Scrum For Dummies 2nd Edition - 2018.pdf 敏捷项目管理实践测试新书
About This Book
The goal is to demonstrate explicitly how you can use scrum for any
project, not just software development. This book is intended to be a field
manual for the application of scrum in real-world situations. Although it
covers scrum fundamentals in detail, this book also delves into how to get
out and experience the amazing benefits of scrum.
Scrum is by design easy to explain, but application and mastery are often
difficult. Old habits and organizational mindsets need to be shifted and
new ways embraced. For this reason, we’ve included success stories so
that you can see how scrum can fit into your situation.
The main thrust of understanding scrum lies in the three roles, three
artifacts, and five events that form its foundation and that we cover
thoroughly. We also include common practices that we use and that others
in the field use so that you can choose what works best for your project.
Scrum isn’t technical. In fact, its basic tenet is common sense. In many
cases, we’ve wrapped this information within the world of technology and
have used technical terms to help explain this. Where useful, we’ve
defined these terms.
We also cover common practices from scrum experts throughout the
world. You can learn so much from others who use this framework in a
seemingly limitless spectrum of projects.
Scrum falls under an umbrella of project management called agile project
management. Neither scrum nor agile practices is a proper noun. Scrum is
a framework for organizing your work, whereas agile is an adjective used
to describe a variety of practices that conform to the values of the Agile
Manifesto and to the 12 Agile Principles. Scrum and agile are not identical
or interchangeable, but you frequently see them written in many sources,
especially online, interchangeably. In this book, you will see terminology
from both descriptions, because scrum is a frequently used subset of agile
practices.
Web Scraping with Python 2nd - 2018 pdf
About This Book
This book is designed to serve not only as an introduction to web scraping,
but as a comprehensive guide to collecting, transforming, and using data from
uncooperative sources. Although it uses the Python programming language
and covers many Python basics, it should not be used as an introduction to
the language.
If you don’t know any Python at all, this book might be a bit of a
challenge. Please do not use it as an introductory Python text. With that said,
I’ve tried to keep all concepts and code samples at a beginning-to-
intermediate Python programming level in order to make the content
accessible to a wide range of readers. To this end, there are occasional
explanations of more advanced Python programming and general computer
science topics where appropriate. If you are a more advanced reader, feel free
to skim these parts!
If you’re looking for a more comprehensive Python resource, Introducing
Python by Bill Lubanovic (O’Reilly) is a good, if lengthy, guide. For those
with shorter attention spans, the video series Introduction to Python by
Jessica McKellar (O’Reilly) is an excellent resource. I’ve also enjoyed Think
Python by a former professor of mine, Allen Downey (O’Reilly). This last
book in particular is ideal for those new to programming, and teaches
computer science and software engineering concepts along with the Python
language.
Technical books are often able to focus on a single language or technology,
but web scraping is a relatively disparate subject, with practices that require
the use of databases, web servers, HTTP, HTML, internet security, image
processing, data science, and other tools. This book attempts to cover all of
these, and other topics, from the perspective of “data gathering.” It should not
be used as a complete treatment of any of these subjects, but I believe they
are covered in enough detail to get you started writing web scrapers!
Part I covers the subject of web scraping and web crawling in depth, with a
strong focus on a small handful of libraries used throughout the book. Part I
can easily be used as a comprehensive reference for these libraries and
techniques (with certain exceptions, where additional references will be
provided). The skills taught in the first part will likely be useful for everyone
writing a web scraper, regardless of their particular target or application.
Part II covers additional subjects that the reader might find useful when
writing web scrapers, but that might not be useful for all scrapers all the time.
These subjects are, unfortunately, too broad to be neatly wrapped up in a
single chapter. Because of this, frequent references are made to other
resources for additional information.
The structure of this book enables you to easily jump around among chapters
to find only the web scraping technique or information that you are looking
for. When a concept or piece of code builds on another mentioned in a
previous chapter, I explicitly reference the section that it was addressed in.
Practical Web Scraping for Data Science - 2018
Practical Web Scraping for Data Science: Best Practices and Examples with Python
By 作者: Seppe vanden Broucke – Bart Baesens
ISBN-10 书号: 1484235819
ISBN-13 书号: 9781484235812
Edition 版本: 1st ed.
