Electronic catalog

el cat en


 

База данных: Electronic library

Page 1, Results: 10

Отмеченные записи: 0

615(075.8)
S55

Shokur, O. A.
    General recipe. Medicinal forms. General pharmacology : study guide / O. A. Shokur, Khozhaenko, E. V., Khotimchenko, Yu. S. - 5744450519. - Vladivostok : Publishing House of the Far Eastern Federal University, 2021. - ( час. мин.), 5744450519. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/BECF4407-2DEB-47B0-8810-7B43FDEBE434
Перевод заглавия: Медицинский рецепт. Лекарственные формы. Общая фармакология

УДК

Рубрики: учебные издания

Кл.слова (ненормированные):
pharmacology -- recipes -- medicine -- medicinal forms -- drugs -- медицина -- биологические препараты -- электронные ресурсы -- лекарственные средства -- рецепты (медицина) -- клиническая фармакология -- фармакология -- ДВФУ (труды преподавателей)

Доп.точки доступа:
Khozhaenko, E. V.
Khotimchenko, Yu. S.

Shokur, O. A. General recipe. Medicinal forms. General pharmacology [Текст] : study guide / O. A. Shokur, Khozhaenko, E. V., Khotimchenko, Yu. S., 2021

1.

Shokur, O. A. General recipe. Medicinal forms. General pharmacology [Текст] : study guide / O. A. Shokur, Khozhaenko, E. V., Khotimchenko, Yu. S., 2021


615(075.8)
S55

Shokur, O. A.
    General recipe. Medicinal forms. General pharmacology : study guide / O. A. Shokur, Khozhaenko, E. V., Khotimchenko, Yu. S. - 5744450519. - Vladivostok : Publishing House of the Far Eastern Federal University, 2021. - ( час. мин.), 5744450519. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/BECF4407-2DEB-47B0-8810-7B43FDEBE434
Перевод заглавия: Медицинский рецепт. Лекарственные формы. Общая фармакология

УДК

Рубрики: учебные издания

Кл.слова (ненормированные):
pharmacology -- recipes -- medicine -- medicinal forms -- drugs -- медицина -- биологические препараты -- электронные ресурсы -- лекарственные средства -- рецепты (медицина) -- клиническая фармакология -- фармакология -- ДВФУ (труды преподавателей)

Доп.точки доступа:
Khozhaenko, E. V.
Khotimchenko, Yu. S.

DDC 808
P 47


    Persuasion in public discourse : : cognitive and functional perspectives / / edited by Jana Pelclová and Wei-lun Lu. - Amsterdam ; ; Philadelphia : : John Benjamins Publishing Company,, [2018]. - 1 online resource. - (Discourse approaches to politics, society, and culture (DAPSAC) ; ; vol. 79). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A3A35C04-7ED9-4C52-994F-A6FB961F1446. - ISBN 9789027263599 (pdf). - ISBN 9027263590
Description based on print version record and CIP data provided by publisher; resource not viewed.
Параллельные издания: Print version: : Persuasion in public discourse. - Amsterdam ; Philadelphia : John Benjamins Publishing Company, [2018]. - ISBN 9789027201386
    Содержание:
Patterns of persuasion in Hungarian medical discourse domain from the 16th and 17th centuries / Agnes Kuna -- Construction of the speaker's persuasive image in public discourse : classical rhetoric revisited / Janja Žmavc -- Metaphor as a (de-)legitimizing strategy in leadership discourse: the language of crisis in Winston Churchill's Cold War speeches / Jan Sebera and Wei-lun Lu -- Fictionalizing scenarios in political discourse : Catalan self-determination / Gonzalo Calle Rosingana -- "The end is near" : negative attitude and fear in political discourse / Francisco O. D. Veloso and Dezheng Feng -- Reframing as a persuasive device in public speech : beyond globalized biodiversity / Anna Franca Plastina -- Dissuasion by characterization : the "poisoning" of an heroic analogy in Russian public discourse / Ludmilla A. Beckett -- Saving face online : institutional responses to negative customer reviews on Trip Advisor / Christopher Hopkinson -- Constructing the ideal organization : metaphor in higher education brand communication / Carl Jon Way Ng -- Persuasion in academic discourse : cross-cultural variation in anglophone and Czech academic book reviews / Olga Dontcheva-Navrátilová -- Promotional strategies in academic writing : statements of contribution in Spanish and ELF research articles / Pilar Mur-Dueñas -- Iconicity in independent noun phrases in print advertising : a multimodal perspective / Jana Pelclová -- Persuasion in musical multimedia : a conceptual blending theory approach / Mihailo Antović.

