自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (4)
  • 收藏
  • 关注

空空如也

Head First Go

第一版,非提前發布版 書名: Head First Go 作者: Jay McGavren 出版社: O'Reilly Media 已修改: 06 4月 2019 語言: 英文 Go represents an attempt to improve on some weaknesses of traditional compiled programming languages. It de-emphasizes or removes error-prone language structures like class inheritance and exception handling. It features great concurrency support and automatic memory management (garbage collection). Existing Go books tend to be highly technical in nature, teaching all aspects of the language regardless of their relevance to beginners. This book, rather than talking about the features of Go in abstract terms, features simple, clear examples that demonstrate Go in action, and diagrams to explain difficult concepts. This book will not only teach developers basic language features, it will get them comfortable consulting error output, documentation, and search engines to find solutions to problems. It will teach all the conventions and techniques that employers expect an entry-level Go developer to know.

2019-04-24

Forging Python: Best practices and life lessons developing Python

書名: Forging Python: Best practices and life lessons developing Python 作者: Miki Tebeka 發佈於: 4月 2018 出版社: leanpub.com 語言: 英文

2019-04-23

Architecting Cloud Computing Solutions

Title: Architecting Cloud Computing Solutions Author: Kevin L. Jackson, Scott Goessling Length: 378 pages Edition: 1 Language: English Publisher: Packt Publishing Publication Date: 2018-05-30 ISBN-10: 178847242X ISBN-13: 9781788472425 Accelerating Business and Mission Success with Cloud Computing. Key Features A step-by-step guide that will practically guide you through implementing Cloud computing services effectively and efficiently. Learn to choose the most ideal Cloud service model, and adopt appropriate Cloud design considerations for your organization. Leverage Cloud computing methodologies to successfully develop a cost-effective Cloud environment successfully. Book Description Cloud adoption is a core component of digital transformation. Scaling the IT environment, making it resilient, and reducing costs are what organizations want. Architecting Cloud Computing Solutions presents and explains critical Cloud solution design considerations and technology decisions required to choose and deploy the right Cloud service and deployment models, based on your business and technology service requirements. This book starts with the fundamentals of cloud computing and its architectural concepts. It then walks you through Cloud service models (IaaS, PaaS, and SaaS), deployment models (public, private, community, and hybrid) and implementation options (Enterprise, MSP, and CSP) to explain and describe the key considerations and challenges organizations face during cloud migration. Later, this book delves into how to leverage DevOps, Cloud-Native, and Serverless architectures in your Cloud environment and presents industry best practices for scaling your Cloud environment. Finally, this book addresses (in depth) managing essential cloud technology service components such as data storage, security controls, and disaster recovery. By the end of this book, you will have mastered all the design considerations and operational trades required to adopt Cloud services, no matt

2019-04-23

Python Penetration Testing Essentials, 2nd Edition

Title: Python Penetration Testing Essentials, 2nd Edition Author: Mohit Length: 230 pages Edition: 2nd Revised edition Language: English Publisher: Packt Publishing Publication Date: 2018-05-30 ISBN-10: 1789138965 ISBN-13: 9781789138962 This book gives you the skills you need to use Python for penetration testing, with the help of detailed code examples. This book has been updated for Python 3.6.3 and Kali Linux 2018.1. Key Features Detect and avoid various attack types that put the privacy of a system at risk Leverage Python to build efficient code and eventually build a robust environment Learn about securing wireless applications and information gathering on a web server Book Description This book gives you the skills you need to use Python for penetration testing (pentesting), with the help of detailed code examples. We start by exploring the basics of networking with Python and then proceed to network hacking. Then, you will delve into exploring Python libraries to perform various types of pentesting and ethical hacking techniques. Next, we delve into hacking the application layer, where we start by gathering information from a website. We then move on to concepts related to website hacking―such as parameter tampering, DDoS, XSS, and SQL injection. By reading this book, you will learn different techniques and methodologies that will familiarize you with Python pentesting techniques, how to protect yourself, and how to create automated programs to find the admin console, SQL injection, and XSS attacks. What you will learn The basics of network pentesting including network scanning and sniffing Wireless, wired attacks, and building traps for attack and torrent detection Web server footprinting and web application attacks, including the XSS and SQL injection attack Wireless frames and how to obtain information such as SSID, BSSID, and the channel number from a wireless frame using a Python script The importance of web server signatures, email gathering, and why knowing the server signature is the first step in hacking Who This Book Is For If you are a Python programmer, a security researcher, or an ethical hacker and are interested in penetration testing with the help of Python, then this book is for you. Even if you are new to the field of ethical hacking, this book can help you find the vulnerabilities in your system so that you are ready to tackle any kind of attack or intrusion. Table of Contents PYTHON WITH PENETRATION TESTING AND NETWORKING SCANNING PENTESTING SNIFFING AND PENETRATION TESTING Network Attacks and Prevention WIRELESS PENTESTING Honeypot, Building A Trap for attackers FOOTPRINTING OF A WEB SERVER AND A WEB APPLICATION CLIENT-SIDE AND DDOS ATTACKS PENTESTING OF SQLI AND XSS

2019-04-23

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除