|
|
Books > Health, Home & Family > Self-help & practical interests > Consumer guides & advice
Get up to speed with various penetration testing techniques and
resolve security threats of varying complexity Key Features Enhance
your penetration testing skills to tackle security threats Learn to
gather information, find vulnerabilities, and exploit enterprise
defenses Navigate secured systems with the most up-to-date version
of Kali Linux (2019.1) and Metasploit (5.0.0) Book
DescriptionSending information via the internet is not entirely
private, as evidenced by the rise in hacking, malware attacks, and
security threats. With the help of this book, you'll learn crucial
penetration testing techniques to help you evaluate enterprise
defenses. You'll start by understanding each stage of pentesting
and deploying target virtual machines, including Linux and Windows.
Next, the book will guide you through performing intermediate
penetration testing in a controlled environment. With the help of
practical use cases, you'll also be able to implement your learning
in real-world scenarios. By studying everything from setting up
your lab, information gathering and password attacks, through to
social engineering and post exploitation, you'll be able to
successfully overcome security threats. The book will even help you
leverage the best tools, such as Kali Linux, Metasploit, Burp
Suite, and other open source pentesting tools to perform these
techniques. Toward the later chapters, you'll focus on best
practices to quickly resolve security threats. By the end of this
book, you'll be well versed with various penetration testing
techniques so as to be able to tackle security threats effectively
What you will learn Perform entry-level penetration tests by
learning various concepts and techniques Understand both common and
not-so-common vulnerabilities from an attacker's perspective Get
familiar with intermediate attack methods that can be used in
real-world scenarios Understand how vulnerabilities are created by
developers and how to fix some of them at source code level Become
well versed with basic tools for ethical hacking purposes Exploit
known vulnerable services with tools such as Metasploit Who this
book is forIf you're just getting started with penetration testing
and want to explore various security domains, this book is for you.
Security professionals, network engineers, and amateur ethical
hackers will also find this book useful. Prior knowledge of
penetration testing and ethical hacking is not necessary.
Discover powerful ways to effectively solve real-world machine
learning problems using key libraries including scikit-learn,
TensorFlow, and PyTorch Key Features Learn and implement machine
learning algorithms in a variety of real-life scenarios Cover a
range of tasks catering to supervised, unsupervised and
reinforcement learning techniques Find easy-to-follow code
solutions for tackling common and not-so-common challenges Book
DescriptionThis eagerly anticipated second edition of the popular
Python Machine Learning Cookbook will enable you to adopt a fresh
approach to dealing with real-world machine learning and deep
learning tasks. With the help of over 100 recipes, you will learn
to build powerful machine learning applications using modern
libraries from the Python ecosystem. The book will also guide you
on how to implement various machine learning algorithms for
classification, clustering, and recommendation engines, using a
recipe-based approach. With emphasis on practical solutions,
dedicated sections in the book will help you to apply supervised
and unsupervised learning techniques to real-world problems. Toward
the concluding chapters, you will get to grips with recipes that
teach you advanced techniques including reinforcement learning,
deep neural networks, and automated machine learning. By the end of
this book, you will be equipped with the skills you need to apply
machine learning techniques and leverage the full capabilities of
the Python ecosystem through real-world examples. What you will
learn Use predictive modeling and apply it to real-world problems
Explore data visualization techniques to interact with your data
Learn how to build a recommendation engine Understand how to
interact with text data and build models to analyze it Work with
speech data and recognize spoken words using Hidden Markov Models
Get well versed with reinforcement learning, automated ML, and
transfer learning Work with image data and build systems for image
recognition and biometric face recognition Use deep neural networks
to build an optical character recognition system Who this book is
forThis book is for data scientists, machine learning developers,
deep learning enthusiasts and Python programmers who want to solve
real-world challenges using machine-learning techniques and
algorithms. If you are facing challenges at work and want
ready-to-use code solutions to cover key tasks in machine learning
and the deep learning domain, then this book is what you need.
Familiarity with Python programming and machine learning concepts
will be useful.
|
|