~РУБ DDC 808

Рубрики: Persuasion (Rhetoric)

   Discourse analysis.


   LANGUAGE ARTS & DISCIPLINES / Composition & Creative Writing.


   LANGUAGE ARTS & DISCIPLINES / Rhetoric.


   REFERENCE / Writing Skills.


Аннотация: "This book approaches persuasion in public discourse as a rhetorical phenomenon that enables the persuader to appeal to the addressee's intellectual and emotional capacities in a competing public environment. The aim is to investigate persuasive strategies from the overlapping perspectives of cognitive and functional linguistics. Both qualitative and quantitative analyses of authentic data (including English, Czech, Spanish, Slovene, Russian, and Hungarian) are grounded in the frameworks of functional grammar, facework and rapport management, classical rhetoric studies and multimodal discourse analysis and are linked to the constructs of (re)framing, conceptual metaphor and blending, mental space and viewpoint. In addition to traditional genres such as political speeches, news reporting, and advertising, the book also studies texts that examine book reviews, medieval medical recipes, public complaints or anonymous viral videos. Apart from discourse analysts, pragmaticians and cognitive linguists, the intended readership includes cognitive musicologists, semioticians, historical linguists or scholars of neighbouring disciplines"--

Доп.точки доступа:
Pelclová, Jana, \editor.\
Lu, Wei-lun ((Linguist),) \ditor.\

Persuasion in public discourse : [Электронный ресурс] : cognitive and functional perspectives / / edited by Jana Pelclová and Wei-lun Lu., [2018]. - 1 online resource. с. (Введено оглавление)

2.

Persuasion in public discourse : [Электронный ресурс] : cognitive and functional perspectives / / edited by Jana Pelclová and Wei-lun Lu., [2018]. - 1 online resource. с. (Введено оглавление)


DDC 808
P 47


    Persuasion in public discourse : : cognitive and functional perspectives / / edited by Jana Pelclová and Wei-lun Lu. - Amsterdam ; ; Philadelphia : : John Benjamins Publishing Company,, [2018]. - 1 online resource. - (Discourse approaches to politics, society, and culture (DAPSAC) ; ; vol. 79). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A3A35C04-7ED9-4C52-994F-A6FB961F1446. - ISBN 9789027263599 (pdf). - ISBN 9027263590
Description based on print version record and CIP data provided by publisher; resource not viewed.
Параллельные издания: Print version: : Persuasion in public discourse. - Amsterdam ; Philadelphia : John Benjamins Publishing Company, [2018]. - ISBN 9789027201386
    Содержание:
Patterns of persuasion in Hungarian medical discourse domain from the 16th and 17th centuries / Agnes Kuna -- Construction of the speaker's persuasive image in public discourse : classical rhetoric revisited / Janja Žmavc -- Metaphor as a (de-)legitimizing strategy in leadership discourse: the language of crisis in Winston Churchill's Cold War speeches / Jan Sebera and Wei-lun Lu -- Fictionalizing scenarios in political discourse : Catalan self-determination / Gonzalo Calle Rosingana -- "The end is near" : negative attitude and fear in political discourse / Francisco O. D. Veloso and Dezheng Feng -- Reframing as a persuasive device in public speech : beyond globalized biodiversity / Anna Franca Plastina -- Dissuasion by characterization : the "poisoning" of an heroic analogy in Russian public discourse / Ludmilla A. Beckett -- Saving face online : institutional responses to negative customer reviews on Trip Advisor / Christopher Hopkinson -- Constructing the ideal organization : metaphor in higher education brand communication / Carl Jon Way Ng -- Persuasion in academic discourse : cross-cultural variation in anglophone and Czech academic book reviews / Olga Dontcheva-Navrátilová -- Promotional strategies in academic writing : statements of contribution in Spanish and ELF research articles / Pilar Mur-Dueñas -- Iconicity in independent noun phrases in print advertising : a multimodal perspective / Jana Pelclová -- Persuasion in musical multimedia : a conceptual blending theory approach / Mihailo Antović.

~РУБ DDC 808

Рубрики: Persuasion (Rhetoric)

   Discourse analysis.


   LANGUAGE ARTS & DISCIPLINES / Composition & Creative Writing.


   LANGUAGE ARTS & DISCIPLINES / Rhetoric.


   REFERENCE / Writing Skills.


