Μετάβαση στο περιεχόμενο

Αναζήτηση στην κοινότητα

Εμφάνιση αποτελεσμάτων για τις ετικέτες 'english'.

  • Αναζήτηση με βάση τις ετικέτες

    Πληκτρολογήστε τις ετικέτες και χωρίστε τες με κόμμα.
  • Αναζήτηση με βάση τον συγγραφέα

Τύπος περιεχομένου


Ενότητες

  • GreekHacking
    • Κανόνες & Ανακοινώσεις
    • Καλωσόρισμα νέων μελών
    • Προτάσεις / Βελτιώσεις
    • Νέα σχετικά με το Hacking/Security
    • Ασφάλεια & Προστασία Δεδομένων
    • Εκτός Θέματος
  • Leaks
    • Hacking Tutorials
    • Anonymity & Privacy / Ανωνυμία και Προστασία Προσωπικών Δεδομένων
    • Προγράμματα για Hacking / Hacking Programs
    • Cracking Οδηγοί & Πληροφορίες
    • Βιβλία σχετικά με το Hacking
    • Προγράμματα - High Quality downloads
    • E-Books
    • XXX Movies

Categories

  • Ορολογίες
  • Hacking για αρχάριους
  • Hacking για προχωρημένους
  • Mobile Hacking
  • Cracking Tutorials
  • Hacking Computers
  • Hacking Tutorials στα Αγγλικά
  • Tutorials for hacks
  • Διάφοροι Οδηγοί
    • Οδηγοί σχετικά με τα Linux
    • Οδηγοί για υπολογιστές
    • Οδηγοί σχετικά με τα Mac
    • Οδηγοί για κινητά
  • Hacking Tutorials στα Αγγλικά Copy

Categories

  • Hacking
  • Ιστοσελίδες/Server
  • Hardware
  • Windows

Βρείτε αποτελέσματα...

Βρείτε αποτελέσματα που...


Ημερομηνία δημιουργίας

  • Start

    End


Τελευταία ενημέρωση

  • Start

    End


Φιλτράρισμα με βάση τον αριθμό των...