Release 出版日期: 2018-06-10
pages 页数: (306 )
This book provides a complete and modern guide to web scraping, using Python as the programming language, without glossing over important details or best practices. Written with a data science audience in mind, the book explores both scraping and the larger context of web technologies in which it operates, to ensure full understanding. The authors recommend web scraping as a powerful tool for any data scientist’s arsenal, as many data science projects start by obtaining an appropriate data set.
Starting with a brief overview on scraping and real-life use cases, the authors explore the core concepts of HTTP, HTML, and CSS to provide a solid foundation. Along with a quick Python primer, they cover Selenium for JavaScript-heavy sites, and web crawling in detail. The book finishes with a recap of best practices and a collection of examples that bring together everything you’ve learned and illustrate various data science use cases.
What You’ll Learn
Leverage well-established best practices and commonly-used Python packages
Handle today’s web, including JavaScript, cookies, and common web scraping mitigation techniques
Understand the managerial and legal concerns regarding web scraping
Who This Book is For
A data science oriented audience that is probably already familiar with Python or another programming language or analytical toolkit (R, SAS, SPSS, etc). Students or instructors in university courses may also benefit. Readers unfamiliar with Python will appreciate a quick Python primer in chapter 1 to catch up with the basics and provide pointers to other guides as well.
最全的性能测试自学教程 - 0.1 节选
性能测试介绍及用python做性能测试
通过自动化测试工具模拟多种正常、峰值以及异常负载条件来对系统的各项性能指标进行测试。
最全的接口测试自学教程 - 节选
接口测试介绍及用python做接口测试
接口测试是保证软件产品质量的最重要的软件测试之一。接口测试是进行评估的系统或组件是否正确地传递数据及互相正确的控制。接口测试通常在测试和开发团队都进行。接口测试通常在应用或功能开发的初期检验模块间调用的正确性和友好性。
[高级软件测试卷2:高级软件测试经理].Rex.Black.扫描版 -- 测试管理人员必备
《高级软件测试.卷2:高级软件测试经理》是目前市面上唯一完整的完全按照国际软件测试认证委员会(istqb)的测试人员认证高级大纲撰写的专业书籍系列之一。本书章节与高级大纲中高级软件测试经理模块的标题、顺序和知识点相匹配,适宜istqb-atm(高级软件测试经理)的认证考前学习,也可以作为软件测试经理的常用指导手册。
《高级软件测试.卷2:高级软件测试经理》主要介绍在软件测试估算、策划、监视和控制中,一个软件测试经理熟练运用高级技能所必须掌握的知识,包括制定软件测试系统的总体测试目标和测试策略;计划测试任务和进度.组织测试活动,采用各种度量对测试和风险进行评估、报告、跟踪和控制。本书通过大量案例介绍了如何挑选、获取、分配测试任务所需要的充分的资源;如何组建、管理和领导测试团队,负责协调测试团队各成员之间以及测试团队和各利益相关者之间的沟通。
《高级软件测试.卷2:高级软件测试经理》每一章都提供与istqb高级大纲一致的,充足的认证考试模拟题,为准备参加istqb-atm资质认证考试的人员提供相应的基础性知识;每一章节的课堂练习都结合实际案例,并提供笞案,具有较高的参考价值。
Beginning C 5th Edition 2013
Beginning C, 5th Edition
688 pages
Publisher: Apress; 5 edition (February 27, 2013)
Language: English
ISBN-10: 1430248815
ISBN-13: 978-1430248811
What you’ll learn
Make use of all core language features such as for loops and branching
Dynamically manage memory using pointers and indirection
Modularize your code through controlling scope and creating functions
Move data in and out of your program via keyboard, display monitor, and data files
Have the computer write your code for you via preprocesser directives
Properly type your data and create structures to manage it efficiently
MongoDB Applied Design Patterns 2013 python scripts
MongoDB Applied Design Patterns
BOOK DESCRIPTION
Whether you’re building a social media site or an internal-use enterprise application, this hands-on guide shows you the connection between MongoDB and the business problems it’s designed to solve. You’ll learn how to apply MongoDB design patterns to several challenging domains, such as ecommerce, content management, and online gaming. Using Python and JavaScript code examples, you’ll discover how MongoDB lets you scale your data model while simplifying the development process.
