Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
(ebook)
(audiobook)
(audiobook)
- Autor:
- Nipun Jaswal
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 378
- Dostępne formaty:
-
PDFePubMobi
Opis
książki
:
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
Wybrane bestsellery
-
Promocja
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
Promocja
W sieci zabezpieczeń, które stworzyliśmy dla ochrony naszych danych, najsłabszym elementem jest zawsze czynnik ludzki. Hackerzy, zarówno etyczni, jak i nie, korzystają z wachlarza sztuczek opierających na „hackowaniu osobistym” i pozwalających przekonać innych do ujawnienia haseł, przekazania wrażliwych plików, przelania znacznych sum pieniędzy i świadomego podjęcia działań, które zdecydowanie nie są w najlepszym interesie osób, które wykonują te czynności. Książka Socjotechnika. Sztuka zdobywania władzy nad umysłami opisuje te sztuczki, aby umożliwić specjalistom zajmującym się bezpieczeństwem danych wykorzystanie tych umiejętności w celu odkrycia i wyeliminowania słabości zabezpieczeń. Niniejsza pozycja zarówno przedstawia techniki takie, jak modelowanie komunikacji, mentalność plemienna, obserwacja bądź manipulacja, jak i prezentuje wskazówki umożliwiające rozpoznanie, zwalczanie i zapobieganie atakom wykorzystującym inżynierię społeczną.- PDF + ePub + Mobi
- Audiobook MP3
- Druk 35 pkt
(24,90 zł najniższa cena z 30 dni)
35.40 zł
59.00 zł (-40%) -
Cybersecurity is one of the key aspects for all organizations, especially in the era of malware attacks and phishing. Cutting-edge data protection systems are the key to a thriving organization, and this is where penetration testing can truly make a difference. ParrotSec has some exciting features to compete with large players like Kali and become the next big thing. This book is a comprehensive guide to all Parrot Security features, complete with advice on how to properly use it for penetration testing.
W przygotowaniu
Powiadom mnie, gdy książka będzie dostępna -
Promocja
The definitive guide to installing and configuring IBM FileNet Information Management software Key Features Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboard, a- ePub + Mobi 80 pkt
(71,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
A comprehensive guide to Multi-Cloud Administration for Cloud professionals Key Features Get familiar with the various components involved in establishing a multi-cloud architecture. Acquire the skills to effectively manage multi-cloud environments. Establish guardrails and guidelines to ensure interoperability and security across multiple cloud p- ePub + Mobi 80 pkt
(71,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more Key Features Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advanced o- ePub + Mobi 80 pkt
(71,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,- ePub + Mobi 58 pkt
(29,90 zł najniższa cena z 30 dni)
58.49 zł
64.98 zł (-10%) -
Promocja
Everything you need to know to secure your IoT devices Key Features Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities that can affect IoT devices. Implement security measures to protect IoT devices from attack. Description The Internet of Things (IoT) is a rapidly growing netwo- ePub + Mobi 80 pkt
(38,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
Learn how to leverage DevSecOps to secure your modern enterprise in the cloud Key Features Explore DevSecOps principles, fundamentals, practices, and their application in AWS environments comprehensively and in-depth. Leverage AWS services and tools to enhance security within your DevSecOps pipeline, gaining deep insights. Implement DevSecOps prac- ePub + Mobi 80 pkt
(38,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
Take your career to the next level by becoming an ISC2 certified cloud security professional (CCSP) Key Features Prepares you to crack the ISC2 CCSP exam successfully. Provides you with concrete knowledge and skills to secure your organizations cloud. Covers all six domains of the CCSP exam in detail for a clear understanding of cloud security. D- ePub + Mobi 80 pkt
(38,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%)
O autorze książki
Nipun Jaswal is an international cybersecurity author and an award-winning IT security researcher with more than a decade of experience in penetration testing, Red Team assessments, vulnerability research, RF, and wireless hacking. He is presently the Director of Cybersecurity Practices at BDO India. Nipun has trained and worked with multiple law enforcement agencies on vulnerability research and exploit development. He has also authored numerous articles and exploits that can be found on popular security databases, such as PacketStorm and exploit-db. Please feel free to contact him at @nipunjaswal.
