Immerse yourself in the architecture of an Angular application, starting with an introduction to TypeScript and ES6, and progressing to modules and components used to build complex applications.
Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer.
Building Intelligent Interactive Tutors discusses educational systems that assess a student's knowledge and are adaptive to a student's learning needs.
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows.
UNIX for OpenVMS Users, 3E, makes it easy to see what OpenVMS and UNIX have in common, and to transfer your knowledge and experience in OpenVMS over to the world of UNIX.
Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success.
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
Take Full Advantage of the Oracle Solaris 11 Management FeaturesManage a highly scalable, cloud-based computing platform and deliver unmatched performance levels at every layer of your IT stack.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Master shell basics and Unix tools and discover easy commands to perform complex tasks with speedKey FeaturesLearn why the Bash shell is widely used on Linux and iOSExplore advanced shell concepts, such as pipes and redirectionUnderstand how to use Unix command-line tools as building blocks for different tasksBook DescriptionThe most basic interface to a computer-the command line-remains the most flexible and powerful way of processing data and performing and automating various day-to-day tasks.
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you.
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.
Get up to date with the finer points of Ubuntu Server using this comprehensive guideAbout This BookGet well-versed with newly-added features in Ubuntu 16.
Harness the power of the latest edition with this in-depth and comprehensive guide to the Swift languageKey FeaturesFifth edition of this bestselling book, improved and updated to cover the latest version of the Swift 5 programming languageGet to grips with popular and modern design techniques to write easy-to-manage Swift codeLearn how to use core Swift features such as concurrency, generics, and copy-on-write in your codeBook DescriptionOver the years, the Mastering Swift book has established itself amongst developers as a popular choice as an in-depth and practical guide to the Swift programming language.
A practical handbook that will help you bridge the gap between Windows and Linux to develop apps that leverage the best features across both ecosystems with seamless interoperabilityKey FeaturesConfigure and control WSL to suit your needs and preferencesDiscover tips for working seamlessly between Windows and WSL Linux distrosLearn how to work effectively with containers in WSL, as well as how to containerize your development environments with Visual Studio Code to isolate your dependenciesBook DescriptionWindows Subsystem for Linux (WSL) allows you to run native Linux tools alongside traditional Windows applications.
Become an expert at managing enterprise identity infrastructure by leveraging Active DirectoryKey FeaturesExplore the new features in Active Directory Domain ServiceManage your Active Directory services for Windows Server 2016 effectivelyAutomate administrative tasks in Active Directory using PowerShell Core 6.
Change the way your organization deploys software at scale with this fast-paced guide to the world of DockerAbout This BookCut through the noise and in simple terms learn to package your applications and test, ship, and scale your containersFind and build images and successfully run your programs within containersBuild, deploy, and test your Docker containers and put them to work in productionWho This Book Is ForThis book is for IT professionals, system administrators, and DevOps professionals or anyone looking to quickly develop and deploy software to production at scale.
This two-volume set constitutes the proceedings of the Third Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2019, held in Volgograd, Russia, in September 2019.
This book constitutes the proceedings of the International Conference on Web of Services, ICWS 2020, held virtually as part of SCF 2020, in Honolulu, HI, USA, in September 2020.
This book constitutes the proceedings of the 13th International Conference on Cloud Computing, CLOUD 2020, held as part of SCF 2020, during September 18-20, 2020.
Make your PCs as secure as possible and limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place.
Learn software engineering from scratch, from installing and setting up your development environment, to navigating a terminal and building a model command line operating system, all using the Scala programming language as a medium.