Many businesses launch NoSQL databases without understanding the techniques for using their features most effectively. This book demonstrates the benefits of document embedding, polymorphic schemas, and other MongoDB patterns for tackling specific big data use cases, including:
Operational intelligence: Perform real-time analytics of business data
Ecommerce: Use MongoDB as a product catalog master or inventory management system
Content management: Learn methods for storing content nodes, binary assets, and discussions
Online advertising networks: Apply techniques for frequency capping ad impressions, and keyword targeting and bidding
Social networking: Learn how to store a complex social graph, modeled after Google+
Online gaming: Provide concurrent access to character and world data for a multiplayer role-playing game
Table of Contents
Part I: Design Patterns
Chapter 1. To Embed or Reference
Chapter 2. Polymorphic Schemas
Chapter 3. Mimicking Transactional Behavior
Part II: Use Cases
Chapter 4. Operational IntelligenceChapter 5. Ecommerce
Chapter 6. Content Management SystemsChapter 7. Online Advertising Networks
Chapter 8. Social Networking
Chapter 9. Online Gaming
BOOK DETAILS
Paperback: 176 pages
Publisher: O’Reilly Media (March 2013)
Language: English
ISBN-10: 1449340040
ISBN-13: 978-1449340049
A Few of My python Favorite Things
一位python高手对自己常用的python功能的小结。涉及python,python标准模块,python外部模块,相关资料等。外部模块涉及:itertools functools difflib ast datetime and dateutil Mock coverage lettuce 0.2.16 snake-guice requests
Raspberry Pi Home Automation with Arduino
Raspberry Pi Home Automation with Arduino
176 pages
Publisher: Packt Publishing (February 5, 2013)
Language: English
ISBN-10: 1849695865
ISBN-13: 978-1849695862
What you will learn from this book
Install an operating system for your Raspberry Pi.
Set up the Raspberry Pi and Arduino bridge shield.
Learn how to work with electronic components to build small circuits.
Develop applications that interact with your circuits.
Use thermistors and photoresistors to monitor and control your surroundings.
Control your own mains power with a relay shield and even connect a motor to your Raspberry Pi.
FreeCAD [How-to] Solid Modeling with the power of Python 2012.pdf
( FreeCAD [How-to] Solid Modeling with the power of Python 2012.pdf )
Hello World! Computer Programming for Kids and Other Beginners - 2009.pd
python
( Hello World! Computer Programming for Kids and Other Beginners - 2009.pdf )
Hello! Python 2012.pdf
Hello! Python 2012.pdf
Dive Into Python中文版.pdf
Dive Into Python中文版.pdf
Beginning Python Using Python 2.6 and Python 3.1 - 2010.pdf
Beginning Python Using Python 2.6 and Python 3.1 - 2010.pdf
The Quick Python Book Second Edition - 2010.pdf
The Quick Python Book Second Edition - 2010.pdf
Packtpub.Python.2.6.Graphics.Cookbook.Nov.2010.pdf
Packtpub.Python.2.6.Graphics.Cookbook.Nov.2010.pdf
Foundations of Python 3 Network Programming 2011 2nd Edition.pdf
Foundations of Python 3 Network Programming 2011 2nd Edition.pdf
Learn Python The Hard Way - 2011.pdf
Learn Python The Hard Way - 2011.pdf
Python Text Processing with NLTK 2.0 Cookbook 2010.pdf
Python Text Processing with NLTK 2.0 Cookbook 2010.pdf
Data Structures and Algorithms Using Python - 2011.pdf
Data Structures and Algorithms Using Python - 2011.pdf
MySQL for Python 2010.pdf
440 pages
Publisher: Packt Publishing (September 21, 2010)
Language: English
ISBN-10: 1849510180
ISBN-13: 978-1849510189
What you will learn from this book
Explore the various means to install MySQL for Python, from using an egg to unrolling a tarball