Аннотация: "This book approaches persuasion in public discourse as a rhetorical phenomenon that enables the persuader to appeal to the addressee's intellectual and emotional capacities in a competing public environment. The aim is to investigate persuasive strategies from the overlapping perspectives of cognitive and functional linguistics. Both qualitative and quantitative analyses of authentic data (including English, Czech, Spanish, Slovene, Russian, and Hungarian) are grounded in the frameworks of functional grammar, facework and rapport management, classical rhetoric studies and multimodal discourse analysis and are linked to the constructs of (re)framing, conceptual metaphor and blending, mental space and viewpoint. In addition to traditional genres such as political speeches, news reporting, and advertising, the book also studies texts that examine book reviews, medieval medical recipes, public complaints or anonymous viral videos. Apart from discourse analysts, pragmaticians and cognitive linguists, the intended readership includes cognitive musicologists, semioticians, historical linguists or scholars of neighbouring disciplines"--

Доп.точки доступа:
Pelclová, Jana, \editor.\
Lu, Wei-lun ((Linguist),) \ditor.\

DDC 005.432
K 17

Kalsi, Tajinder.
    Practical Linux Security Cookbook [[electronic resource] :] : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition. / Tajinder. Kalsi. - 2nd ed. - Birmingham : : Packt Publishing Ltd,, 2018. - 1 online resource (475 p.). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/D7BEB9D6-CAE3-4096-B539-9568FC7EB2FE. - ISBN 9781789136005. - ISBN 1789136008
Description based upon print version of record. Installing and configuring a basic LDAP server on Ubuntu
Параллельные издания: Print version: : Kalsi, Tajinder Practical Linux Security Cookbook : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition. - Birmingham : Packt Publishing Ltd,c2018. - ISBN 9781789138399
    Содержание:
Cover; Title Page; Copyright and Credits; Contributors; Packt Upsell; Table of Contents; Preface; Chapter 1: Linux Security Problem; Security policy; Developing a security policy; Linux security myths; Myth -- as Linux is open source, it is considered to be insecure; Myth -- Linux is an experts-only system, and only they know how to configure their systems in terms of security; Myth -- Linux is virus free; Configuring server security; How to do it...; User management; Password policy; Configuration policy; Monitoring policy; How it works...; Security policy -- server security; How to do it…
General policyConfiguration policy; Monitoring policy; How it works…; Defining security controls; How to do it...; Installation; Boot and disk; Network and services; Intrusion detection and Denial of Service (DoS); Auditing and availability; How it works...; Checking the integrity of installation medium by using checksum; Getting ready; How to do it…; How it works…; See also; Using LUKS disk encryption; Getting ready; How to do it...; There's more...; Make use of sudoers -- configuring sudo access; Getting ready; How to do it…; How it works…; There's more…; Vulnerability assessment
Scanning hosts with NmapGetting ready; How to do it...; How it works...; See also; Gaining root on a vulnerable Linux system; Getting ready; How to do it...; How it works...; There's more...; Missing backup plans; Getting ready; How to do it...; fwbackups; rsync; Amanda (Advanced Maryland Automatic Network Disk Archiver); Simple Backup Solution (SBS); Bacula; How it works...; Chapter 2: Configuring a Secure and Optimized Kernel; Creating USB boot media; Getting ready; How to do it...; How it works...; Retrieving the kernel source; Getting ready; How to do it...; How it works...
Configuring and building kernelGetting ready; How to do it...; How it works...; Installing and booting from a kernel; Getting ready; How to do it...; How it works...; Kernel testing and debugging; Configuring console for debugging using netconsole; Getting ready; How to do it...; How it works...; There's more...; Debugging kernel boot; How to do it...; Kernel errors; Causes of kernel errors; Checking kernel parameters using Lynis; Getting ready; How to do it...; Chapter 3: Local Filesystem Security; Viewing files and directory details using ls; Getting ready; How to do it…; How it works…
Using chmod to set permissions on files and directoriesGetting ready; How to do it...; How it works...; There's more...; Using chown to change ownership of files and directories; How to do it...; There's more...; Using ACLs to access files; Getting ready; How to do it...; There's more...; File handling using the mv command (moving and renaming); Getting ready; How it works...; Implementing Mandatory Access Control with SELinux; Getting ready; How to do it...; How it works...; There's more...; Using extended file attributes to protect sensitive files; Getting ready; How to do it...

~РУБ DDC 005.432

Рубрики: Operating systems--Security measures.

   COMPUTERS / Operating Systems / Linux.


   COMPUTERS / Security / General.