  1. This book will show you how to use Python, create your own hacking tools, and make the most out of available resources that are made using this programming language. If you do not have experience in programming, don’t worry – this book will show guide you through understanding the basic concepts of programming and navigating Python codes. This book will also serve as your guide in understanding common hacking methodologies and in learning how different hackers use them for exploiting vulnerabilities or improving security. You will also be able to create your own hacking scripts using Python, use modules and libraries that are available from third-party sources, and learn how to tweak existing hacking scripts to address your own computing needs. Hacking with Python The Ultimate Beginners Guide - Steve Tale.pdf
  2. Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don’t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense. Social Engineering The Science of Human Hacking 2nd Edition by Christopher Hadnagy.pdf
  3. Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. Key Features Analyze and improvise software and hardware with real-world examples Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2. Explore modern security techniques to identify, exploit, and avoid cyber threats Book Description If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. What you will learn Learn core reverse engineering Identify and extract malware components Explore the tools used for reverse engineering Run programs under non-native operating systems Understand binary obfuscation techniques Identify and analyze anti-debugging and anti-analysis tricks Who this book is for If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage. Table of Contents Preparing to Reverse Identification and extraction of hidden components The Low-Level Language Static and Dynamic Reversing Tools of the trade RE in Linux platforms RE in Windows platforms Sandboxing: Virtualization as a component for RE Binary Obfuscation Techniques Packing and Encryption Anti-analysis Tricks Practical Reverse Engineering of a Windows Executable Reversing various File-types Mastering Reverse Engineering Re-engineer your ethical hacking skills by Reginald Wong.pdf
  4. Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely. What You’ll Learn Perform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binaries Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee Who This Book is For Those interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role. The IoT Hacker's Handbook A Practical Guide to Hacking the Internet of Things by Aditya Gupta.pdf
  5. Chapters Getting started with C++ Literals operator precedence Floating Point Arithmetic Bit Operators Bit Manipulation Bit fields Arrays Iterators Basic input/output in c++ Loops File I/O C++ Streams Stream manipulators Flow Control Metaprogramming const keyword mutable keyword Friend keyword Type Keywords Basic Type Keywords Variable Declaration Keywords Keywords Returning several values from a function Polymorphism References Value and Reference Semantics C++ function "call by value" vs. "call by reference" Copying vs Assignment Pointers Pointers to members The This Pointer Smart Pointers Classes/Structures Function Overloading Operator Overloading Function Template Overloading Virtual Member Functions Inline functions Special Member Functions Non-Static Member Functions Constant class member functions C++ Containers Namespaces Header Files Using declaration std::string std::array std::vector std::map std::optional std::function: To wrap any element that is callable std::forward_list std::pair std::atomics std::variant std::iomanip std::any std::set and std::multiset std::integer_sequence Using std::unordered_map Standard Library Algorithms The ISO C++ Standard Inline variables Random number generation Date and time using <chrono> header Sorting Enumeration Iteration Regular expressions Implementation-defined behavior Exceptions Lambdas Value Categories Preprocessor Data Structures in C++ Templates Expression templates Curiously Recurring Template Pattern (CRTP) Threading Thread synchronization structures The Rule of Three, Five, And Zero RAII: Resource Acquisition Is Initialization RTTI: Run-Time Type Information Mutexes Recursive Mutex Semaphore Futures and Promises Atomic Types Type Erasure Explicit type conversions Unnamed types Type Traits Return Type Covariance Layout of object types Type Inference Typedef and type aliases type deduction Trailing return type Alignment Perfect Forwarding decltype SFINAE (Substitution Failure Is Not An Error) Undefined Behavior Overload resolution Move Semantics Pimpl Idiom auto Copy Elision Fold Expressions Unions Design pattern implementation in C++ Singleton Design Pattern User-Defined Literals Memory management C++11 Memory Model Scopes static_assert constexpr One Definition Rule (ODR) Unspecified behavior Argument Dependent Name Lookup Attributes Recursion in C++ Arithmitic Metaprogramming Callable Objects Client server examples Const Correctness Parameter packs Build Systems Concurrency With OpenMP Resource Management Storage class specifiers Linkage specifications Digit separators C incompatibilities Side by Side Comparisons of classic C++ examples solved via C++ vs C++11 vs C++14 vs C++17 Compiling and Building Common compile/linker errors (GCC) More undefined behaviors in C++ Unit Testing in C++ C++ Debugging and Debug-prevention Tools & Techniques Optimization in C++ Optimization Profiling Refactoring Techniques CPlusPlusNotesForProfessionals.pdf