Query the database and retrieve records through MySQL for Python
Implement insertion of data into a MySQL database in Python
Carry out error-handling in MySQL for Python in order to ensure the robustness of programs
Use secure logging techniques to record how your users use your programs
Carry out record-by-record retrieval to save a lot of overhead while retrieving data
Handle insertion of large amounts of data using iteration and the executemany function
Automate the creation and removal of databases and tables using MySQL for Python
Use the MySQL for Python library to automate user creation and to administer access controls
Log user activity with MySQL for Python by using MySQL's date and time support
See how to revise database programs to include more functionality
Use aggregate functions to make MySQL take the burden off your web server
Save time and processing resources by scripting JOINs and subqueries
GRAY HAT PYTHON
GRAY HAT PYTHON
IEEE 1061-1998 软件质量度量方法学.pdf
主要内容包括:
定义质量要求: 如何根据项目需求和目标,定义软件质量的具体要求。
识别和实现度量: 如何选择合适的度量指标,并设计方法来收集和分析度量数据。
分析和验证度量: 如何对收集到的度量数据进行分析,验证其有效性,并从中得出有意义的结论。
IEEE-730-2014 软件质量保证计划.pdf
IEEE 730 是一项国际标准,全称是《IEEE 软件质量保证计划标准》。它为软件开发过程中的质量保证活动提供了一个全面的框架。这个标准旨在确保开发的软件产品符合其规定的要求,并满足用户的需求。
主要内容
- 软件质量保证计划的定义和目的
- 软件质量保证计划的内容
- 软件质量保证活动的规划和实施
- 软件质量保证的评估和改进
IEEE-1044-2009 软件异常分类标准.pdf
IEEE 1044 是一项国际标准,全称是《IEEE 软件异常分类标准》。它为软件开发过程中出现的各种异常(也称为缺陷、错误或故障)提供了一个统一的分类体系。这个标准有助于开发团队、测试团队和质量保证团队更好地理解、跟踪和管理软件中的问题。
主要包含了以下内容:
异常类型的分类: 对软件异常进行了细致的分类,包括功能性异常、非功能性异常、环境异常等。
异常严重性的等级: 定义了异常的严重性等级,如灾难性、严重、一般、提示等。
异常状态的跟踪: 提供了对异常状态的跟踪机制,包括新发现、已确认、已修复、已关闭等。
异常报告的格式: 规定了异常报告的标准格式,便于不同团队之间的沟通和交流。
IEEE-1028-2008 软件审查与审计标准.pdf
它为软件开发过程中的审查和审计活动提供了一套系统的方法和规范。通过遵循该标准,可以有效地发现和纠正软件中的缺陷,提高软件质量。
IEEE 1028 的主要内容
IEEE 1028 标准为软件审查和审计提供了一个全面的框架。它旨在通过系统化的审查和审计活动,提高软件质量,降低开发成本。
核心内容概览:
- 审查和审计类型的分类:
- 管理审查: 评估项目管理过程和文档。
- 技术审查: 评估软件产品的技术方面,如设计、代码、测试用例等。
- 检查: 形式化的审查,遵循预定义的过程和检查表。
- 走查: 非正式的审查,参与者轮流阅读文档并提出问题。
- 审计: 对软件开发过程的合规性进行评估。
- 审查和审计过程:
- 计划: 定义审查或审计的目的、范围、参与者和资源。
- 准备: 准备审查或审计所需的文档和材料。
- 执行: 进行审查或审计,发现并记录问题。
- 评估: 分析发现的问题,并评估其对软件质量的影响。
- 报告: 编写审查或审计报告,总结发现的问题和建议的改进措施。
- 参与者的角色和职责:
- 作者: 创建被审查或审计的
IEEE-1012-2016 系统、软件和硬件验证与确认标准.pdf
IEEE 1012 是一项国际标准,全称是《IEEE 系统、软件和硬件验证与确认标准》。它为系统、软件和硬件的验证与确认(Verification and Validation,简称 V&V)活动提供了一个全面的框架。这个标准旨在确保开发的产品符合其需求,并满足预期的用途。
IEEE 1012 的主要内容
V&V 的定义和目的
V&V 过程
V&V 计划
V&V 活动
V&V 文档
V&V 工具
IEEEStd1233-1998 系统需求规格说明书指南.pdf
IEEE 1233 是一份指导开发系统需求规格说明书(System Requirements Specification,SRS)的标准。它为创建一份全面、一致且可追溯的 SRS 提供了建议和模板。SRS 是软件开发过程中至关重要的文档,它明确定义了系统需要满足的功能、性能、接口和其他要求。
主要内容
SRS 的目的和范围: 定义了 SRS 在系统开发过程中的作用,以及其涵盖的内容。
SRS 的结构: 提供了 SRS 的标准结构,包括引言、总体描述、特定需求、支持信息等。
需求的类型: 详细介绍了功能需求、非功能需求(如性能、可靠性、可用性等)、接口需求等。
需求的质量属性: 阐述了需求的清晰性、一致性、可验证性、可追踪性等质量属性。
SRS 的开发过程: 提供了开发 SRS 的一般步骤和方法。
IEEE 1008是一个为软件单元测试提供结构化方法 它详细阐述了有效测试单个软件组件或单元所必需的要素和过程
IEEE 1008是一个为软件单元测试提供结构化方法。它详细阐述了有效测试单个软件组件或单元所必需的要素和过程。
主要组成部分
- 单元设计和实现信息: 包括被测试软件单元的规格说明、代码和设计文档。
- 单元需求: 单元必须满足的功能性和非功能性需求。
- 测试用例设计: 创建测试用例以验证单元在各种条件下的行为。
- 测试过程执行: 执行测试用例并记录结果。
- 测试结果评估: 分析测试结果,确定单元是否满足其需求。
Mobile Testing An ASTQB-BCS Foundation Guide - 2018 移动APP测试英国标准考试用书
Mobile Testing An ASTQB-BCS Foundation Guide - 2018 移动APP测试英国标准考试用书
pytest Quick Start Guide - 2018
pytest Quick Start Guide pdf
来源:[pytest Quick Start Guide - 2018.pdf](https://itbooks.ctfile.com/fs/18113597-314070249)
Learn the pytest way to write simple tests which can also be used to write complex tests
Key Features
Become proficient with pytest from day one by solving real-world testing problems
Use pytest to write tests more efficiently
