自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

  • 博客(4)
  • 资源 (63)
  • 收藏
  • 关注

原创 常用的数据恢复软件

<br />常用的数据恢复软件<br />以前基本上只使用过EasyRecovery ,http://www.datarecoveryblog.com/2009/03/recover-deleted-files.html有几个推荐,原文如下:<br />Recover Deleted Files using Undelete Software<br /><br /> If you deleted an important document file, you may get it back fro

2011-04-22 16:41:00 549

原创 使用python和selenium配合处理dojo

<br /><br />使用python和selenium配合处理dojo<br />2011-4-21 磁针石<br /><br /> #承接软件自动化实施与培训等gtalk: ouyangchongwu#gmail.com qq 37391319 博客:oychw.cublog.cn<br /><br /> #版权所有,转载刊登请来函联系<br /> #python qq group: 深圳自动化测试python群:113938272<br /> #武冈深圳qq群:66250781<br />

2011-04-21 17:31:00 1102

原创 使用python构建windows调试器1 启动被测程序使用python构建windows调试器1 启动被测程序

<br />使用 python构建 windows调试器<br /> <br />2011-4-19磁针石草译,略有删节<br />#承接软件自动化实施与培训等 gtalk: ouyangchongwu#gmail.com qq 37391319 博客: oychw.cublog.cn<br />#版权所有,转载刊登请来函联系<br /> #python qq group: 深圳自动化测试 python群: 113938272<br /> #武冈深圳 qq群: 66250781<br

2011-04-21 08:15:00 336

原创 准备从chinaunix迁往这里

<br />准备从chinaunix迁往这里

2011-04-19 16:42:00 413

Scrum For Dummies 2nd Edition - 2018.pdf 敏捷项目管理实践测试新书

About This Book The goal is to demonstrate explicitly how you can use scrum for any project, not just software development. This book is intended to be a field manual for the application of scrum in real-world situations. Although it covers scrum fundamentals in detail, this book also delves into how to get out and experience the amazing benefits of scrum. Scrum is by design easy to explain, but application and mastery are often difficult. Old habits and organizational mindsets need to be shifted and new ways embraced. For this reason, we’ve included success stories so that you can see how scrum can fit into your situation. The main thrust of understanding scrum lies in the three roles, three artifacts, and five events that form its foundation and that we cover thoroughly. We also include common practices that we use and that others in the field use so that you can choose what works best for your project. Scrum isn’t technical. In fact, its basic tenet is common sense. In many cases, we’ve wrapped this information within the world of technology and have used technical terms to help explain this. Where useful, we’ve defined these terms. We also cover common practices from scrum experts throughout the world. You can learn so much from others who use this framework in a seemingly limitless spectrum of projects. Scrum falls under an umbrella of project management called agile project management. Neither scrum nor agile practices is a proper noun. Scrum is a framework for organizing your work, whereas agile is an adjective used to describe a variety of practices that conform to the values of the Agile Manifesto and to the 12 Agile Principles. Scrum and agile are not identical or interchangeable, but you frequently see them written in many sources, especially online, interchangeably. In this book, you will see terminology from both descriptions, because scrum is a frequently used subset of agile practices.

2018-04-26

Web Scraping with Python 2nd - 2018 pdf

About This Book This book is designed to serve not only as an introduction to web scraping, but as a comprehensive guide to collecting, transforming, and using data from uncooperative sources. Although it uses the Python programming language and covers many Python basics, it should not be used as an introduction to the language. If you don’t know any Python at all, this book might be a bit of a challenge. Please do not use it as an introductory Python text. With that said, I’ve tried to keep all concepts and code samples at a beginning-to- intermediate Python programming level in order to make the content accessible to a wide range of readers. To this end, there are occasional explanations of more advanced Python programming and general computer science topics where appropriate. If you are a more advanced reader, feel free to skim these parts! If you’re looking for a more comprehensive Python resource, Introducing Python by Bill Lubanovic (O’Reilly) is a good, if lengthy, guide. For those with shorter attention spans, the video series Introduction to Python by Jessica McKellar (O’Reilly) is an excellent resource. I’ve also enjoyed Think Python by a former professor of mine, Allen Downey (O’Reilly). This last book in particular is ideal for those new to programming, and teaches computer science and software engineering concepts along with the Python language. Technical books are often able to focus on a single language or technology, but web scraping is a relatively disparate subject, with practices that require the use of databases, web servers, HTTP, HTML, internet security, image processing, data science, and other tools. This book attempts to cover all of these, and other topics, from the perspective of “data gathering.” It should not be used as a complete treatment of any of these subjects, but I believe they are covered in enough detail to get you started writing web scrapers! Part I covers the subject of web scraping and web crawling in depth, with a strong focus on a small handful of libraries used throughout the book. Part I can easily be used as a comprehensive reference for these libraries and techniques (with certain exceptions, where additional references will be provided). The skills taught in the first part will likely be useful for everyone writing a web scraper, regardless of their particular target or application. Part II covers additional subjects that the reader might find useful when writing web scrapers, but that might not be useful for all scrapers all the time. These subjects are, unfortunately, too broad to be neatly wrapped up in a single chapter. Because of this, frequent references are made to other resources for additional information. The structure of this book enables you to easily jump around among chapters to find only the web scraping technique or information that you are looking for. When a concept or piece of code builds on another mentioned in a previous chapter, I explicitly reference the section that it was addressed in.