  6. Chapters Getting started with algorithms Algorithm Complexity Big-O Notation Trees Binary Search Trees Check if a tree is BST or not Binary Tree traversals Lowest common ancestor of a Binary Tree Graph Graph Traversals Dijkstra’s Algorithm A* Pathfinding A* Pathfinding Algorithm Dynamic Programming Applications of Dynamic Programming Kruskal's Algorithm Greedy Algorithms Applications of Greedy technique Prim's Algorithm Bellman–Ford Algorithm Line Algorithm Floyd-Warshall Algorithm Catalan Number Algorithm Multithreaded Algorithms Knuth Morris Pratt (KMP) Algorithm Edit Distance Dynamic Algorithm Online algorithms Sorting Bubble Sort Merge Sort Insertion Sort Bucket Sort Quicksort Counting Sort Heap Sort Cycle Sort Odd-Even Sort Selection Sort Searching Substring Search Breadth-First Search Depth First Search Hash Functions Travelling Salesman Knapsack Problem Equation Solving Longest Common Subsequence Longest Increasing Subsequence Check two strings are anagrams Pascal's Triangle Algo:- Print a m*n matrix in square wise Matrix Exponentiation polynomial-time bounded algorithm for Minimum Vertex Cover Dynamic Time Warping Fast Fourier Transform Pseudocode AlgorithmsNotesForProfessionals.pdf
  7. Chapters Getting started with Java Language Type Conversion Getters and Setters Reference Data Types Java Compiler - 'javac' Documenting Java Code Command line Argument Processing The Java Command - 'java' and 'javaw' Literals Primitive Data Types Strings StringBuffer StringBuilder String Tokenizer Splitting a string into fixed length parts Date Class Dates and Time (java.time.*) LocalTime BigDecimal BigInteger NumberFormat Bit Manipulation Arrays Collections Lists Sets List vs Set Maps LinkedHashMap WeakHashMap SortedMap TreeMap and TreeSet Queues and Deques Dequeue Interface Enums Enum Map EnumSet class Enum starting with number Hashtable Operators Constructors Object Class Methods and Constructor Annotations Immutable Class Immutable Objects Visibility (controlling access to members of a class) Generics Classes and Objects Local Inner Class Nested and Inner Classes The java.util.Objects Class Default Methods Packages Inheritance Reference Types Console I/O Streams InputStreams and OutputStreams Readers and Writers Preferences Collection Factory Methods Alternative Collections Concurrent Collections Choosing Collections super keyword Serialization Optional Object References Exceptions and exception handling Calendar and its Subclasses Using the static keyword Properties Class Lambda Expressions Basic Control Structures BufferedWriter New File I/O File I/O Scanner Interfaces Regular Expressions Comparable and Comparator Java Floating Point Operations Currency and Money Object Cloning Recursion Converting to and from Strings Random Number Generation Singletons Autoboxing 2D Graphics in Java JAXB Class - Java Reflection Networking NIO - Networking HttpURLConnection JAX-WS Nashorn JavaScript engine Java Native Interface Functional Interfaces Fluent Interface Remote Method Invocation (RMI) Iterator and Iterable Reflection API ByteBuffer Applets Expressions JSON in Java XML Parsing using the JAXP APIs XML XPath Evaluation XOM - XML Object Model Polymorphism Encapsulation Java Agents Varargs (Variable Argument) Logging (java.util.logging) log4j / log4j2 Oracle Official Code Standard Character encoding Apache Commons Lang Localization and Internationalization Parallel programming with Fork/Join framework Non-Access Modifiers Process Java Native Access Modules Concurrent Programming (Threads) Executor, ExecutorService and Thread pools ThreadLocal Using ThreadPoolExecutor in MultiThreaded applications. Common Java Pitfalls Java Pitfalls - Exception usage Java Pitfalls - Language syntax Java Pitfalls - Threads and Concurrency Java Pitfalls - Nulls and NullPointerException Java Pitfalls - Performance Issues ServiceLoader Classloaders Creating Images Programmatically Atomic Types RSA Encryption Secure objects Security & Cryptography Security & Cryptography SecurityManager JNDI sun.misc.Unsafe Java Memory Model Java deployment Java plugin system implementations JavaBean Java SE 7 Features Java SE 8 Features Dynamic Method Dispatch Generating Java Code JShell Stack-Walking API Sockets Java Sockets FTP (File Transfer Protocol) Using Other Scripting Languages in Java C++ Comparison Audio Java Print Service CompletableFuture Runtime Commands Unit Testing Asserting Multi-Release JAR Files Just in Time (JIT) compiler Bytecode Modification Disassembling and Decompiling JMX Java Virtual Machine (JVM) XJC JVM Flags JVM Tool Interface Java Memory Management Java Performance Tuning Benchmarks FileUpload to AWS AppDynamics and TIBCO BusinessWorks Instrumentation for Easy Integration Installing Java (Standard Edition) Java Editions, Versions, Releases and Distributions The Classpath Resources (on classpath) JavaNotesForProfessionals.pdf
  8. Chapters Getting started with GNU/Linux Detecting Linux distribution name and version Getting information on a running Linux kernel Shell Check Disk Space Getting System Information ls command File Compression with 'tar' command Services Managing Services Modifying Users LAMP Stack tee command Secure Shell (SSH) SCP GnuPG (GPG) Network Configuration Midnight Commander Change root (chroot) Package Managers Compiling the Linux kernel LinuxNotesForProfessionals.pdf