Scale from simple to complex and functional testing
Book Description
Python's standard unittest module is based on the xUnit family of frameworks, which has its origins in Smalltalk and Java, and tends to be verbose to use and not easily extensible.The pytest framework on the other hand is very simple to get started, but powerful enough to cover complex testing integration scenarios, being considered by many the true Pythonic approach to testing in Python.
In this book, you will learn how to get started right away and get the most out of pytest in your daily work?ow, exploring powerful mechanisms and plugins to facilitate many common testing tasks. You will also see how to use pytest in existing unittest-based test suites and will learn some tricks to make the jump to a pytest-style test suite quickly and easily.
What you will learn
Write and run simple and complex tests
Organize tests in fles and directories
Find out how to be more productive on the command line
Markers and how to skip, xfail and parametrize tests
Explore fxtures and techniques to use them effectively, such as tmpdir, pytestconfg, and monkeypatch
Convert unittest suites to pytest using little-known techniques
Use third-party plugins
Who this book is for
This book is for Python programmers that want to learn more about testing. This book is also for QA testers, and those who already benefit from programming with tests daily but want to improve their existing testing tools.
Kali Linux Web Penetration Testing Cookbook 2nd - 2018
安全渗透测试 [Kali Linux Web Penetration Testing Cookbook 2nd - 2018.pdf](https://itbooks.pipipan.com/fs/18113597-314061726)
Kali Linux Web Penetration Testing Cookbook 2nd Edition pdf
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security
Key Features
Familiarize yourself with the most common web vulnerabilities
Conduct a preliminary assessment of attack surfaces and run exploits in your lab
Explore new tools in the Kali Linux ecosystem for web penetration testing
Book Description
Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing.
Kali Linux Web Penetration Testing Cookbook gives you the skills you need to cover every stage of a penetration test – from gathering information about the system and application, to identifying vulnerabilities through manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks with OWASP ZAP, Burp Suite and other web proxies and security testing tools.
As you make your way through the book, you will learn how to use automated scanners to find security ?aws in web applications and understand how to bypass basic security controls. In the concluding chapters, you will look at what you have learned in the context of the Open Web Application Security Project (OWASP) and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively.
By the end of this book, you will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities.
What you will learn
Set up a secure penetration testing laboratory
Use proxies, crawlers, and spiders to investigate an entire website
Identify cross-site scripting and client-side vulnerabilities
Exploit vulnerabilities that allow the insertion of code into web applications
Exploit vulnerabilities that require complex setups
Improve testing efficiency using automated vulnerability scanners
Learn how to circumvent security controls put in place to prevent attacks
Who this book is for
Kali Linux Web Penetration Testing Cookbook is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The basics of operating a Linux environment and prior exposure to security technologies and tools are necessary.