2018-04-26

Practical Web Scraping for Data Science - 2018

Practical Web Scraping for Data Science: Best Practices and Examples with Python By 作者: Seppe vanden Broucke – Bart Baesens ISBN-10 书号: 1484235819 ISBN-13 书号: 9781484235812 Edition 版本: 1st ed. Release 出版日期: 2018-06-10 pages 页数: (306 ) This book provides a complete and modern guide to web scraping, using Python as the programming language, without glossing over important details or best practices. Written with a data science audience in mind, the book explores both scraping and the larger context of web technologies in which it operates, to ensure full understanding. The authors recommend web scraping as a powerful tool for any data scientist’s arsenal, as many data science projects start by obtaining an appropriate data set. Starting with a brief overview on scraping and real-life use cases, the authors explore the core concepts of HTTP, HTML, and CSS to provide a solid foundation. Along with a quick Python primer, they cover Selenium for JavaScript-heavy sites, and web crawling in detail. The book finishes with a recap of best practices and a collection of examples that bring together everything you’ve learned and illustrate various data science use cases. What You’ll Learn Leverage well-established best practices and commonly-used Python packages Handle today’s web, including JavaScript, cookies, and common web scraping mitigation techniques Understand the managerial and legal concerns regarding web scraping Who This Book is For A data science oriented audience that is probably already familiar with Python or another programming language or analytical toolkit (R, SAS, SPSS, etc). Students or instructors in university courses may also benefit. Readers unfamiliar with Python will appreciate a quick Python primer in chapter 1 to catch up with the basics and provide pointers to other guides as well.

2018-04-19

最全的性能测试自学教程 - 0.1 节选

性能测试介绍及用python做性能测试 通过自动化测试工具模拟多种正常、峰值以及异常负载条件来对系统的各项性能指标进行测试。

2017-09-06

最全的接口测试自学教程 - 节选

接口测试介绍及用python做接口测试 接口测试是保证软件产品质量的最重要的软件测试之一。接口测试是进行评估的系统或组件是否正确地传递数据及互相正确的控制。接口测试通常在测试和开发团队都进行。接口测试通常在应用或功能开发的初期检验模块间调用的正确性和友好性。

2017-09-05

[高级软件测试卷2:高级软件测试经理].Rex.Black.扫描版 -- 测试管理人员必备

《高级软件测试.卷2:高级软件测试经理》是目前市面上唯一完整的完全按照国际软件测试认证委员会(istqb)的测试人员认证高级大纲撰写的专业书籍系列之一。本书章节与高级大纲中高级软件测试经理模块的标题、顺序和知识点相匹配,适宜istqb-atm(高级软件测试经理)的认证考前学习,也可以作为软件测试经理的常用指导手册。 《高级软件测试.卷2:高级软件测试经理》主要介绍在软件测试估算、策划、监视和控制中,一个软件测试经理熟练运用高级技能所必须掌握的知识,包括制定软件测试系统的总体测试目标和测试策略;计划测试任务和进度.组织测试活动,采用各种度量对测试和风险进行评估、报告、跟踪和控制。本书通过大量案例介绍了如何挑选、获取、分配测试任务所需要的充分的资源;如何组建、管理和领导测试团队,负责协调测试团队各成员之间以及测试团队和各利益相关者之间的沟通。 《高级软件测试.卷2:高级软件测试经理》每一章都提供与istqb高级大纲一致的,充足的认证考试模拟题,为准备参加istqb-atm资质认证考试的人员提供相应的基础性知识;每一章节的课堂练习都结合实际案例,并提供笞案,具有较高的参考价值。