  9. Chapters Getting started with Python Language Python Data Types Indentation Comments and Documentation Date and Time Date Formatting Enum Set Simple Mathematical Operators Bitwise Operators Boolean Operators Operator Precedence Variable Scope and Binding Conditionals Comparisons Loops Arrays Multidimensional arrays Dictionary List List comprehensions List slicing (selecting parts of lists) groupby() Linked lists Linked List Node Filter Heapq Tuple Basic Input and Output Files & Folders I/O os.path Iterables and Iterators Functions Defining functions with list arguments Functional Programming in Python Partial functions Decorators Classes Metaclasses String Formatting String Methods Using loops within functions Importing modules Difference between Module and Package Math Module Complex math Collections module Operator module JSON Module Sqlite3 Module The os Module The locale Module Itertools Module Asyncio Module Random module Functools Module The dis module The base64 Module Queue Module Deque Module Webbrowser Module tkinter pyautogui module Indexing and Slicing Plotting with Matplotlib graph-tool Generators Reduce Map Function Exponentiation Searching Sorting, Minimum and Maximum Counting The Print Function Regular Expressions (Regex) Copying data Context Managers (“with” Statement) The __name__ special variable Checking Path Existence and Permissions Creating Python packages Usage of "pip" module: PyPI Package Manager pip: PyPI Package Manager Parsing Command Line arguments Subprocess Library setup.py Recursion Type Hints Exceptions Raise Custom Errors / Exceptions Commonwealth Exceptions urllib Web scraping with Python HTML Parsing Manipulating XML Python Requests Post Distribution Property Objects Overloading Polymorphism Method Overriding User-Defined Methods String representations of class instances: __str__ and __repr__ methods Debugging Reading and Writing CSV Writing to CSV from String or List Dynamic code execution with `exec` and `eval` PyInstaller - Distributing Python Code Data Visualization with Python The Interpreter (Command Line Console) *args and **kwargs Garbage Collection Pickle data serialisation Binary Data Idioms Data Serialization Multiprocessing Multithreading Processes and Threads Python concurrency Parallel computation Sockets Websockets Sockets And Message Encryption/Decryption Between Client and Server Python Networking Python HTTP Server Flask Introduction to RabbitMQ using AMQPStorm Descriptor tempfile NamedTemporaryFile Input, Subset and Output External Data Files using Pandas Unzipping Files Working with ZIP archives Getting start with GZip Stack Working around the Global Interpreter Lock (GIL) Deployment Logging Web Server Gateway Interface (WSGI) Python Server Sent Events Alternatives to switch statement from other languages List destructuring (aka packing and unpacking) Accessing Python source code and bytecode Mixins Attribute Access ArcPy Abstract Base Classes (abc) Plugin and Extension Classes Immutable datatypes(int, float, str, tuple and frozensets) Incompatibilities moving from Python 2 to Python 3 2to3 tool Non-official Python implementations Abstract syntax tree Unicode and bytes Python Serial Communication (pyserial) Neo4j and Cypher using Py2Neo Basic Curses with Python Templates in python Pillow The pass statement CLI subcommands with precise help output Database Access Connecting Python to SQL Server PostgreSQL Python and Excel Turtle Graphics Python Persistence Design Patterns hashlib Creating a Windows service using Python Mutable vs Immutable (and Hashable) in Python configparser Optical Character Recognition Virtual environments Python Virtual Environment - virtualenv Virtual environment with virtualenvwrapper Create virtual environment with virtualenvwrapper in windows sys ChemPy - python package pygame Pyglet Audio pyaudio shelve IoT Programming with Python and Raspberry PI kivy - Cross-platform Python Framework for NUI Development Pandas Transform: Preform operations on groups and concatenate the results Similarities in syntax, Differences in meaning: Python vs. JavaScript Call Python from C# ctypes Writing extensions Python Lex-Yacc Unit Testing py.test Profiling Python speed of program Performance optimization Security and Cryptography Secure Shell Connection in Python Python Anti-Patterns Common Pitfalls Hidden Features PythonNotesForProfessionals.pdf
  10. Chapters Getting started with SQL Identifier Data Types NULL Example Databases and Tables SELECT GROUP BY ORDER BY AND & OR Operators CASE LIKE operator IN clause Filter results using WHERE and HAVING SKIP TAKE (Pagination) EXCEPT EXPLAIN and DESCRIBE EXISTS CLAUSE JOIN UPDATE CREATE Database CREATE TABLE CREATE FUNCTION TRY/CATCH UNION / UNION ALL ALTER TABLE INSERT MERGE cross apply, outer apply DELETE TRUNCATE DROP Table DROP or DELETE Database Cascading Delete GRANT and REVOKE XML Primary Keys Indexes Row number SQL Group By vs Distinct Finding Duplicates on a Column Subset with Detail String Functions Functions (Aggregate) Functions (Scalar/Single Row) Functions (Analytic) Window Functions Common Table Expressions Views Materialized Views Comments Foreign Keys Sequence Subqueries Execution blocks Stored Procedures Triggers Transactions Table Design Synonyms Information Schema Order of Execution Clean Code in SQL SQL Injection SQLNotesForProfessionals.pdf
  11. Chapters Getting started with C Language Comments Data Types Operators Boolean Strings Literals for numbers, characters and strings Compound Literals Bit-fields Arrays Linked lists Enumerations Structs Standard Math Iteration Statements/Loops: for, while, do-while Selection Statements Initialization Declaration vs Definition Command-line arguments Files and I/O streams Formatted Input/Output Pointers Sequence points Function Pointers Function Parameters Pass 2D-arrays to functions Error handling Undefined behavior Random Number Generation Preprocessor and Macros Signal handling Variable arguments Assertion Generic selection X-macros Aliasing and effective type Compilation Inline assembly Identifier Scope Implicit and Explicit Conversions Type Qualifiers Typedef Storage Classes Declarations Structure Padding and Packing Memory management Implementation-defined behaviour Atomics Jump Statements Create and include header files <ctype.h> — character classification & conversion Side Effects Multi-Character Character Sequence Constraints Inlining Unions Threads (native) Multithreading Interprocess Communication (IPC) Testing frameworks Valgrind Common C programming idioms and developer practices Common pitfalls CNotesForProfessionals.pdf
