Pass The Python Interview: 69 Python Coding Questions, Solutions and Explanations by Lionel Osamba, 2023
Learn about the computer science concepts of data structures and algorithms and build implementations of each from scratch in modern Python.
Includes Python, Interview Questions, Data Structures, Big O, Recursion, Sort and Search Algorithms, and more.
#python #book #world
Learn about the computer science concepts of data structures and algorithms and build implementations of each from scratch in modern Python.
Includes Python, Interview Questions, Data Structures, Big O, Recursion, Sort and Search Algorithms, and more.
#python #book #world
👍7
Pass.The.Python.Interview.pdf
13.7 MB
Pass The Python Interview: 69 Python Coding Questions, Solutions and Explanations by Lionel Osamba, 2023
👍12
Programming Linux Anti-Reversing Techniques by Jacob Baines, Leanpub book
Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more.
The code is presented to the reader ready to compile and analyze on their own.
#linux #reverse
Programming Linux Anti-Reversing Techniques teaches the reader how to code and analyze well known anti-reversing techniques for Linux. The book shows how a reverse engineer analyzes a binary using tools like IDA, Radare2, GDB, readelf, and more.
The code is presented to the reader ready to compile and analyze on their own.
#linux #reverse
👍5🔥1🤔1
Programming Linux Anti-Reversing Technique.pdf
935.3 KB
Programming Linux Anti-Reversing Techniques by Jacob Baines, Leanpub book
👍7🔥1
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020
Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by industry experts, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
#book #cisco
Third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by industry experts, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
#book #cisco
👍5
Network Security, Firewall and VPNs.pdf
26.2 MB
Network Security, Firewalls, and VPNs by J. Michael Stewart, Denise Kinsey, 3rd Edition, 2020
👍6
Malware Sandboxing (Build your own Sandbox) by Mostafa Yahia
The guide provides an introduction to both static and dynamic malware analysis tools and techniques, which can be useful for SOC analysts, information security analysts, and investigators who want to learn how to perform initial malware analysis.
By following the steps outlined in this guide, you can learn how to build your own sandbox and use various tools to analyze malware.
This knowledge can help you better understand the behavior of malware and how to detect and respond to it in a timely manner.
#malware
The guide provides an introduction to both static and dynamic malware analysis tools and techniques, which can be useful for SOC analysts, information security analysts, and investigators who want to learn how to perform initial malware analysis.
By following the steps outlined in this guide, you can learn how to build your own sandbox and use various tools to analyze malware.
This knowledge can help you better understand the behavior of malware and how to detect and respond to it in a timely manner.
#malware
👍5
Malware Sandboxing (Build your own Sandbox).pdf
2.4 MB
Malware Sandboxing (Build your own Sandbox) by Mostafa Yahia
👍6❤2
Cybersecurity Checklist by NIST Framework
This handy task checklist is based on the NIST Framework. For each item, it has a checkbox labeled CURRENT ASSESSMENT with another labeled YEAR 1 ASSESSMENT
#docs
This handy task checklist is based on the NIST Framework. For each item, it has a checkbox labeled CURRENT ASSESSMENT with another labeled YEAR 1 ASSESSMENT
#docs
👍4
Секреты Python. 59 рекомендаций по написанию эффективного кода, А.Г. Гузикевич, Бретт Слаткин, 2016
Книга приобщит вас к стилю программирования, выдержанному в истинном "духе Python", и поможет научиться писать исключительно надежный и высокопроизводительный код.
Используя сжатый стиль изложения, пионером которого был Скотт Мейерс, автор приводит 59 описаний лучших методик программирования, дает советы и показывает кратчайшие пути решения различных задач.
#book #python
Книга приобщит вас к стилю программирования, выдержанному в истинном "духе Python", и поможет научиться писать исключительно надежный и высокопроизводительный код.
Используя сжатый стиль изложения, пионером которого был Скотт Мейерс, автор приводит 59 описаний лучших методик программирования, дает советы и показывает кратчайшие пути решения различных задач.
#book #python
👍5