Hands-On Penetration Testing on Windows - 2018 pdf 5分
Hands-On Penetration Testing on Windows pdf
页数:454
来源: https://itbooks.ctfile.com/fs/18113597-302639985
Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux.
Book Description
Windows has always been the go-to platform for users around the globe to perform administration and ad hoc tasks, in settings that range from small offi ces to global enterprises, and this massive footprint makes securing Windows a unique challenge. This book will enable you to distinguish yourself to your clients.
In this book, you'll learn advanced techniques to attack Windows environments from the indispensable toolkit that is Kali Linux. We'll work through core network hacking concepts and advanced Windows exploitation techniques, such as stack and heap overflows, precision heap spraying, and kernel exploitation, using coding principles that allow you to leverage powerful Python scripts and shellcode.
We'll wrap up with post-exploitation strategies that enable you to go deeper and keep your access. Finally, we'll introduce kernel hacking fundamentals and fuzzing testing, so you can discover vulnerabilities and write custom exploits.
By the end of this book, you'll be well-versed in identifying vulnerabilities within the Windows OS and developing the desired solutions for them.
What You Will Learn
Get to know advanced pen testing techniques with Kali Linux
Gain an understanding of Kali Linux tools and methods from behind the scenes
See how to use Kali Linux at an advanced level
Understand the exploitation of Windows kernel drivers
Understand advanced Windows concepts and protections, and how to bypass them using Kali Linux
Discover Windows exploitation techniques, such as stack and heap overflows and kernel exploitation, through coding principles
Authors
Phil Bramwell
Phil Bramwell acquired the Certified Ethical Hacker and Certified Expert Penetration Tester certifications at the age of 21. His professional experience includes Common Criteria design reviews and testing, network security consulting, penetration testing, and PCI-DSS compliance auditing for banks, universities, and governments. He later acquired the CISSP and Metasploit Pro Certified Specialist credentials. Today, he is a cybersecurity and cryptocurrency consultant and works as a cybersecurity analyst specializing in malware detection and analysis.
Kali Linux Wireless Penetration - Cameron Buchanan 3rd - 2017 pdf 5分
About the e-Book
https://u18113597.ctfile.com/fs/18113597-302542755
Kali Linux Wireless Penetration Testing Beginner's Guide 3rd Edition pdf
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack.
Key Features
Learn wireless penetration testing with Kali Linux
Detect hidden wireless networks and discover their names
Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks
Book Description
As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes.
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte.
What you will learn
Understand the KRACK attack in full detail
Create a wireless lab for your experiments
Sniff out wireless packets, hidden networks, and SSIDs
Capture and crack WPA-2 keys
Sniff probe requests and track users through their SSID history
Attack radius authentication systems
Sniff wireless traffic and collect interesting data
Decrypt encrypted traffic with stolen keys
Who This Book Is For
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks.
Table of Contents
Wireless Lab Setup
WLAN and its Inherent Insecurities
Bypassing WLAN Authentication
WLAN Encryption Flaws
Attacks on the WLAN Infrastructure
Attacking the Client
Advanced WLAN Attacks
KRACK Attacks
Attacking WPA-Enterprise and RADIUS
WLAN Penetration Testing Methodology
WPS and Probes
Python Network Programming Cookbook, 2nd Edition 2017 pdf 5分
"Python Network Programming Cookbook, 2nd Edition"
ISBN: 1786463997 | 2017 | PDF | 442 pages | 15.41 MB
Key Features
Solve real-world tasks in the area of network programming, system/networking administration, network monitoring, and more
Familiarize yourself with the fundamentals and functionalities of SDN
Improve your skills to become the next-gen network engineer by learning the various facets of Python programming
Book Description
Python is an excellent language to use to write code and have fun by prototyping a
pplications quickly. The presence of lots of third-party libraries, also known as batteries, makes it easier and faster to prototype an application or to implement a new algorithm. If you are interested in creating the building blocks for many practical web and networking applications that rely on networking protocols, then this book is a must-have. It employs Python for network programming to solve a variety of problems.
This book highlights the major aspects of network programming in Python, starting from writing simple networking clients to developing complex Software-Defined Networking (SDN) systems and programming the Internet. It creates the building blocks for many practical web and networking applications that rely on various networking protocols. It presents the power and beauty of Python to solve numerous real-world tasks in the area of network programming, system and network administration, network monitoring, and web-application development.
