Immerse yourself in the architecture of an Angular application, starting with an introduction to TypeScript and ES6, and progressing to modules and components used to build complex applications.
Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer.
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
Take Full Advantage of the Oracle Solaris 11 Management FeaturesManage a highly scalable, cloud-based computing platform and deliver unmatched performance levels at every layer of your IT stack.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Master shell basics and Unix tools and discover easy commands to perform complex tasks with speedKey FeaturesLearn why the Bash shell is widely used on Linux and iOSExplore advanced shell concepts, such as pipes and redirectionUnderstand how to use Unix command-line tools as building blocks for different tasksBook DescriptionThe most basic interface to a computer-the command line-remains the most flexible and powerful way of processing data and performing and automating various day-to-day tasks.
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you.
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.
Get up to date with the finer points of Ubuntu Server using this comprehensive guideAbout This BookGet well-versed with newly-added features in Ubuntu 16.
A practical handbook that will help you bridge the gap between Windows and Linux to develop apps that leverage the best features across both ecosystems with seamless interoperabilityKey FeaturesConfigure and control WSL to suit your needs and preferencesDiscover tips for working seamlessly between Windows and WSL Linux distrosLearn how to work effectively with containers in WSL, as well as how to containerize your development environments with Visual Studio Code to isolate your dependenciesBook DescriptionWindows Subsystem for Linux (WSL) allows you to run native Linux tools alongside traditional Windows applications.
Change the way your organization deploys software at scale with this fast-paced guide to the world of DockerAbout This BookCut through the noise and in simple terms learn to package your applications and test, ship, and scale your containersFind and build images and successfully run your programs within containersBuild, deploy, and test your Docker containers and put them to work in productionWho This Book Is ForThis book is for IT professionals, system administrators, and DevOps professionals or anyone looking to quickly develop and deploy software to production at scale.
Learn software engineering from scratch, from installing and setting up your development environment, to navigating a terminal and building a model command line operating system, all using the Scala programming language as a medium.
Quickly obtain solutions to common Java image processing problems, learn best practices, and understand everything OpenCV has to offer for image processing.
Learn about bot programming, using all the latest and greatest programming languages, including Python, Go, and Clojure, so you can feel at ease writing your Telegram bot in a way that suits you.
Study the material in this book to prepare for the RHCE exam EX294 and to learn how using Ansible within your own environment improves system administration productivity.
This primer on NSX-T helps you understand the capabilities and features of NSX-T, how to configure and manage NSX-T, and integrate NSX-T with other software.
William "e;Bo"e; Rothwell's Advanced Perl Programming continues where his previous book left off, more or less, as it guides you through advanced techniques of the Perl programming language starting with command-line options, references, and arrays and hashes from advanced data types.
Address the most common integration challenges, by understanding the ins and outs of the choices and exemplifying the solutions with practical examples on how to create cloud native applications using Apache Camel.
Learn Docker "e;infrastructure as code"e; technology to define a system for performing standard but non-trivial data tasks on medium- to large-scale data sets, using Jupyter as the master controller.
This monograph discusses software reuse and how it can be applied at different stages of the software development process, on different types of data and at different levels of granularity.