2017-09-04

Beginning C 5th Edition 2013

Beginning C, 5th Edition 688 pages Publisher: Apress; 5 edition (February 27, 2013) Language: English ISBN-10: 1430248815 ISBN-13: 978-1430248811 What you’ll learn Make use of all core language features such as for loops and branching Dynamically manage memory using pointers and indirection Modularize your code through controlling scope and creating functions Move data in and out of your program via keyboard, display monitor, and data files Have the computer write your code for you via preprocesser directives Properly type your data and create structures to manage it efficiently

2013-04-30

MongoDB Applied Design Patterns 2013 python scripts

MongoDB Applied Design Patterns BOOK DESCRIPTION Whether you’re building a social media site or an internal-use enterprise application, this hands-on guide shows you the connection between MongoDB and the business problems it’s designed to solve. You’ll learn how to apply MongoDB design patterns to several challenging domains, such as ecommerce, content management, and online gaming. Using Python and JavaScript code examples, you’ll discover how MongoDB lets you scale your data model while simplifying the development process. Many businesses launch NoSQL databases without understanding the techniques for using their features most effectively. This book demonstrates the benefits of document embedding, polymorphic schemas, and other MongoDB patterns for tackling specific big data use cases, including: Operational intelligence: Perform real-time analytics of business data Ecommerce: Use MongoDB as a product catalog master or inventory management system Content management: Learn methods for storing content nodes, binary assets, and discussions Online advertising networks: Apply techniques for frequency capping ad impressions, and keyword targeting and bidding Social networking: Learn how to store a complex social graph, modeled after Google+ Online gaming: Provide concurrent access to character and world data for a multiplayer role-playing game Table of Contents Part I: Design Patterns Chapter 1. To Embed or Reference Chapter 2. Polymorphic Schemas Chapter 3. Mimicking Transactional Behavior Part II: Use Cases Chapter 4. Operational IntelligenceChapter 5. Ecommerce Chapter 6. Content Management SystemsChapter 7. Online Advertising Networks Chapter 8. Social Networking Chapter 9. Online Gaming BOOK DETAILS Paperback: 176 pages Publisher: O’Reilly Media (March 2013) Language: English ISBN-10: 1449340040 ISBN-13: 978-1449340049

2013-04-19

A Few of My python Favorite Things

一位python高手对自己常用的python功能的小结。涉及python,python标准模块,python外部模块,相关资料等。外部模块涉及:itertools functools difflib ast datetime and dateutil Mock coverage lettuce 0.2.16 snake-guice requests

2013-04-18

Raspberry Pi Home Automation with Arduino

Raspberry Pi Home Automation with Arduino 176 pages Publisher: Packt Publishing (February 5, 2013) Language: English ISBN-10: 1849695865 ISBN-13: 978-1849695862 What you will learn from this book Install an operating system for your Raspberry Pi. Set up the Raspberry Pi and Arduino bridge shield. Learn how to work with electronic components to build small circuits. Develop applications that interact with your circuits. Use thermistors and photoresistors to monitor and control your surroundings. Control your own mains power with a relay shield and even connect a motor to your Raspberry Pi.

2013-04-08

FreeCAD [How-to] Solid Modeling with the power of Python 2012.pdf

( FreeCAD [How-to] Solid Modeling with the power of Python 2012.pdf )

2013-03-05

Hello World! Computer Programming for Kids and Other Beginners - 2009.pd

python ( Hello World! Computer Programming for Kids and Other Beginners - 2009.pdf )