In this edition, you will also be introduced to network modelling to build your own cloud network. You will learn about the concepts and fundamentals of SDN and then extend your network with Mininet. Next, you'll find recipes on Authentication, Authorization, and Accounting and other alternative vendor-specific SDN approaches and frameworks. You will also learn to configure the Linux Foundation networking ecosystem and automate your networks with Python.
By the end of this book, you will be able to analyze your network security vulnerabilities using advanced network packet capture and analysis techniques.
Pandas Cookbook 2017 pdf 2分
Table of Contents
Preface
What this book covers
What you need for this book
Running a Jupyter Notebook
Who this book is for
How to get the most out of this book
Conventions
Assumptions for every recipe
Dataset Descriptions
Sections
Getting ready
How to do it...
How it works...
There's more...
See al
scikit learn Machine Learning Simplified -2017.pdf
Preface
Suppose you want to predict whether tomorrow will be a sunny
or rainy day. You can develop an algorithm that is based on the
current weather and your meteorological knowledge using a
rather complicated set of rules to return the desired prediction.
Now suppose that you have a record of the day-by-day weather
conditions for the last five years, and you find that every time
you had two sunny days in a row, the following day also
happened to be a sunny one. Your algorithm could generalize
this and predict that tomorrow will be a sunny day since the sun
reigned today and yesterday. This algorithm is a pretty simple
example of learning from experience. This is what Machine
Learning is all about: algorithms that learn from the available
data.
This course is designed in the same way that many data
science and analytics projects play out. First, we need to
acquire data; the data is often messy, incomplete, or not correct
in some way. Therefore, we spend the first chapter talking
about strategies for dealing with bad data and ways to deal with
other problems that arise from data. For example, what
happens if we have too many features? How do we handle
that?
What this learning path
20
covers
Module 1, Learning scikit-learn: Machine Learning in Python, in
this module, you will learn several methods for building Machine
Learning applications that solve different real-world tasks, from
document classification to image recognition. We will use
Python, a simple, popular, and widely used programming
language, and scikit-learn, an open source Machine Learning
library. In each chapter of this module, we will present a
different Machine Learning setting and a couple of well-studied
methods as well as show step-by-step examples that use
Python and scikit-learn to solve concrete tasks. We will also
show you tips and tricks to improve algorithm performance, both
from the accuracy and computational cost point of views.
Module 2, scikit-learn Cookbook, the first chapter of this module
is your guide. The meat of this module will walk you through
various algorithms and how to implement them into your
workflow. And finally, we'll end with the postmodel workflow.
This chapter is fairly agnostic to the other chapters of the
module and can be applied to the various algorithms you'll learn
up until the final chapter.
Module 3, Mastering Machine Learning with scikit-learn, in this
module, we will examine several machine learning models and
learning algorithms. We will discuss tasks that machine learning
is commonly applied to, and learn to measure the performance
of machine learning systems. We will work with a popular library
for the Python programming language called scikit-learn, which
21
has assembled excellent implementations of many machine
learning models and algorithms under a simple yet versatile
API.
This module is motivated by two goals:
Its content should be accessible. The book only assumes familiarity
with basic programming and math.
Its content should be practical. This book offers hands-on examples
that readers can adapt to problems in the real world.
Python: Advanced Predictive Analytics: 2017-12 python重量级高级大数据分析预测
Python: Advanced Predictive Analytics: Gain practical insights by exploiting data in your business to build advanced predictive modeling applications
Python: Advanced Predictive Analytics: Gain practical insights by exploiting data in your business to build advanced predictive modeling applications
By 作者: Ashish Kumar – Joseph Babcock
ISBN-10 书号: 1788992369
ISBN-13 书号: 9781788992367
Release 出版日期: 2017-12-27
pages 页数: (660 )
$99.99
Python: Advanced Predictive Analytics: Gain practical insights by exploiting data in your business to build advanced predictive modeling applications
Gain practical insights by exploiting data in your business to build advanced predictive modeling applications
Social Media and the Internet of Things have resulted in an avalanche of data. Data is powerful but not in its raw form; it needs to be processed and modeled, and Python is one of the most robust tools out there to do so. It has an array of packages for predictive modeling and a suite of IDEs to choose from. Using the Python programming language, analysts can use these sophisticated methods to build scalable analytic applications. This book is your guide to getting started with predictive analytics using Python.