Nipun Jaswal - pozostałe książki
-
Promocja
Learn to decode the Cyber Mysteries by Mastering Network Forensics Key Features Master all essential network forensics topics with in-depth coverage. Learn from real-world examples and detailed case studies. Gain hands-on experience with network forensic tools and techniques. Description Network forensics is a rapidly growing field with a high de- ePub + Mobi 80 pkt
(38,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
Promocja
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.- PDF + ePub + Mobi 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
Promocja
This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure your infrastructure.- PDF + ePub + Mobi 161 pkt
(29,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł (-10%) -
Promocja
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.- PDF + ePub + Mobi 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
Promocja
In the era of network attacks and malware threat, it becomes important to have skills to investigate the attack evidence and vulnerabilities prevailing in the network. This book focuses on how to acquire and analyze the evidence, write a report and use the common tools in network forensics.- PDF + ePub + Mobi 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
Promocja
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with InsightVM (or Nexpose), Nessus, OpenVas, and other vulnerability scanners provides a validation solution that simplifies vulnerability prioritization and remediation reporting. Teams can collaborate in Metasploit and present their findings in consolidated reports.- PDF + ePub + Mobi 125 pkt
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
Promocja
: Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.- PDF + ePub + Mobi 278 pkt
(29,90 zł najniższa cena z 30 dni)
278.10 zł
309.00 zł (-10%) -
Promocja
Metasploit Bootcamp will enable readers to gain hands-on knowledge on Penetration testing with Metasploit in various environments using a boot camp style approach. The readers will learn about Scanning, fingerprinting and exploiting different software. They will also learn about testing on services like Databases, VOIP and other known and unknown services. Attacking client side and scripting attacks would be made easy with this book. Overall the readers would learn how to test various devices and learn how to integrate Metasploit with industry’s leading tools.- PDF + ePub + Mobi 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
Promocja
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.We start by reminding you about the basic functionalities of Metasploit and its use in the most traditi- PDF + ePub + Mobi 134 pkt
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%)
Ebooka "Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolonych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły książki
- Tytuł oryginału:
- Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
- ISBN Ebooka:
- 978-17-821-6223-0, 9781782162230
- Data wydania ebooka :
- 2014-05-26 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku Pdf:
- 14.1MB
- Rozmiar pliku ePub:
- 30.3MB
- Rozmiar pliku Mobi:
- 44.1MB
Spis treści książki
- Mastering Metasploit
- Table of Contents
- Mastering Metasploit
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers, and more
- Why subscribe?
- Free access for Packt account holders
- Support files, eBooks, discount offers, and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Approaching a Penetration Test Using Metasploit
- Setting up the environment
- Preinteractions
- Intelligence gathering / reconnaissance phase
- Presensing the test grounds
- Modeling threats
- Vulnerability analysis
- Exploitation and post-exploitation
- Reporting
- Mounting the environment
- Setting up the penetration test lab
- The fundamentals of Metasploit
- Configuring Metasploit on different environments
- Configuring Metasploit on Windows XP/7
- Configuring Metasploit on Ubuntu
- Dealing with error states
- Errors in the Windows-based installation
- Errors in the Linux-based installation
- Conducting a penetration test with Metasploit
- Recalling the basics of Metasploit
- Penetration testing Windows XP
- Assumptions
- Gathering intelligence
- Modeling threats
- Vulnerability analysis
- The attack procedure with respect to the NETAPI vulnerability
- The concept of attack
- The procedure of exploiting a vulnerability
- Exploitation and post-exploitation
- Maintaining access
- Clearing tracks
- Penetration testing Windows Server 2003
- Penetration testing Windows 7
- Gathering intelligence
- Modeling threats
- Vulnerability analysis
- The exploitation procedure
- Exploitation and post-exploitation
- Using the database to store and fetch results
- Generating reports
- The dominance of Metasploit
- Open source
- Support for testing large networks and easy naming conventions
- Smart payload generation and switching mechanism
- Cleaner exits
- The GUI environment
- Summary
- Setting up the environment
- 2. Reinventing Metasploit
- Ruby the heart of Metasploit
- Creating your first Ruby program
- Interacting with the Ruby shell
- Defining methods in the shell
- Variables and data types in Ruby
- Working with strings
- The split function
- The squeeze function
