters, you will review the physical network requirements and architectures necessary for an OpenStack environment that provide core cloud functionality. Then, you'll move through the installation of the new release of OpenStack using packages from the Ubuntu repository. An overview of Neutron networking foundational concepts, including networks, subnets, and ports will segue into advanced topics such as security groups, distributed virtual ...
Learning Kali LinuxWith more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You'll also explore the vulnerabilities that make those tests necessary.
Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You'll discover different techniques for extending Kali tools and creating your own toolset.
Learn tools for stress testing network stacks and applications; Perform network reconnaissance to determine what's available to attackers; Execute penetration tests using automated exploit tools such as Metasploit; Use c ...
CompTIA Linux+ Certification GuideLinux+ certification demonstrates technical competency and provides a broad awareness of Linux operating systems. Professionals who have achieved the Linux+ certification exhibit all-important knowledge of installation, operation, administration, and troubleshooting services.
The CompTIA Linux+ Certification Guide is an overview of the certification that gives you insights into the system architecture. You'll understand how to install and uninstall Linux distributions, followed by working with various package managers. Once you've grasped all this, you'll move on to manipulating files and processes at command-line interface (CLI) and creating, monitoring, killing, restarting, and modifying processes.
As you progress, you'll be equipped to work with display managers and learn how to create, modify, and remove user accounts and groups, as well as understand how to automate tasks. The last set of chapters helps you configure dates and set up local and remote system logging. In addit ...
Hands-On Red Team TacticsRed Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities. Hands-On Red Team Tactics starts with an overview of pentesting and Red Teaming, before giving you an introduction to few of the latest pentesting tools. We will then move on to exploring Metasploit and getting to grips with Armitage. Once you have studied the fundamentals, you will learn how to use Cobalt Strike and how to set up its team server.
The book introduces some common lesser known techniques for pivoting and how to pivot over SSH, before using Cobalt Strike to pivot. This comprehensive guide demonstrates advanced methods of post-exploitation using Cobalt Strike and introduces you to Command and Control (C2) servers and redirectors. All this will help you achieve persistence using beacons and data exfiltration, and will also give you the chance to run through the methodology to use Red Team activity tools such as Empire during a ...
Mastering Python for Networking and SecurityIt's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident, usually carried out by just hacking a simple network line. Increasing your network's security helps step up your defenses against cyber attacks. Meanwhile, Python is being used for increasingly advanced tasks, with the latest update introducing many new packages. This book focuses on leveraging these updated packages to build a secure network with the help of Python scripting.
This book covers topics from building a network to the different procedures you need to follow to secure it. You'll first be introduced to different packages and libraries, before moving on to different ways to build a network with the help of Python scripting. Later, you will learn how to check a network's vulnerability using Python security scripting, and understand how to check vulnerabilities in your network. As you progress through the chapters, you will also learn how ...
YammerBuild a successful Yammer implementation, make your workplace social and collaborative, create a culture of sharing, form expert communities and generate innovative solutions. Besides, this book will help to enhance your collaboration your suppliers, partners, and clients.
The author starts by giving an introduction to social collaborations and successful implementations of Yammer. Along the way, he explains the art of community management in Yammer using his hands-on experience of building communities. He then explains methods to keep a Yammer network engaged followed by a description of running a campaign on Yammer.
The second part of Yammer begins with ways you can engage entire organizations, including executives, on Yammer along with methods to measure the success of a Yammer network. You'll see how to get to grips with integrating Yammer with an existing platform and how to collaborate with customers, suppliers, and partners using Yammer. Finally, you'll learn various inn ...
Applied Deep LearningWork with advanced topics in deep learning, such as optimization algorithms, hyper-parameter tuning, dropout, and error analysis as well as strategies to address typical problems encountered when training deep neural networks. You'll begin by studying the activation functions mostly with a single neuron (ReLu, sigmoid, and Swish), seeing how to perform linear and logistic regression using TensorFlow, and choosing the right cost function.
The next section talks about more complicated neural network architectures with several layers and neurons and explores the problem of random initialization of weights. An entire chapter is dedicated to a complete overview of neural network error analysis, giving examples of solving problems originating from variance, bias, overfitting, and datasets coming from different distributions.
Applied Deep Learning also discusses how to implement logistic regression completely from scratch without using any Python library except NumPy, to let you appre ...
Hands-On Cloud Administration in AzureAzure continues to dominate the public cloud market and grow rapidly thanks to a number of recent innovations. Azure's wide range of services and support has led to a large number of customers switching to Azure cloud.
Hands-On Cloud Administration in Azure starts with the basics of Azure cloud fundamentals and key concepts of the cloud computing ecosystem and services. Then, you will gradually get acquainted with core services provided by Azure, including Azure VNet, types and assignments of IP addresses, and network security groups. You will also work on creating and administering Azure Virtual Machines, types of virtual machines (VMs), and design VM solutions based on computing workloads. As you make your way through the chapters, you will explore Azure App Service, discover how to host your web apps in Azure, and monitor and troubleshoot them. In the concluding chapters, you will learn more complex and abstract services, such as Azure Storage, Azure Backup, and Azure Site Recove ...