You’ll balance both statistical and mathematical concepts, and implement them in Python using libraries such as pandas, scikit-learn, and NumPy. Through case studies and code examples using popular open-source Python libraries, this book illustrates the complete development process for analytic applications. Covering a wide range of algorithms for classification, regression, clustering, as well as cutting-edge techniques such as deep learning, this book illustrates explains how these methods work. You will learn to choose the right approach for your problem and how to develop engaging visualizations to bring to life the insights of predictive modeling.
Finally, you will learn best practices in predictive modeling, as well as the different applications of predictive modeling in the modern world. The course provides you with highly practical content from the following Packt books:
Learning Predictive Analytics with Python
Mastering Predictive Analytics with Python
What You Will Learn
Understand the statistical and mathematical concepts behind predictive analytics algorithms and implement them using Python libraries
Get to know various methods for importing, cleaning, sub-setting, merging, joining, concatenating, exploring, grouping, and plotting data with pandas and NumPy
Master the use of Python notebooks for exploratory data analysis and rapid prototyping
Get to grips with applying regression, classification, clustering, and deep learning algorithms
Discover advanced methods to analyze structured and unstructured data
Visualize the performance of models and the insights they produce
Ensure the robustness of your analytic applications by mastering the best practices of predictive analysis
可爱的python测试开发自动化库 -2018-04-22 V1.0.0.pdf
可爱的python测试开发自动化库 -2018-04-22 V1.0.0.pdf
Table of Contents
Table of Contents
Python测试开发库
参考资料
测试开发
Web UI测试自动化
移动测试自动化
Windows UI测试自动化
UI测试
性能测试
测试框架
Mock
其他测试工具
持续交付
测试工具对接
awesome-python
管理面板(Admin Panels)
算法和设计模式(Algorithms and Design Patterns)
反病毒(Anti-spam)
资产管理(Asset Management)
音频(Audio)
认证(Authentication)
内置类增强(Built-in Classes Enhancement)
CMS(Content Management Systems)
缓存(Caching)
自动聊天工具(ChatOps Tools)
代码分析和lint(Code Analysis)
命令行工具(Command-line Tools)
命令行程序开发( Command-line Application Development)
生产力工具(Productivity Tools)
兼容性(Compatibility)
计算机视觉(Computer Vision)
并发和并行及异步与网络(Concurrency and Parallelism)
配置(Configuration)
加密(Cryptography)
数据分析(Data Analysis)
数据验证(Data Validation)
数据可视化(Data Visualization)
数据库(Database)
数据库驱动(Database Drivers)
日期和时间(Date and Time)
调试工具(Debugging Tools)
深度学习(Deep Learning)
DevOps工具(DevOps Tools)
分发(Distribution)
文档(Documentation)
下载器(Downloader)
电子商务(E-commerce)
编辑器插件(Editor Plugins and IDEs)
电子邮件(Email)
环境管理(Environment Management)
文件(Files)
外部函数接口(Foreign Function Interface)
表单(Forms)
函数式编程(Functional Programming)
图形用户界面(GUI)
HTML操作(HTML Manipulation)
HTTP
硬件(Hardware)
图像处理(Image Processing)
实现(Implementations)
交互式Python解释器(Interactive Interpreter)
国际化
作业调度(Job Scheduler)
日志(Logging)
机器学习
MapReduce
微软Windows
杂项
自然语言处理(Natural Language Processing)
网络虚拟化(Network Virtualization)
网络(Networking)
动态消息
ORM
关系型数据库
NoSQL 数据库
其他
包管理(Package Management)
包仓库
RESTful API
RPC服务器(RPC Servers)
科学(Science)
搜索
序列化(Serialization)
无服务器框架(Serverless Frameworks
特殊文本格式处理(Specific Formats Processing)
通用
Office
PDF
Markdown
YAML
CSV
静态网站生成器(Static Site Generator)
标签(Tagging)
模板引擎(Template Engine)
文本处理(Text Processing)
通用
Slugify
解析器
第三方 API(Third-party APIs)
URL处理(URL Manipulation)
Video
WSGI 服务器(WSGI Servers)
网页内容提取(Web Content Extracting)
网络爬虫(Web Crawling)
Web 框架(Web Frameworks)
WebSocket
持续更新
可以到http://blog.sciencenet.cn/blog-2604609-1110492.html 免费下载