- Numbers and conversions in Ruby
- Ranges in Ruby
- Arrays in Ruby
- Methods in Ruby
- Decision-making operators
- Loops in Ruby
- Regular expressions
- Wrapping up with Ruby basics
- Creating your first Ruby program
- Developing custom modules
- Building a module in a nutshell
- The architecture of the Metasploit framework
- Understanding the libraries layout
- Understanding the existing modules
- Writing out a custom FTP scanner module
- Writing out a custom HTTP server scanner
- Writing out post-exploitation modules
- Building a module in a nutshell
- Breakthrough meterpreter scripting
- Essentials of meterpreter scripting
- Pivoting the target network
- Setting up persistent access
- API calls and mixins
- Fabricating custom meterpreter scripts
- Working with RailGun
- Interactive Ruby shell basics
- Understanding RailGun and its scripting
- Manipulating Windows API calls
- Fabricating sophisticated RailGun scripts
- Summary
- Ruby the heart of Metasploit
- 3. The Exploit Formulation Process
- The elemental assembly primer
- The basics
- Architectures
- System organization basics
- Registers
- Gravity of EIP
- Gravity of ESP
- Relevance of NOPs and JMP
- Variables and declaration
- Fabricating example assembly programs
- The joy of fuzzing
- Crashing the application
- Variable input supplies
- Generating junk
- An introduction to Immunity Debugger
- An introduction to GDB
- Building up the exploit base
- Calculating the buffer size
- Calculating the JMP address
- Examining the EIP
- The script
- Stuffing applications for fun and profit
- Examining ESP
- Stuffing the space
- Finalizing the exploit
- Determining bad characters
- Determining space limitations
- Fabricating under Metasploit
- Automation functions in Metasploit
- The fundamentals of a structured exception handler
- Controlling SEH
- Bypassing SEH
- SEH-based exploits
- Summary
- The elemental assembly primer
- 4. Porting Exploits
- Porting a Perl-based exploit
- Dismantling the existing exploit
- Understanding the logic of exploitation
- Gathering the essentials
- Generating a skeleton for the exploit
- Generating a skeleton using Immunity Debugger
- Stuffing the values
- Precluding the ShellCode
- Experimenting with the exploit
- Dismantling the existing exploit
- Porting a Python-based exploit
- Dismantling the existing exploit
- Gathering the essentials
- Generating a skeleton
- Stuffing the values
- Experimenting with the exploit
- Porting a web-based exploit
- Dismantling the existing exploit
- Gathering the essentials
- Grasping the important web functions
- The essentials of the GET/POST method
- Fabricating an auxiliary-based exploit
- Working and explanation
- Experimenting with the auxiliary exploit
- Summary
- Porting a Perl-based exploit
- 5. Offstage Access to Testing Services
- The fundamentals of SCADA
- The fundamentals of ICS and its components
- The seriousness of ICS-SCADA
- SCADA torn apart
- The fundamentals of testing SCADA
- SCADA-based exploits
- Securing SCADA
- Implementing secure SCADA
- Restricting networks
- Database exploitation
- SQL server
- FootPrinting SQL server with Nmap
- Scanning with Metasploit modules
- Brute forcing passwords
- Locating/capturing server passwords
- Browsing SQL server
- Post-exploiting/executing system commands
- Reloading the xp_cmdshell functionality
- Running SQL-based queries
- VOIP exploitation
- VOIP fundamentals
- An introduction to PBX
- Types of VOIP services
- Self-hosted network
- Hosted services
- SIP service providers
- FootPrinting VOIP services
- Scanning VOIP services
- Spoofing a VOIP call
- Exploiting VOIP
- About the vulnerability
- Exploiting the application
- VOIP fundamentals
- Post-exploitation on Apple iDevices
- Exploiting iOS with Metasploit
- Summary
- The fundamentals of SCADA
- 6. Virtual Test Grounds and Staging
- Performing a white box penetration test
- Interaction with the employees and end users
- Gathering intelligence
- Explaining the fundamentals of the OpenVAS vulnerability scanner
- Setting up OpenVAS
- Greenbone interfaces for OpenVAS
- Modeling the threat areas
- Targeting suspected vulnerability prone systems
- Gaining access
- Covering tracks
- Introducing MagicTree
- Other reporting services
- Generating manual reports
- The format of the report
- The executive summary
- Methodology / network admin level report
- Additional sections
- The format of the report
- Performing a black box penetration test
- FootPrinting
- Using Dmitry for FootPrinting
- WHOIS details and information
- Finding out subdomains
- E-mail harvesting
- DNS enumeration with Metasploit
- Using Dmitry for FootPrinting
- Conducting a black box test with Metasploit
- Pivoting to the target
- Scanning the hidden target using proxychains and db_nmap
- Conducting vulnerability scanning using Nessus
- Exploiting the hidden target
- Elevating privileges
- FootPrinting
- Summary
- Performing a white box penetration test
- 7. Sophisticated Client-side Attacks
- Exploiting browsers
- The workings of the browser autopwn attack
- The technology behind the attack
- Attacking browsers with Metasploit browser autopwn
- The workings of the browser autopwn attack
- File format-based exploitation
- PDF-based exploits
- Word-based exploits
- Media-based exploits
- Compromising XAMPP servers
- The PHP meterpreter