Аннотация: Linux is often treated as a highly secure operating system. However, the reality is that Linux too has its own share of security flaws. These flaws allow attackers to get into your system and modify or even destroy your important data. This book will work as a practical guide for administrators and help them configure a more secure machine.

Kalsi, Tajinder. Practical Linux Security Cookbook [[electronic resource] :] : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition. / Tajinder. Kalsi, 2018. - 1 online resource (475 p.) с. (Введено оглавление)

3.

Kalsi, Tajinder. Practical Linux Security Cookbook [[electronic resource] :] : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition. / Tajinder. Kalsi, 2018. - 1 online resource (475 p.) с. (Введено оглавление)


DDC 005.432
K 17

Kalsi, Tajinder.
    Practical Linux Security Cookbook [[electronic resource] :] : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition. / Tajinder. Kalsi. - 2nd ed. - Birmingham : : Packt Publishing Ltd,, 2018. - 1 online resource (475 p.). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/D7BEB9D6-CAE3-4096-B539-9568FC7EB2FE. - ISBN 9781789136005. - ISBN 1789136008
Description based upon print version of record. Installing and configuring a basic LDAP server on Ubuntu
Параллельные издания: Print version: : Kalsi, Tajinder Practical Linux Security Cookbook : Secure Your Linux Environment from Modern-Day Attacks with Practical Recipes, 2nd Edition. - Birmingham : Packt Publishing Ltd,c2018. - ISBN 9781789138399
    Содержание:
Cover; Title Page; Copyright and Credits; Contributors; Packt Upsell; Table of Contents; Preface; Chapter 1: Linux Security Problem; Security policy; Developing a security policy; Linux security myths; Myth -- as Linux is open source, it is considered to be insecure; Myth -- Linux is an experts-only system, and only they know how to configure their systems in terms of security; Myth -- Linux is virus free; Configuring server security; How to do it...; User management; Password policy; Configuration policy; Monitoring policy; How it works...; Security policy -- server security; How to do it…
General policyConfiguration policy; Monitoring policy; How it works…; Defining security controls; How to do it...; Installation; Boot and disk; Network and services; Intrusion detection and Denial of Service (DoS); Auditing and availability; How it works...; Checking the integrity of installation medium by using checksum; Getting ready; How to do it…; How it works…; See also; Using LUKS disk encryption; Getting ready; How to do it...; There's more...; Make use of sudoers -- configuring sudo access; Getting ready; How to do it…; How it works…; There's more…; Vulnerability assessment
Scanning hosts with NmapGetting ready; How to do it...; How it works...; See also; Gaining root on a vulnerable Linux system; Getting ready; How to do it...; How it works...; There's more...; Missing backup plans; Getting ready; How to do it...; fwbackups; rsync; Amanda (Advanced Maryland Automatic Network Disk Archiver); Simple Backup Solution (SBS); Bacula; How it works...; Chapter 2: Configuring a Secure and Optimized Kernel; Creating USB boot media; Getting ready; How to do it...; How it works...; Retrieving the kernel source; Getting ready; How to do it...; How it works...
Configuring and building kernelGetting ready; How to do it...; How it works...; Installing and booting from a kernel; Getting ready; How to do it...; How it works...; Kernel testing and debugging; Configuring console for debugging using netconsole; Getting ready; How to do it...; How it works...; There's more...; Debugging kernel boot; How to do it...; Kernel errors; Causes of kernel errors; Checking kernel parameters using Lynis; Getting ready; How to do it...; Chapter 3: Local Filesystem Security; Viewing files and directory details using ls; Getting ready; How to do it…; How it works…
Using chmod to set permissions on files and directoriesGetting ready; How to do it...; How it works...; There's more...; Using chown to change ownership of files and directories; How to do it...; There's more...; Using ACLs to access files; Getting ready; How to do it...; There's more...; File handling using the mv command (moving and renaming); Getting ready; How it works...; Implementing Mandatory Access Control with SELinux; Getting ready; How to do it...; How it works...; There's more...; Using extended file attributes to protect sensitive files; Getting ready; How to do it...

~РУБ DDC 005.432

Рубрики: Operating systems--Security measures.

   COMPUTERS / Operating Systems / Linux.


   COMPUTERS / Security / General.


Аннотация: Linux is often treated as a highly secure operating system. However, the reality is that Linux too has its own share of security flaws. These flaws allow attackers to get into your system and modify or even destroy your important data. This book will work as a practical guide for administrators and help them configure a more secure machine.