  12. Chapters Getting started with Excel VBA Arrays Conditional statements Ranges and Cells Named Ranges Merged Cells / Ranges Locating duplicate values in a range User Defined Functions (UDFs) Conditional formatting using VBA Workbooks Working with Excel Tables in VBA Loop through all Sheets in Active Workbook Use Worksheet object and not Sheet object Methods for Finding the Last Used Row or Column in a Worksheet Creating a drop-down menu in the Active Worksheet with a Combo Box File System Object Pivot Tables Binding autofilter ; Uses and best practices Application object Charts and Charting CustomDocumentProperties in practice PowerPoint Integration Through VBA How to record a Macro SQL in Excel VBA - Best Practices Excel-VBA Optimization VBA Security Debugging and Troubleshooting VBA Best Practices Excel VBA Tips and Tricks Common Mistakes ExcelVBANotesForProfessionals.pdf
  13. Chapters Getting started with MATLAB Language Initializing Matrices or arrays Conditions Functions Set operations Documenting functions Using functions with logical output For loops Object-Oriented Programming Vectorization Matrix decompositions Graphics: 2D Line Plots Graphics: 2D and 3D Transformations Controlling Subplot coloring in MATLAB Image processing Drawing Financial Applications Fourier Transforms and Inverse Fourier Transforms Ordinary Differential Equations (ODE) Solvers Interpolation with MATLAB Integration Reading large files Usage of `accumarray()` Function Introduction to MEX API Debugging Performance and Benchmarking Multithreading Using serial ports Undocumented Features MATLAB Best Practices MATLAB User Interfaces Useful tricks Common mistakes and errors MATLABNotesForProfessionals.pdf
  14. This hands-on guide will teach you all you need to know to bring your electronic inventions to life! This fully updated guide shows, step-by-step, how to disassemble, tweak, and re-purpose everyday devices for use in your own electronics creations. Written in the clear, easy-to-follow style that Dr. Simon Monk is famous for, this expanded edition includes coverage of both Arduino AND Raspberry Pi. Hacking Electronics: Learning Electronics with Arduino and Raspberry Pi, Second Edition, demonstrates each technique through fun DIY projects. Packed with full-color illustrations, photos, and diagrams, the book gets you up and running on your own projects right away. You will discover how to hack sensors, accelerometers, remote controllers, ultrasonic rangefinders, motors, stereo equipment, FM transmitters, and more. • Contains start-to-finish hacks for both Arduino AND Raspberry Pi! • Features new coverage of ready-made modules available online • Offers tips on working with Simon’s hacking electronics kit Hacking Electronics Learning Electronics with Arduino and Raspberry Pi Second Edition 2nd Edition Kindle Edition by Simon Monk.pdf
  15. Key Features Second edition of the bestselling book on Machine Learning A practical approach to key frameworks in data science, machine learning, and deep learning Use the most powerful Python libraries to implement machine learning and deep learning Get to know the best practices to improve and optimize your machine learning systems and algorithms Book Description Machine learning is eating the software world, and now deep learning is extending machine learning. Understand and work at the cutting edge of machine learning, neural networks, and deep learning with this second edition of Sebastian Raschka's bestselling book, Python Machine Learning. Thoroughly updated using the latest Python open source libraries, this book offers the practical knowledge and techniques you need to create and contribute to machine learning, deep learning, and modern data analysis. Fully extended and modernized, Python Machine Learning Second Edition now includes the popular TensorFlow deep learning library. The scikit-learn code has also been fully updated to include recent improvements and additions to this versatile machine learning library. Sebastian Raschka and Vahid Mirjalili's unique insight and expertise introduce you to machine learning and deep learning algorithms from scratch, and show you how to apply them to practical industry challenges using realistic and interesting examples. By the end of the book, you'll be ready to meet the new data analysis opportunities in today's world. If you've read the first edition of this book, you'll be delighted to find a new balance of classical ideas and modern insights into machine learning. Every chapter has been critically updated, and there are new chapters on key technologies. You'll be able to learn and work with TensorFlow more deeply than ever before, and get essential coverage of the Keras neural network library, along with the most recent updates to scikit-learn. What you will learn Understand the key frameworks in data science, machine learning, and deep learning Harness the power of the latest Python open source libraries in machine learning Explore machine learning techniques using challenging real-world data Master deep neural network implementation using the TensorFlow library Learn the mechanics of classification algorithms to implement the best tool for the job Predict continuous target outcomes using regression analysis Uncover hidden patterns and structures in data with clustering Delve deeper into textual and social media data using sentiment analysis Table of Contents Giving Computers the Ability to Learn from Data Training