2013-03-05

Hello! Python 2012.pdf

Hello! Python 2012.pdf

2013-03-05

Beginning Python Using Python 2.6 and Python 3.1 - 2010.pdf

Beginning Python Using Python 2.6 and Python 3.1 - 2010.pdf

2013-03-05

The Quick Python Book Second Edition - 2010.pdf

The Quick Python Book Second Edition - 2010.pdf

2013-03-05

Packtpub.Python.2.6.Graphics.Cookbook.Nov.2010.pdf

Packtpub.Python.2.6.Graphics.Cookbook.Nov.2010.pdf

2013-03-05

Foundations of Python 3 Network Programming 2011 2nd Edition.pdf

Foundations of Python 3 Network Programming 2011 2nd Edition.pdf

2013-03-05

Learn Python The Hard Way - 2011.pdf

Learn Python The Hard Way - 2011.pdf

2013-03-05

Python Text Processing with NLTK 2.0 Cookbook 2010.pdf

Python Text Processing with NLTK 2.0 Cookbook 2010.pdf

2013-03-05

Data Structures and Algorithms Using Python - 2011.pdf

Data Structures and Algorithms Using Python - 2011.pdf

2013-03-05

MySQL for Python 2010.pdf

440 pages Publisher: Packt Publishing (September 21, 2010) Language: English ISBN-10: 1849510180 ISBN-13: 978-1849510189 What you will learn from this book Explore the various means to install MySQL for Python, from using an egg to unrolling a tarball Query the database and retrieve records through MySQL for Python Implement insertion of data into a MySQL database in Python Carry out error-handling in MySQL for Python in order to ensure the robustness of programs Use secure logging techniques to record how your users use your programs Carry out record-by-record retrieval to save a lot of overhead while retrieving data Handle insertion of large amounts of data using iteration and the executemany function Automate the creation and removal of databases and tables using MySQL for Python Use the MySQL for Python library to automate user creation and to administer access controls Log user activity with MySQL for Python by using MySQL's date and time support See how to revise database programs to include more functionality Use aggregate functions to make MySQL take the burden off your web server Save time and processing resources by scripting JOINs and subqueries

2013-03-05

GRAY HAT PYTHON

GRAY HAT PYTHON

2013-03-05

byte of python 3.0

byte of python 3.0

2013-03-04

IEEE 1061-1998 软件质量度量方法学.pdf

主要内容包括: 定义质量要求: 如何根据项目需求和目标,定义软件质量的具体要求。 识别和实现度量: 如何选择合适的度量指标,并设计方法来收集和分析度量数据。 分析和验证度量: 如何对收集到的度量数据进行分析,验证其有效性,并从中得出有意义的结论。

2024-08-01

IEEE-730-2014 软件质量保证计划.pdf

IEEE 730 是一项国际标准,全称是《IEEE 软件质量保证计划标准》。它为软件开发过程中的质量保证活动提供了一个全面的框架。这个标准旨在确保开发的软件产品符合其规定的要求,并满足用户的需求。 主要内容 - 软件质量保证计划的定义和目的 - 软件质量保证计划的内容 - 软件质量保证活动的规划和实施 - 软件质量保证的评估和改进

2024-08-01

IEEE-1044-2009 软件异常分类标准.pdf

IEEE 1044 是一项国际标准,全称是《IEEE 软件异常分类标准》。它为软件开发过程中出现的各种异常(也称为缺陷、错误或故障)提供了一个统一的分类体系。这个标准有助于开发团队、测试团队和质量保证团队更好地理解、跟踪和管理软件中的问题。 主要包含了以下内容: 异常类型的分类: 对软件异常进行了细致的分类,包括功能性异常、非功能性异常、环境异常等。 异常严重性的等级: 定义了异常的严重性等级,如灾难性、严重、一般、提示等。 异常状态的跟踪: 提供了对异常状态的跟踪机制,包括新发现、已确认、已修复、已关闭等。 异常报告的格式: 规定了异常报告的标准格式,便于不同团队之间的沟通和交流。

2024-08-01

IEEE-1028-2008 软件审查与审计标准.pdf

它为软件开发过程中的审查和审计活动提供了一套系统的方法和规范。通过遵循该标准,可以有效地发现和纠正软件中的缺陷,提高软件质量。 IEEE 1028 的主要内容 IEEE 1028 标准为软件审查和审计提供了一个全面的框架。它旨在通过系统化的审查和审计活动,提高软件质量,降低开发成本。 核心内容概览: - 审查和审计类型的分类: - 管理审查: 评估项目管理过程和文档。 - 技术审查: 评估软件产品的技术方面,如设计、代码、测试用例等。 - 检查: 形式化的审查,遵循预定义的过程和检查表。 - 走查: 非正式的审查,参与者轮流阅读文档并提出问题。 - 审计: 对软件开发过程的合规性进行评估。 - 审查和审计过程: - 计划: 定义审查或审计的目的、范围、参与者和资源。 - 准备: 准备审查或审计所需的文档和材料。 - 执行: 进行审查或审计,发现并记录问题。 - 评估: 分析发现的问题,并评估其对软件质量的影响。 - 报告: 编写审查或审计报告,总结发现的问题和建议的改进措施。 - 参与者的角色和职责: - 作者: 创建被审查或审计的

