eBooks-it.org Logo
eBooks-IT.org Inner Image

Cookbook eBooks Page 2

Download free Cookbook eBooks Page 2

Blender Cycles

Materials and Textures Cookbook
Blender Cycles Image
3rd Edition
This book is aimed at those familiar with the basics of Blender, looking to delve into the depths of the Cycles rendering engine to create an array of breath-taking materials and textures....

Python Cookbook

Python Cookbook Image
3rd Edition
If you need help writing programs in Python 3, or want to update older Python 2 code, this book is just the ticket. Packed with practical recipes written and tested with Python 3.3, this unique cookbook is for experienced Python programmers who want to focus on modern tools and idioms.Inside, you';ll find complete recipes for more than a dozen topics, covering the core Python language as well as tasks common to a wide variety of application domains. Each recipe contains code samples you can use in your projects right away, along with a discussion about how and why the solution works.Topics include:Data Structures and AlgorithmsStrings and TextNumbers, ...

Snort Cookbook

Snort Cookbook Image
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order...

Violent Python

A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python Image
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. - Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, ...

Jenkins Continuous Integration Cookbook

Jenkins Continuous Integration Cookbook Image
2nd Edition
Over 90 recipes to produce great results from Jenkins using pro-level practices, techniques, and solutions About This BookExplore the use of more than 40 best-of-breed plug-ins for improving efficiencySecure and maintain Jenkins by integrating it with LDAP and CAS, which is a Single Sign-on solutionStep-by-step, easy-to-use instructions to optimize the existing features of Jenkins using the complete set of plug-ins that Jenkins offersWho This Book Is ForIf you are a Java developer, a software architect, a technical project manager, a build manager, or a development or QA engineer, then this book is ideal for you.A basic understanding of the software de...



2007 - 2017 © eBooks-IT.org