Simple Machine Learning Algorithms for Classification A Tour of Machine Learning Classifiers Using Scikit-Learn Building Good Training Sets - Data Preprocessing Compressing Data via Dimensionality Reduction Learning Best Practices for Model Evaluation and Hyperparameter Tuning Combining Different Models for Ensemble Learning Applying Machine Learning to Sentiment Analysis Embedding a Machine Learning Model into a Web Application Predicting Continuous Target Variables with Regression Analysis Working with Unlabeled Data - Clustering Analysis Implementing a Multilayer Artificial Neural Network from Scratch Parallelizing Neural Network Training with TensorFlow Going Deeper - The Mechanics of TensorFlow Classifying Images with Deep Convolutional Neural Networks Modeling Sequential Data using Recurrent Neural Networks Python Machine Learning - Second Edition Machine Learning and Deep Learning with Python, scikit-learn, and TensorFlow (English Edition) by Sebastian Raschka, Vahid Mirjalili.pdf
  16. Master Python scripting to build a network and perform security operations Key Features Learn to handle cyber attacks with modern Python scripting Discover various Python libraries for building and securing your network Understand Python packages and libraries to secure your network infrastructure Book Description It's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident, usually carried out by just hacking a simple network line. Increasing your network's security helps step up your defenses against cyber attacks. Meanwhile, Python is being used for increasingly advanced tasks, with the latest update introducing many new packages. This book focuses on leveraging these updated packages to build a secure network with the help of Python scripting. This book covers topics from building a network to the different procedures you need to follow to secure it. You'll first be introduced to different packages and libraries, before moving on to different ways to build a network with the help of Python scripting. Later, you will learn how to check a network's vulnerability using Python security scripting, and understand how to check vulnerabilities in your network. As you progress through the chapters, you will also learn how to achieve endpoint protection by leveraging Python packages along with writing forensic scripts. By the end of this book, you will be able to get the most out of the Python language to build secure and robust networks that are resilient to attacks. What you will learn Develop Python scripts for automating security and pentesting tasks Discover the Python standard library's main modules used for performing security-related tasks Automate analytical tasks and the extraction of information from servers Explore processes for detecting and exploiting vulnerabilities in servers Use network software for Python programming Perform server scripting and port scanning with Python Identify vulnerabilities in web applications with Python Use Python to extract metadata and forensics Who this book is for This book is ideal for network engineers, system administrators, or any security professional looking at tackling networking and security challenges. Programmers with some prior experience in Python will get the most out of this book. Some basic understanding of general programming structures and Python is required. Table of Contents Working with Python Scripting System Programming Packages Socket Programming HTTP Programming Analyzing Network Traffic Gathering Information from Servers Interacting with FTP ,SSH and SNMP Servers Working with Nmap Scanners Connecting with Metasploit Framework Interacting with Vulnerabilities Scanner Identifying Server Vulnerabilities in Web Applications Extracting Geolocation and Metadata from Documents,Images and Browsers Cryptography and Steganography Assessments Mastering Python for Networking and Security Leverage Python scripts and libraries to overcome networking and security issues by Jose Manuel Ortega.pdf
  17. OpenCart is an e-commerce cart application built with its own in-house Model-View-Controller-Language framework. With its popularity and ease of use for e-commerce, OpenCart is being used more and more to create custom extensions, themes, and pages. This book embarks on an exciting journey of creating custom themes, pages, and templates in OpenCart. It shows you how to change and manage the general setting of your store and manage the modules and their layout, along with files and folders of the default theme. You will explore the featured module to help you understand module code and its functionality. Finally, you will learn to create customized pages for feedback management and make an admin section where you will make forms and lists to perform CRUD functionalities and show this feedback at the frontend. OpenCart Theme and Module Development by Rupak Nepali.pdf
  18. Your guide to the functional programming paradigm Functional programming mainly sees use in math computations, including those used in Artificial Intelligence and gaming. This programming paradigm makes algorithms used for math calculations easier to understand and provides a concise method of coding algorithms by people who aren't developers. Current books on the market have a significant learning curve because they're written for developers, by developers—until now. Functional Programming for Dummies explores the differences between the pure (as represented by the Haskell language) and impure (as represented by the Python language) approaches to functional programming for readers just like you. The pure approach is best suited to researchers who have no desire to create production code but do need to test algorithms fully and demonstrate their usefulness to