2024-08-01

IEEE-1012-2016 系统、软件和硬件验证与确认标准.pdf

IEEE 1012 是一项国际标准,全称是《IEEE 系统、软件和硬件验证与确认标准》。它为系统、软件和硬件的验证与确认(Verification and Validation,简称 V&V)活动提供了一个全面的框架。这个标准旨在确保开发的产品符合其需求,并满足预期的用途。 IEEE 1012 的主要内容 V&V 的定义和目的 V&V 过程 V&V 计划 V&V 活动 V&V 文档 V&V 工具

2024-08-01

IEEEStd1233-1998 系统需求规格说明书指南.pdf

IEEE 1233 是一份指导开发系统需求规格说明书(System Requirements Specification,SRS)的标准。它为创建一份全面、一致且可追溯的 SRS 提供了建议和模板。SRS 是软件开发过程中至关重要的文档,它明确定义了系统需要满足的功能、性能、接口和其他要求。 主要内容 SRS 的目的和范围: 定义了 SRS 在系统开发过程中的作用,以及其涵盖的内容。 SRS 的结构: 提供了 SRS 的标准结构,包括引言、总体描述、特定需求、支持信息等。 需求的类型: 详细介绍了功能需求、非功能需求(如性能、可靠性、可用性等)、接口需求等。 需求的质量属性: 阐述了需求的清晰性、一致性、可验证性、可追踪性等质量属性。 SRS 的开发过程: 提供了开发 SRS 的一般步骤和方法。

2024-08-01

IEEE 1008是一个为软件单元测试提供结构化方法 它详细阐述了有效测试单个软件组件或单元所必需的要素和过程

IEEE 1008是一个为软件单元测试提供结构化方法。它详细阐述了有效测试单个软件组件或单元所必需的要素和过程。 主要组成部分 - 单元设计和实现信息: 包括被测试软件单元的规格说明、代码和设计文档。 - 单元需求: 单元必须满足的功能性和非功能性需求。 - 测试用例设计: 创建测试用例以验证单元在各种条件下的行为。 - 测试过程执行: 执行测试用例并记录结果。 - 测试结果评估: 分析测试结果,确定单元是否满足其需求。

2024-08-01

Mobile Testing An ASTQB-BCS Foundation Guide - 2018 移动APP测试英国标准考试用书

Mobile Testing An ASTQB-BCS Foundation Guide - 2018 移动APP测试英国标准考试用书

2018-11-06

pytest Quick Start Guide - 2018

pytest Quick Start Guide pdf 来源:[pytest Quick Start Guide - 2018.pdf](https://itbooks.ctfile.com/fs/18113597-314070249) Learn the pytest way to write simple tests which can also be used to write complex tests Key Features Become proficient with pytest from day one by solving real-world testing problems Use pytest to write tests more efficiently Scale from simple to complex and functional testing Book Description Python's standard unittest module is based on the xUnit family of frameworks, which has its origins in Smalltalk and Java, and tends to be verbose to use and not easily extensible.The pytest framework on the other hand is very simple to get started, but powerful enough to cover complex testing integration scenarios, being considered by many the true Pythonic approach to testing in Python. In this book, you will learn how to get started right away and get the most out of pytest in your daily work?ow, exploring powerful mechanisms and plugins to facilitate many common testing tasks. You will also see how to use pytest in existing unittest-based test suites and will learn some tricks to make the jump to a pytest-style test suite quickly and easily. What you will learn Write and run simple and complex tests Organize tests in fles and directories Find out how to be more productive on the command line Markers and how to skip, xfail and parametrize tests Explore fxtures and techniques to use them effectively, such as tmpdir, pytestconfg, and monkeypatch Convert unittest suites to pytest using little-known techniques Use third-party plugins Who this book is for This book is for Python programmers that want to learn more about testing. This book is also for QA testers, and those who already benefit from programming with tests daily but want to improve their existing testing tools.

2018-10-11

Kali Linux Web Penetration Testing Cookbook 2nd - 2018

安全渗透测试 [Kali Linux Web Penetration Testing Cookbook 2nd - 2018.pdf](https://itbooks.pipipan.com/fs/18113597-314061726) Kali Linux Web Penetration Testing Cookbook 2nd Edition pdf Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security Key Features Familiarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab Explore new tools in the Kali Linux ecosystem for web penetration testing Book Description Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing. Kali Linux Web Penetration Testing Cookbook gives you the skills you need to cover every stage of a penetration test – from gathering information about the system and application, to identifying vulnerabilities through manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks with OWASP ZAP, Burp Suite and other web proxies and security testing tools. As you make your way through the book, you will learn how to use automated scanners to find security ?aws in web applications and understand how to bypass basic security controls. In the concluding chapters, you will look at what you have learned in the context of the Open Web Application Security Project (OWASP) and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of this book, you will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities. What you will learn Set up a secure penetration testing laboratory Use proxies, crawlers, and spiders to investigate an entire website Identify cross-site scripting and client-side vulnerabilities Exploit vulnerabilities that allow the insertion of code into web applications Exploit vulnerabilities that require complex setups Improve testing efficiency using automated vulnerability scanners Learn how to circumvent security controls put in place to prevent attacks Who this book is for Kali Linux Web Penetration Testing Cookbook is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The basics of operating a Linux environment and prior exposure to security technologies and tools are necessary.