- Escalating to system-level privileges
- Compromising the clients of a website
- Injecting the malicious web scripts
- Hacking the users of a website
- Bypassing AV detections
- msfencode
- msfvenom
- Cautions while using encoders
- Conjunction with DNS spoofing
- Tricking victims with DNS hijacking
- Attacking Linux with malicious packages
- Summary
- Exploiting browsers
- 8. The Social Engineering Toolkit
- Explaining the fundamentals of the social engineering toolkit
- The attack types
- Attacking with SET
- Creating a Payload and Listener
- Infectious Media Generator
- Website Attack Vectors
- The Java applet attack
- The tabnabbing attack
- The web jacking attack
- Third-party attacks with SET
- Providing additional features and further readings
- The SET web interface
- Automating SET attacks
- Summary
- Explaining the fundamentals of the social engineering toolkit
- 9. Speeding Up Penetration Testing
- Introducing automated tools
- Fast Track MS SQL attack vectors
- A brief about Fast Track
- Carrying out the MS SQL brute force attack
- The depreciation of Fast Track
- Renewed Fast Track in SET
- A brief about Fast Track
- Automated exploitation in Metasploit
- Re-enabling db_autopwn
- Scanning the target
- Attacking the database
- Fake updates with the DNS-spoofing attack
- Introducing WebSploit
- Fixing up WebSploit
- Fixing path issues
- Fixing payload generation
- Fixing the file copy issue
- Attacking a LAN with WebSploit
- Summary
- 10. Visualizing with Armitage
- The fundamentals of Armitage
- Getting started
- Touring the user interface
- Managing the workspace
- Scanning networks and host management
- Modeling out vulnerabilities
- Finding the match
- Exploitation with Armitage
- Post-exploitation with Armitage
- Attacking on the client side with Armitage
- Scripting Armitage
- The fundamentals of Cortana
- Controlling Metasploit
- Post-exploitation with Cortana
- Building a custom menu in Cortana
- Working with interfaces
- Summary
- Further reading
- The fundamentals of Armitage
- Index
Packt Publishing - inne książki
-
Promocja
Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
Promocja
A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
Promocja
This edition, updated and expanded, addresses feedback from readers and the latest industry developments. It offers invaluable insights into various cybersecurity roles, from SOC Analyst to Penetration Tester, with a focus on succeeding in interviews- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
Promocja
Learn how to use Zabbix for building scalable and customizable enterprise monitoring solutions through detailed recipes, guiding you to overcome issues in infrastructure performance and enhance your monitoring setup by leveraging Zabbix 7 features.- PDF + ePub 134 pkt
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
Promocja
This Packt bestseller will help you master the important areas of the Django framework as you build practical projects from scratch. You’ll learn how to progressively create more complex web apps and fill in gaps in the official documentation.- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
Promocja
The OSINT Handbook book helps you understand the significance of open-source intelligence and master advanced techniques and tools, equipping you with the skills you need to navigate the digital landscape effectively.- PDF + ePub 85 pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
Promocja
This PostgreSQL book gets you up to speed with PostgreSQL 16. It helps you get quick solutions to all your basic and advanced DBA challenges with a hands-on approach that helps you resolve problems while understanding the reasoning- PDF + ePub 134 pkt
PostgreSQL 16 Administration Cookbook. Solve real-world Database Administration challenges with 180+ practical recipes and best practices
Gianni Ciolli, Boriss Mejías, Jimmy Angelakos, Vibhor Kumar, Simon Riggs
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
Promocja
PostgreSQL has become a widely adopted database engine thanks to its robust enterprise capabilities. This edition will not only help you get up and running with the latest changes in PostgreSQL but will also focus on its most important features; like transactions, security, replication, backup and restore, extensions and more.- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
Build scalable applications from the ground up. Learn foundational concepts, design and implement pipelines, and deploy confidently. This comprehensive guide equips you with the skills to excel in the world of natural language processing.
W przygotowaniu
Powiadom mnie, gdy książka będzie dostępna -
This book presents comprehensive insights into MLOps coupled with real-world examples to help you to write programs, train robust and scalable ML models, and build ML pipelines to train and deploy models securely in production.
W przygotowaniu
Powiadom mnie, gdy książka będzie dostępna
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Proszę wybrać ocenę!
Proszę wpisać opinię!
Książka drukowana
* pola obowiązkowe
Proszę czekać...
Oceny i opinie klientów: Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert Nipun Jaswal (0) Weryfikacja opinii następuje na podstawie historii zamowień na koncie Użytkownika umiejszczającego opinię.