peers. The impure approach is best suited to production environments because it's possible to mix coding paradigms in a single application to produce a result more quickly. Functional Programming For Dummies uses this two-pronged approach to give you an all-in-one approach to a coding methodology that can otherwise be hard to grasp. Learn pure and impure when it comes to coding Dive into the processes that most functional programmers use to derive, analyze and prove the worth of algorithms Benefit from examples that are provided in both Python and Haskell Glean the expertise of an expert author who has written some of the market-leading programming books to date If you’re ready to massage data to understand how things work in new ways, you’ve come to the right place! Functional Programming For Dummies (For Dummies (ComputerTech)) 1st Edition by John Paul Mueller.Pdf
  19. Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You’ll Learn Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes Who This Book Is For Offensive security assessors and those who want a working knowledge of the process, its challenges, and its benefits. Current professionals will gain tradecraft and operational insight and non-technical readers will gain a high-level perspective of what it means to provide and be a customer of red team assessments. Professional Red Teaming Conducting Successful Cybersecurity Engagements by Jacob G. Oakley.Pdf
  20. Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking. What You Will Learn Discover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3 See the importance of networking in ethical hacking Gain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more Who This Book Is For Beginners wanting to learn ethical hacking alongside a modular object oriented programming language. Beginning Ethical Hacking with Python by Sinha, Sanjib.pdf
  21. A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key Features Employ advanced pentesting techniques with Kali Linux to build highly secure systems Discover stealth techniques to go undetected and penetrate modern infrastructures Explore red teaming techniques to exploit a secured environment Book Description Kali Linux, a successor to BackTrack, is one of the most popular Linux distributions used by security professionals and penetration testers to identify and exploit vulnerabilities in the target environment. As a tester or security practitioner, you'll be taken through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. You'll start by setting up a laboratory environment to validate an application using pentesting tools and techniques. You'll then cover passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll learn how to select, use, customize, and interpret results from different vulnerability scanners, and examine specific routes to the target, such as bypassing physical security and data exfiltration techniques. This Kali Linux book covers concepts such as attacking wireless networks, web services, and embedded devices and gives insights into social engineering. Once you are confident with these topics, you'll delve into the practical aspects of attacking user client systems by backdooring with fileless techniques, and then shift focus to the most vulnerable part of the network – directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, and understand pentesting and hacking techniques employed on embedded peripheral devices. What you will learn Configure the most effective Kali Linux tools to test infrastructure security Leverage Kali Linux to avoid detection in a controlled infrastructure Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of a network - the end users Who this book is for This third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, or security consultant who wants to optimize infrastructure security using advanced Kali Linux features. Prior penetration testing experience and basic knowledge of ethical hacking will help you make the most of this book. Table of Contents Goal-based Penetration Testing with Kali Linux Open Source Intelligence and Passive Reconnaissance Active Reconnaissance of the External and Internal Networks Vulnerability Assessment Physical Security and Social Engineering Wireless and Bluetooth Attacks Reconnaissance and Exploitation of Web-based Applications Client-side Exploitation Bypassing Security Controls Exploitation Action on the Objective and Lateral movement Privilege Escalation Command and Control Embedded and Peripheral Devices hacking Mastering Kali Linux for Advanced Penetration Testing Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition by Vijay Kumar Velu, Robert Beggs.Pdf
  22. This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabilities, connect the dots and identify patterns in the data on breaches. This analysis will assist security professionals not only in benchmarking their risk management programs but also in identifying forward looking security measures to narrow the path of future vulnerabilities. [James_Bone] Cognitive Hack The New Battleground in Cybersecurity… the Human Mind.pdf