2018-10-11

Hands-On Penetration Testing on Windows - 2018 pdf 5分

Hands-On Penetration Testing on Windows pdf 页数:454 来源: https://itbooks.ctfile.com/fs/18113597-302639985 Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux. Book Description Windows has always been the go-to platform for users around the globe to perform administration and ad hoc tasks, in settings that range from small offi ces to global enterprises, and this massive footprint makes securing Windows a unique challenge. This book will enable you to distinguish yourself to your clients. In this book, you'll learn advanced techniques to attack Windows environments from the indispensable toolkit that is Kali Linux. We'll work through core network hacking concepts and advanced Windows exploitation techniques, such as stack and heap overflows, precision heap spraying, and kernel exploitation, using coding principles that allow you to leverage powerful Python scripts and shellcode. We'll wrap up with post-exploitation strategies that enable you to go deeper and keep your access. Finally, we'll introduce kernel hacking fundamentals and fuzzing testing, so you can discover vulnerabilities and write custom exploits. By the end of this book, you'll be well-versed in identifying vulnerabilities within the Windows OS and developing the desired solutions for them. What You Will Learn Get to know advanced pen testing techniques with Kali Linux Gain an understanding of Kali Linux tools and methods from behind the scenes See how to use Kali Linux at an advanced level Understand the exploitation of Windows kernel drivers Understand advanced Windows concepts and protections, and how to bypass them using Kali Linux Discover Windows exploitation techniques, such as stack and heap overflows and kernel exploitation, through coding principles Authors Phil Bramwell Phil Bramwell acquired the Certified Ethical Hacker and Certified Expert Penetration Tester certifications at the age of 21. His professional experience includes Common Criteria design reviews and testing, network security consulting, penetration testing, and PCI-DSS compliance auditing for banks, universities, and governments. He later acquired the CISSP and Metasploit Pro Certified Specialist credentials. Today, he is a cybersecurity and cryptocurrency consultant and works as a cybersecurity analyst specializing in malware detection and analysis.

2018-08-09

Kali Linux Wireless Penetration - Cameron Buchanan 3rd - 2017 pdf 5分

About the e-Book https://u18113597.ctfile.com/fs/18113597-302542755 Kali Linux Wireless Penetration Testing Beginner's Guide 3rd Edition pdf Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. Key Features Learn wireless penetration testing with Kali Linux Detect hidden wireless networks and discover their names Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Book Description As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. What you will learn Understand the KRACK attack in full detail Create a wireless lab for your experiments Sniff out wireless packets, hidden networks, and SSIDs Capture and crack WPA-2 keys Sniff probe requests and track users through their SSID history Attack radius authentication systems Sniff wireless traffic and collect interesting data Decrypt encrypted traffic with stolen keys Who This Book Is For Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks. Table of Contents Wireless Lab Setup WLAN and its Inherent Insecurities Bypassing WLAN Authentication WLAN Encryption Flaws Attacks on the WLAN Infrastructure Attacking the Client Advanced WLAN Attacks KRACK Attacks Attacking WPA-Enterprise and RADIUS WLAN Penetration Testing Methodology WPS and Probes

