Tuesday, 26 March 2019

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks 1st ed. Edition, Kindle Edition by Mike O'Leary (Author)

Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.
Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems.
Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways beginning with elementary attacks against browsers and culminating with a case study of the compromise of a defended e-commerce site.
The author, who has coached his university’s cyber defense team three times to the finals of the National Collegiate Cyber Defense Competition, provides a practical, hands-on approach to cyber security. 
Buy :


PDF Download :


R Projects For Dummies by Joseph Schmuller (Author)

R Projects For Dummies offers a unique learn-by-doing approach. You will increase the depth and breadth of your R skillset by completing a wide variety of projects. By using R’s graphics, interactive, and machine learning tools, you’ll learn to apply R’s extensive capabilities in an array of scenarios. 

The depth of the project experience is unmatched by any other content online or in print. And you just might increase your statistics knowledge along the way, too!

Buy :

R Projects For Dummies Paperback – 2018 by Joseph Schmuller (Author) 

PDF Download :

R Projects For Dummies Paperback – 2018 by Joseph Schmuller (Author) 





C Programming Language 2nd Edition by Brian. W Kernighan (Author)

C Programming Language 2nd Edition is a book that gives you just what you need to know about this powerful programming language. Unlike most of its rivals, which try to pack in irrelevant information as well, this book comes jam-packed with the most accurate and handy information that any lover of this programming language could possibly need. This second edition is inclusive of all the changes that have come about in the language, making the book a powerful resource for its readers.
This book proves itself to be a complete and accurate guide for ANSI standard C programming language. It has been written by the very same developers who developed C, which is beneficial for its readers, as it gives them the edge over other books. The book shows you exactly how you can make the most of the rich set of operators that C has to offer. It also familiarizes you with other concepts that include improved control flow, economy of expression and data structures as well.
The second edition of the book has been rewritten, so as to include many more examples than before. It also comes with problem sets that aim to clarify the doubts that you have, concerning the complicated language constructs of this language and their implementation as well.
C Programming Language 2nd Edition has been published by Pearson Education (Singapore) Pte. Ltd., in the year 2008 and is available in paperback.
Key Features

  • The book is packed with multiple examples and problem sets.
  • The recent edition of the book is inclusive of all the latest changes that have been made to the language.

Buy :

C Programming Language 2nd Edition Paperback – 2008 by Brian. W Kernighan (Author) 

PDF Download :

C Programming Language 2nd Edition Paperback – 2008 by Brian. W Kernighan (Author) 



Java Language Features: With Modules, Streams, Threads, I/O, and Lambda Expressions 2nd Edition, by Kishori Sharan (Author)

Work with essential and advanced features of the Java programming language such as Java modules development, lambda expressions (closures), inner classes, threads, I/O, Collections, garbage collection, and more. Author Kishori Sharan provides over 50 diagrams and 290 complete programs to help you visualize and better understand the topics covered in this book.

Java Language Features, Second Edition starts with a series of chapters on the essential language features provided by Java, including annotations, reflection, and generics. These topics are then complemented by details of how to use lambda expressions, allowing you to build powerful and efficient Java programs. The chapter on threads follows this up and discusses everything from the very basic concepts of a thread to the most advanced topics such as synchronizers, the fork/join framework, and atomic variables.

This book contains unmatched coverage of Java NIO, the Stream API, the Path API, the FileVisitor API, the watch service, and asynchronous file I/O. With this in-depth knowledge, your data- and file-management programs will be able to take advantage of every feature of Java's powerful I/O framework and much more.

Additionally, three appendices are available for free via the Download Source Code on apress.com. These appendices will give you a head start on the most important features of Java 10 and the new Java versioning scheme.


What You’ll Learn
  • Use essential and advanced features of the Java language
  • Code Java annotations and inner classes
  • Work with reflection, generics, and threads
  • Take advantage of the garbage collector
  • Manage streams with the Stream API


Who This Book Is For

Those new to Java programming and continues the learning Java journey; it is recommended that you read an introductory Java programming book first, such as Beginning Java Fundamentals, from Apress.
Buy :
PDF Download :


Monday, 25 March 2019

Building a Recommendation System with R by Suresh K. Gorakala (Author), Michele Usuelli (Author)

If you are a competent developer with some knowledge of machine learning and R, and want to further enhance your skills to build recommendation systems, then this book is for you.
Buy :

Building a Recommendation System with R Paperback – Import, 29 Sep 2015 by Suresh K. Gorakala (Author), Michele Usuelli (Author) 

PDF Download :

Building a Recommendation System with R Paperback – Import, 29 Sep 2015 by Suresh K. Gorakala (Author), Michele Usuelli (Author) 




Sunday, 24 March 2019

Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and Java Script by Harry J.W.Percival (Author)

By taking you through the development of a real web application from beginning to end, the second edition of this hands-on guide demonstrates the practical advantages of test-driven development (TDD) with Python. Youíll learn how to write and run tests before building each part of your app and then develop the minimum amount of code required to pass those tests. The result? Clean code that works.
In the process, youíll learn the basics of Django, Selenium, Git, jQuery and Mock, along with current web development techniques. If youíre ready to take your Python skills to the next level, this bookóupdated for Python 3.6óclearly demonstrates how TDD encourages simple designs and inspires confidence.