  23. An In-depth guide updated with the latest version of Qt 5.11 including new features such as Quick Controls and Qt Gamepad Key Features Unleash the power of Qt 5.11 with C++ Build applications using Qt Widgets (C++) or Qt Quick (QML) Create cross-platform applications for mobile and desktop platforms with Qt 5 Book Description Qt 5.11 is an app development framework that provides a great user experience and develops full capability applications with Qt Widgets, QML, and even Qt 3D. Whether you're building GUI prototypes or fully-fledged cross-platform GUI applications with a native look and feel, Mastering Qt 5 is your fastest, easiest, and most powerful solution. This book addresses various challenges and teaches you to successfully develop cross-platform applications using the Qt framework, with the help of well-organized projects. Working through this book, you will gain a better understanding of the Qt framework, as well as the tools required to resolve serious issues, such as linking, debugging, and multithreading. You'll start off your journey by discovering the new Qt 5.11 features, soon followed by exploring different platforms and learning to tame them. In addition to this, you'll interact with a gamepad using Qt Gamepad. Each chapter is a logical step for you to complete in order to master Qt. By the end of this book, you'll have created an application that has been tested and is ready to be shipped. What you will learn Create stunning UIs with Qt Widgets and Qt Quick 2 Develop powerful, cross-platform applications with the Qt framework Design GUIs with the Qt Designer and build a library in it for UI previews Handle user interaction with the Qt signal or slot mechanism in C++ Prepare a cross-platform project to host a third-party library Use the Qt Animation framework to display stunning effects Deploy mobile apps with Qt and embedded platforms Interact with a gamepad using Qt Gamepad Who this book is for Mastering Qt 5 is for developers and programmers who want to build GUI-based applications. C++ knowledge is necessary, and knowing QT basics will help you get the most out of this book. Table of Contents Get Your Qt Feet Wet Discovering qmake Secrets Dividing Your Project and Ruling Your Code Conquering the Desktop UI Dominating the Mobile UI Even Qt Deserves a Slice of Raspberry Pi Third-Party Libraries without a Headache Animations - Its Alive, Alive! Keeping Your Sanity with Multithreading Need IPC? Get Your Minions to Work Having Fun with Multimedia and Serialization You Shall (Not) Pass with QTest All Packed and Ready to Deploy Qt Hat Tips and Tricks Mastering Qt 5 Create stunning cross-platform applications using C++ with Qt Widgets and QML with Qt Quick, 2nd Edition by by Guillaume Lazar, Robin Penea.pdf
  24. Summary Kotlin in Action guides experienced Java developers from the language basics of Kotlin all the way through building applications to run on the JVM and Android devices. Foreword by Andrey Breslav, Lead Designer of Kotlin. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Developers want to get work done - and the less hassle, the better. Coding with Kotlin means less hassle. The Kotlin programming language offers an expressive syntax, a strong intuitive type system, and great tooling support along with seamless interoperability with existing Java code, libraries, and frameworks. Kotlin can be compiled to Java bytecode, so you can use it everywhere Java is used, including Android. And with an effi cient compiler and a small standard library, Kotlin imposes virtually no runtime overhead. About the Book Kotlin in Action teaches you to use the Kotlin language for production-quality applications. Written for experienced Java developers, this example-rich book goes further than most language books, covering interesting topics like building DSLs with natural language syntax. The authors are core Kotlin developers, so you can trust that even the gnarly details are dead accurate. What's Inside Functional programming on the JVM Writing clean and idiomatic code Combining Kotlin and Java Domain-specific languages About the Reader This book is for experienced Java developers. About the Author Dmitry Jemerov and Svetlana Isakova are core Kotlin developers at JetBrains. Table of Contents PART 1 - INTRODUCING KOTLIN Kotlin: what and why Kotlin basics Defining and calling functions Classes, objects, and interfaces Programming with lambdas The Kotlin type system PART 2 - EMBRACING KOTLIN Operator overloading and other conventions Higher-order functions: lambdas as parameters and return values Generics Annotations and reflection DSL construction Kotlin in Action by Dmitry Jemerov, Svetlana Isakova.pdf
  25. What if hacking approaches could be redirected for productive means? How can we harness the positive attributes of hacking to drive meaningful outcomes in our companies, careers, and communities? New York Times bestselling author Josh Linkner has ‘cracked the code’ in his latest book, Hacking Innovation, providing a new framework for innovation, reinvention, and transformation. Linkner reveals the Five Core Mindsets and Ten Primary Tactics of hackers as the new model for complex problem solving, innovation, and growth. These fresh approaches enable leaders at all levels to topple their competition with stunning efficiency. Hacking Innovation translates the complex hacker philosophy into a simple, yet effective system for modern business success. To uncover these secrets, Linkner immersed himself into the dangerous and clandestine world of hackers. Insights from ex-cons, secretive hacking societies, the FBI, and cyber-security giants deliver drama and suspense. He also penetrates the caffeine-driven world of tech startups, revealing the stealthy practices that have launched tech founders into the rarified billionaires club. All told, Linkner delivers the definitive work to propel the next generation of leaders and innovators. Hacking Innovation. The New Growth Model from the Sinister World of Hackers by Josh Linkner.pdf

ChatBox

ChatBox

Chatroom Rules

  • Το GreekHacking.Gr είναι ένα ελληνικό forum και επιτρέπεται μόνο η χρήση της Ελληνική Γλώσσας (ούτε greeklish).
  • Δεν επιτρέπονται οι βρισιές και γενικά η χρήση χυδαίας γλώσσας.
  • Απαγορεύεται αυστηρά το πορνογραφικό, προσβλητικό και βίαιο περιεχόμενο.
  • Μην χρησιμοποιείτε κεφαλαία γράμματα η σύμβολα.
×
×
  • Create New...