2018-08-08

Python Network Programming Cookbook, 2nd Edition 2017 pdf 5分

"Python Network Programming Cookbook, 2nd Edition" ISBN: 1786463997 | 2017 | PDF | 442 pages | 15.41 MB Key Features Solve real-world tasks in the area of network programming, system/networking administration, network monitoring, and more Familiarize yourself with the fundamentals and functionalities of SDN Improve your skills to become the next-gen network engineer by learning the various facets of Python programming Book Description Python is an excellent language to use to write code and have fun by prototyping a pplications quickly. The presence of lots of third-party libraries, also known as batteries, makes it easier and faster to prototype an application or to implement a new algorithm. If you are interested in creating the building blocks for many practical web and networking applications that rely on networking protocols, then this book is a must-have. It employs Python for network programming to solve a variety of problems. This book highlights the major aspects of network programming in Python, starting from writing simple networking clients to developing complex Software-Defined Networking (SDN) systems and programming the Internet. It creates the building blocks for many practical web and networking applications that rely on various networking protocols. It presents the power and beauty of Python to solve numerous real-world tasks in the area of network programming, system and network administration, network monitoring, and web-application development. In this edition, you will also be introduced to network modelling to build your own cloud network. You will learn about the concepts and fundamentals of SDN and then extend your network with Mininet. Next, you'll find recipes on Authentication, Authorization, and Accounting and other alternative vendor-specific SDN approaches and frameworks. You will also learn to configure the Linux Foundation networking ecosystem and automate your networks with Python. By the end of this book, you will be able to analyze your network security vulnerabilities using advanced network packet capture and analysis techniques.

2018-07-24

Pandas Cookbook 2017 pdf 2分

Table of Contents Preface What this book covers What you need for this book Running a Jupyter Notebook Who this book is for How to get the most out of this book Conventions Assumptions for every recipe Dataset Descriptions Sections Getting ready How to do it... How it works... There's more... See al

2018-04-24

scikit learn Machine Learning Simplified -2017.pdf

Preface Suppose you want to predict whether tomorrow will be a sunny or rainy day. You can develop an algorithm that is based on the current weather and your meteorological knowledge using a rather complicated set of rules to return the desired prediction. Now suppose that you have a record of the day-by-day weather conditions for the last five years, and you find that every time you had two sunny days in a row, the following day also happened to be a sunny one. Your algorithm could generalize this and predict that tomorrow will be a sunny day since the sun reigned today and yesterday. This algorithm is a pretty simple example of learning from experience. This is what Machine Learning is all about: algorithms that learn from the available data. This course is designed in the same way that many data science and analytics projects play out. First, we need to acquire data; the data is often messy, incomplete, or not correct in some way. Therefore, we spend the first chapter talking about strategies for dealing with bad data and ways to deal with other problems that arise from data. For example, what happens if we have too many features? How do we handle that? What this learning path 20 covers Module 1, Learning scikit-learn: Machine Learning in Python, in this module, you will learn several methods for building Machine Learning applications that solve different real-world tasks, from document classification to image recognition. We will use Python, a simple, popular, and widely used programming language, and scikit-learn, an open source Machine Learning library. In each chapter of this module, we will present a different Machine Learning setting and a couple of well-studied methods as well as show step-by-step examples that use Python and scikit-learn to solve concrete tasks. We will also show you tips and tricks to improve algorithm performance, both from the accuracy and computational cost point of views. Module 2, scikit-learn Cookbook, the first chapter of this module is your guide. The meat of this module will walk you through various algorithms and how to implement them into your workflow. And finally, we'll end with the postmodel workflow. This chapter is fairly agnostic to the other chapters of the module and can be applied to the various algorithms you'll learn up until the final chapter. Module 3, Mastering Machine Learning with scikit-learn, in this module, we will examine several machine learning models and learning algorithms. We will discuss tasks that machine learning is commonly applied to, and learn to measure the performance of machine learning systems. We will work with a popular library for the Python programming language called scikit-learn, which 21 has assembled excellent implementations of many machine learning models and algorithms under a simple yet versatile API. This module is motivated by two goals: Its content should be accessible. The book only assumes familiarity with basic programming and math. Its content should be practical. This book offers hands-on examples that readers can adapt to problems in the real world.