Dive into the TDD workflow, including the unit test/code cycle and refactoring
Use unit tests for classes and functions and functional tests for user interactions within the browser
Learn when and how to use mock objects and the pros and cons of isolated vs. integrated tests
Test and automate your deployments with a staging server
Apply tests to the third-party plugins you integrate into your site
Run tests automatically by using a Continuous Integration environment
Use TDD to build a REST API with a front-end Ajax interface 


Buy :

Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and Java Script Paperback – 2017 by Harry J.W.Percival (Author) 

PDF Download :

Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium, and Java Script Paperback – 2017 by Harry J.W.Percival (Author) 




Programming with MicroPython by Nicholas H. Tollervey (Author)

It's an exciting time to get involved with MicroPython, the re-implementation of Python 3 for microcontrollers and embedded systems. This practical guide delivers the knowledge you need to roll up your sleeves and create exceptional embedded projects with this lean and efficient programming language. If you're familiar with Python as a programmer, educator, or maker, you're ready to learn-and have fun along the way.

 Author Nicholas Tollervey takes you on a journey from first steps to advanced projects. You'll explore the types of devices that run MicroPython, and examine how the language uses and interacts with hardware to process input, connect to the outside world, communicate wirelessly, make sounds and music, and drive robotics projects. Work with MicroPython on four typical devices: PyBoard, the micro:bit, Adafruit's Circuit Playground Express, and ESP8266/ESP32 boards Explore a framework that helps you generate, evaluate, and evolve embedded projects that solve real problems Dive into practical MicroPython examples: 

visual feedback, input and sensing, GPIO, networking, sound and music, and robotics Learn how idiomatic MicroPython helps you express a lot with the minimum of resources Take the next step by getting involved with the Python community

Buy :

Programming with MicroPython Paperback – 6 Oct 2017 by Nicholas H. Tollervey (Author) 

PDF Download :

Programming with MicroPython Paperback – 6 Oct 2017 by Nicholas H. Tollervey (Author) 




Saturday, 23 March 2019

Personal Cybersecurity: How to Avoid and Recover from Cybercrime 1st ed. Edition, Kindle Edition by Marvin Waschke (Author)

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual users at risk are increasing in step with accelerating mutation rates of malware and cybercriminal delivery systems.
Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. Users who neglect to learn and adopt the new ways of protecting themselves in their work and private environments put themselves, their associates, and their companies at risk of inconvenience, violation, reputational damage, data corruption, data theft, system degradation, system destruction, financial harm, and criminal disaster. This book shows what actions to take to limit the harm and recover from the damage.
Instead of laying down a code of "thou shalt not" rules that admit of too many exceptions and contingencies to be of much practical use, cloud expert Marvin Waschke equips you with the battlefield intelligence, strategic understanding, survival training, and proven tools you need to intelligently assess the security threats in your environment and most effectively secure yourself from attacks. Through instructive examples and scenarios, the author shows you how to adapt and apply best practices to your own particular circumstances, how to automate and routinize your personal cybersecurity, how to recognize security breaches and act swiftly to seal them, and how to recover losses and restore functionality when attacks succeed.
What You'll Learn
  • Discover how computer security works and what it can protect us from
  • See how a typical hacker attack works
  • Evaluate computer security threats to the individual user and corporate systems
  • Identify the critical vulnerabilities of a computer connected to the Internet
  • Manage your computer to reduce vulnerabilities to yourself and your employer
  • Discover how the adoption of newer forms of biometric authentication affects you
  • Stop your router and other online devices from being co-opted into disruptive denial of service attacks
Who This Book Is For

Proficient and technically knowledgeable computer users who are anxious about cybercrime and want to understand the technology behind both attack and defense but do not want to go so far as to become security experts. Some of this audience will be purely home users, but many will be executives, technical managers, developers, and members of IT departments who need to adopt personal practices for their own safety and the protection of corporate systems. Many will want to impart good cybersecurity practices to their colleagues. IT departments tasked with indoctrinating their users with good safety practices may use the book as training material.
 
Buy :
PDF Download :
 

Cyber Security: Analytics, Technology and Automation (Intelligent Systems, Control and Automation: Science and Engineering) Hardcover – 10 Jun 2015 by Martti Lehto (Editor), Pekka Neittaanmäki (Editor)

The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out.
The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

Buy :

PDF Download :



Popular Posts

Categories

100 Python Programs for Beginner (49) AI (34) Android (24) AngularJS (1) Assembly Language (2) aws (17) Azure (7) BI (10) book (4) Books (173) C (77) C# (12) C++ (82) Course (67) Coursera (226) Cybersecurity (24) data management (11) Data Science (128) Data Strucures (8) Deep Learning (20) Django (14) Downloads (3) edx (2) Engineering (14) Excel (13) Factorial (1) Finance (6) flask (3) flutter (1) FPL (17) Google (34) Hadoop (3) HTML&CSS (47) IBM (25) IoT (1) IS (25) Java (93) Leet Code (4) Machine Learning (59) Meta (22) MICHIGAN (5) microsoft (4) Nvidia (3) Pandas (4) PHP (20) Projects (29) Python (929) Python Coding Challenge (354) Python Quiz (22) Python Tips (2) Questions (2) R (70) React (6) Scripting (1) security (3) Selenium Webdriver (3) Software (17) SQL (42) UX Research (1) web application (8) Web development (2) web scraping (2)

Followers

Person climbing a staircase. Learn Data Science from Scratch: online program with 21 courses