Fast Data Processing with Spark

Rating: 
Amazon Price: $18.99 (as of August 11, 2020 14:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Spark is a framework for writing fast, distributed programs. Spark solves similar problems as Hadoop MapReduce does but with a fast in-memory approach and a clean functional style API. With its ability to integrate with Hadoop and inbuilt tools for interactive query analysis (Shark), large-scale graph processing and analysis (Bagel), and real-time analysis (Spark Streaming), it can be interactively used to quickly process and query big data sets.
Continue reading “Fast Data Processing with Spark”

Metasploit Penetration Testing Cookbook

Rating: 
Amazon Price: $49.99 (as of August 11, 2020 22:52 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Over 70 recipes to master the most widely used penetration testing framework More than 80 recipes/practicaltasks that will escalate the reader's knowledge from beginner to an advanced level Special focus on the latest operating systems, exploits, and penetration testing techniques Detailed analysis of third party tools based on the Metasploit framework to enhance the penetration testing experience
In Detail
Metasploit® software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in consolidated reports. The goal of the software is to provide a clear understanding of the critical vulnerabilities in any environment and to manage those risks.
Metasploit Penetration Testing Cookbook targets both professionals and beginners to the framework. The chapters of the book are logically arranged with an increasing level of complexity and cover Metasploit aspects ranging from pre-exploitation to the post-exploitation phase thoroughly. The recipe structure of the book provides a good mix of both theoretical understanding and practical implementation.
This book will help readers in thinking from a hacker's perspective to dig out the flaws in target networks and also to leverage the powers of Metasploit to compromise them. It will take your penetration skills to the next level.
The book starts with the basics such as gathering information about your target and gradually covers advanced topics like building your own framework scripts and modules. The book goes deep into operating systems-based penetration testing techniques and moves ahead with client-based exploitation methodologies. In the post- exploitation phase, it covers meterpreter, antivirus bypass, ruby wonders, exploit building, porting exploits to framework, and third party tools like armitage, and SET.
Metasploit Penetration Testing Cookbook is the required guide to penetration testing and exploitation.
What you will learn from this book Set up a complete penetration testing environment using metasploit and virtual machines Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc. Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes Avail of exclusive coverage of antivirus bypassing techniques using metasploit Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc. Build and analyze meterpreter scripts in Ruby Build and export exploits to framework Use extension tools like Armitage, SET etc.
Approach
This is a Cookbook which follows a practical task-based style. There are plenty of code and commands used for illustration which make your learning curve easy and quick.
Who this book is written for
This book targets both professional penetration testers as well as new users of Metasploit who wish to gain expertise over the framework. The book requires basic knowledge of scanning, exploitation, and Ruby language

Decentralized Applications: Harnessing Bitcoin’s Blockchain Technology

Rating: 
Amazon Price: $24.77 (as of August 11, 2020 14:09 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Bitcoin is the first application to emerge from the underlying blockchain technology, and others that follow might have more significance. This book shows developers how to take advantage of the decentralization and trustless common knowledge structures of blockchain cryptography to build decentralized applications, or "dapps."

Author Siraj Raval clearly explains what a dapp is, and shows you how to make use of decentralized storage, bandwidth, and computing. You’ll learn how build blockchain-based dapps for providing public, decentralized ledgers of assets such as property, votes, software, health data, and ideas—as suggested by Melanie Swan in her book Bitcoin.Explore dapps in theory and practice—from potential through buildLearn about two dapp-building platforms: Ethereum and SatyaUnderstand the security risks and structural dangers of potentially autonomous software

Regular Expressions Cookbook

Rating: 
Amazon Price: $28.97 (as of August 12, 2020 03:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Take the guesswork out of using regular expressions. With more than 140 practical recipes, this cookbook provides everything you need to solve a wide range of real-world problems. Novices will learn basic skills and tools, and programmers and experienced users will find a wealth of detail. Each recipe provides samples you can use right away.

This revised edition covers the regular expression flavors used by C#, Java, JavaScript, Perl, PHP, Python, Ruby, and VB.NET. You’ll learn powerful new tricks, avoid flavor-specific gotchas, and save valuable time with this huge library of practical solutions.Learn regular expressions basics through a detailed tutorialUse code listings to implement regular expressions with your language of choiceUnderstand how regular expressions differ from language to languageHandle common user input with recipes for validation and formattingFind and manipulate words, special characters, and lines of textDetect integers, floating-point numbers, and other numerical formatsParse source code and process log filesUse regular expressions in URLs, paths, and IP addressesManipulate HTML, XML, and data exchange formatsDiscover little-known regular expression tricks and techniques

Raspberry Pi for Secret Agents

Rating: 
Amazon Price: $29.99 (as of August 12, 2020 03:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!
Overview Detect an intruder on camera and set off an alarm Listen in or record conversations from a distance Find out what the other computers on your network are up to Unleash your Raspberry Pi on the world
In Detail
Ever wished you could play around with all the neat gadgets your favorite spies use (like James Bond or Michael Westen)? With the introduction of the remarkable Raspberry Pi and a few USB accessories, anybody can now join in on the action.
Discover how to turn your Raspberry Pi into a multipurpose secret agent tool! Through a series of fun, easy-to-follow projects you’ll learn how to set up audio/video surveillance, explore your Wi-Fi network, play pranks on your friends, and even learn how to free your Raspberry Pi from the constraints of the wall socket.
Raspberry Pi for Secret Agents starts out with the initial setup of your Raspberry Pi, guides you through a number of pranks and secret agent techniques, and then shows you how to apply what you’ve learned out in the real world.
Learn how to configure your operating system for maximum mischief and start exploring the audio, video, and Wi-Fi projects. Learn how to record, listen, or talk to people from a distance and how to distort your voice. You can even plug in your webcam and set up a motion detector with an alarm, or find out what the other computers on your Wi-Fi network are up to. Once you’ve mastered the techniques, combine them with a battery pack and GPS for the ultimate off-road spy kit.
What you will learn from this book Install and configure Raspbian OS for maximum mischief Schedule a prank to happen when your foe least expects it Listen in or talk to people from a distance Detect an intruder with motion detection and set off an alarm Distort your voice in weird and wonderful ways Push unexpected images into browser windows Knock all visitors off your Wi-Fi network Control the Pi with your smartphone Keep your data secret with encryption
Approach
A playful, informal approach to using the Raspberry Pi for mischief!
Who this book is written for
Raspberry Pi for Secret Agents is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along and if you’re completely new to Linux, you’ll pick up much of the basics for free.
Apart from the Raspberry Pi board itself, a USB microphone and/or a webcam is required for most of the audio/video topics and a Wi-Fi dongle is recommended for the networking examples. A Windows/Mac OS X/Linux computer (or second Raspberry Pi) is also recommended for remote network access.