2018-04-23

Python: Advanced Predictive Analytics: 2017-12 python重量级高级大数据分析预测

Python: Advanced Predictive Analytics: Gain practical insights by exploiting data in your business to build advanced predictive modeling applications Python: Advanced Predictive Analytics: Gain practical insights by exploiting data in your business to build advanced predictive modeling applications By 作者: Ashish Kumar – Joseph Babcock ISBN-10 书号: 1788992369 ISBN-13 书号: 9781788992367 Release 出版日期: 2017-12-27 pages 页数: (660 ) $99.99 Python: Advanced Predictive Analytics: Gain practical insights by exploiting data in your business to build advanced predictive modeling applications Gain practical insights by exploiting data in your business to build advanced predictive modeling applications Social Media and the Internet of Things have resulted in an avalanche of data. Data is powerful but not in its raw form; it needs to be processed and modeled, and Python is one of the most robust tools out there to do so. It has an array of packages for predictive modeling and a suite of IDEs to choose from. Using the Python programming language, analysts can use these sophisticated methods to build scalable analytic applications. This book is your guide to getting started with predictive analytics using Python. You’ll balance both statistical and mathematical concepts, and implement them in Python using libraries such as pandas, scikit-learn, and NumPy. Through case studies and code examples using popular open-source Python libraries, this book illustrates the complete development process for analytic applications. Covering a wide range of algorithms for classification, regression, clustering, as well as cutting-edge techniques such as deep learning, this book illustrates explains how these methods work. You will learn to choose the right approach for your problem and how to develop engaging visualizations to bring to life the insights of predictive modeling. Finally, you will learn best practices in predictive modeling, as well as the different applications of predictive modeling in the modern world. The course provides you with highly practical content from the following Packt books: Learning Predictive Analytics with Python Mastering Predictive Analytics with Python What You Will Learn Understand the statistical and mathematical concepts behind predictive analytics algorithms and implement them using Python libraries Get to know various methods for importing, cleaning, sub-setting, merging, joining, concatenating, exploring, grouping, and plotting data with pandas and NumPy Master the use of Python notebooks for exploratory data analysis and rapid prototyping Get to grips with applying regression, classification, clustering, and deep learning algorithms Discover advanced methods to analyze structured and unstructured data Visualize the performance of models and the insights they produce Ensure the robustness of your analytic applications by mastering the best practices of predictive analysis

2018-04-23

可爱的python测试开发自动化库 -2018-04-22 V1.0.0.pdf

可爱的python测试开发自动化库 -2018-04-22 V1.0.0.pdf Table of Contents Table of Contents Python测试开发库 参考资料 测试开发 Web UI测试自动化 移动测试自动化 Windows UI测试自动化 UI测试 性能测试 测试框架 Mock 其他测试工具 持续交付 测试工具对接 awesome-python 管理面板(Admin Panels) 算法和设计模式(Algorithms and Design Patterns) 反病毒(Anti-spam) 资产管理(Asset Management) 音频(Audio) 认证(Authentication) 内置类增强(Built-in Classes Enhancement) CMS(Content Management Systems) 缓存(Caching) 自动聊天工具(ChatOps Tools) 代码分析和lint(Code Analysis) 命令行工具(Command-line Tools) 命令行程序开发( Command-line Application Development) 生产力工具(Productivity Tools) 兼容性(Compatibility) 计算机视觉(Computer Vision) 并发和并行及异步与网络(Concurrency and Parallelism) 配置(Configuration) 加密(Cryptography) 数据分析(Data Analysis) 数据验证(Data Validation) 数据可视化(Data Visualization) 数据库(Database) 数据库驱动(Database Drivers) 日期和时间(Date and Time) 调试工具(Debugging Tools) 深度学习(Deep Learning) DevOps工具(DevOps Tools) 分发(Distribution) 文档(Documentation) 下载器(Downloader) 电子商务(E-commerce) 编辑器插件(Editor Plugins and IDEs) 电子邮件(Email) 环境管理(Environment Management) 文件(Files) 外部函数接口(Foreign Function Interface) 表单(Forms) 函数式编程(Functional Programming) 图形用户界面(GUI) HTML操作(HTML Manipulation) HTTP 硬件(Hardware) 图像处理(Image Processing) 实现(Implementations) 交互式Python解释器(Interactive Interpreter) 国际化 作业调度(Job Scheduler) 日志(Logging) 机器学习 MapReduce 微软Windows 杂项 自然语言处理(Natural Language Processing) 网络虚拟化(Network Virtualization) 网络(Networking) 动态消息 ORM 关系型数据库 NoSQL 数据库 其他 包管理(Package Management) 包仓库 RESTful API RPC服务器(RPC Servers) 科学(Science) 搜索 序列化(Serialization) 无服务器框架(Serverless Frameworks 特殊文本格式处理(Specific Formats Processing) 通用 Office PDF Markdown YAML CSV 静态网站生成器(Static Site Generator) 标签(Tagging) 模板引擎(Template Engine) 文本处理(Text Processing) 通用 Slugify 解析器 第三方 API(Third-party APIs) URL处理(URL Manipulation) Video WSGI 服务器(WSGI Servers) 网页内容提取(Web Content Extracting) 网络爬虫(Web Crawling) Web 框架(Web Frameworks) WebSocket 持续更新 可以到http://blog.sciencenet.cn/blog-2604609-1110492.html 免费下载

2018-04-23

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除