DDC 005.8
S 53

Sharma, Himanshu,.
    Kali Linux, an ethical hacker's cookbook : : practical recipes that combine strategies, attacks, and tools for advanced penetration testing / / Himanshu Sharma. - Second edition. - Birmingham, UK : : Packt Publishing,, 2019. - 1 online resource : : il. - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/42DD796F-CA57-4E21-8D29-008B0BF0D066. - ISBN 9781789953701. - ISBN 1789953707
Previous edition published: 2017. Description based on online resource; title from title page (Safari, viewed May 15, 2019).
Параллельные издания: Print version: : Sharma, Himanshu Kali Linux - an Ethical Hacker's Cookbook : Practical Recipes That Combine Strategies, Attacks, and Tools for Advanced Penetration Testing, 2nd Edition. - Birmingham : Packt Publishing Ltd,c2019. - ISBN 9781789952308
    Содержание:
Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Kali -- An Introduction; Configuring Kali Linux; Getting ready; How to do it...; How it works...; Configuring the Xfce environment; How to do it...; Configuring the MATE environment; How to do it...; Configuring the LXDE environment; How to do it...; Configuring the E17 environment; How to do it...; Configuring the KDE environment; How to do it...; Prepping with custom tools; Getting ready; How to do it...; Aquatone; Subfinder; There's more...; Zone Walking using DNSRecon; Getting ready
How to do it...There's more...; Setting up I2P for anonymity; How to do it...; There's more...; Pentesting VPN's ike-scan; Getting ready; How to do it...; Cracking the PSK; There's more...; Setting up proxychains; How to do it...; Using proxychains with Tor; Going on a hunt with Routerhunter; Getting ready; How to do it...; Chapter 2: Gathering Intel and Planning Attack Strategies; Getting a list of subdomains; How to do it...; Using Shodan for fun and profit; Getting ready; How to do it...; Shodan Honeyscore; How to do it...; Shodan plugins; How to do it...; Censys; How to do it...; See also
Using Nmap to find open portsHow to do it...; Using scripts; See also; Bypassing firewalls with Nmap; How to do it...; TCP ACK scan (-sA); TCP Window scan (-sW); Idle scan; How it works...; Searching for open directories using GoBuster; How to do it...; Hunting for SSL flaws; How to do it...; See also; Automating brute force with BruteSpray; How to do it...; Digging deep with TheHarvester; How to do it...; How it works...; Finding technology behind webapps using WhatWeb; How to do it...; Scanning IPs with masscan; How to do it...; Finding origin servers with CloudBunny; How to do it...
Sniffing around with KismetHow to do it...; See also; Testing routers with Firewalk; How to do it...; How it works...; Chapter 3: Vulnerability Assessment -- Poking for Holes; Using the infamous Burp; How to do it...; Exploiting WSDLs with Wsdler; How to do it...; Using Intruder; How to do it...; Using golismero; How to do it...; See also; Exploring Searchsploit; How to do it...; Exploiting routers with routersploit; Getting ready; How to do it...; Using Metasploit; How to do it...; Automating Metasploit; How to do it...; Writing a custom resource script; How to do it...; See also
Setting up a database in MetasploitHow to do it...; Generating payloads with MSFPC; How to do it...; Emulating threats with Cobalt Strike; Getting ready; How to do it...; There's more...; Chapter 4: Web App Exploitation -- Beyond OWASP Top 10; Exploiting XSS with XSS Validator; Getting ready; How to do it...; Injection attacks with sqlmap; How to do it...; See also; Owning all .svn and .git repositories; How to do it...; Winning race conditions; How to do it...; See also; Exploiting XXEs; How to do it...; See also; Exploiting Jboss with JexBoss; How to do it...; Exploiting PHP Object Injection

~РУБ DDC 005.8

Рубрики: Penetration testing (Computer security)

   Computer security.


   Computers--Access control.


   Computer networks--Security measures.


   Computer networks--Security measures.


   Computer security.


   Computers--Access control.


   Penetration testing (Computer security)


   COMPUTERS / Security / General.


   COMPUTERS / Networking / Security.


   COMPUTERS / Security / Online Safety & Privacy.


Аннотация: With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.

Sharma, Himanshu,. Kali Linux, an ethical hacker's cookbook : [Электронный ресурс] : practical recipes that combine strategies, attacks, and tools for advanced penetration testing / / Himanshu Sharma., 2019. - 1 online resource : с. (Введено оглавление)

4.

Sharma, Himanshu,. Kali Linux, an ethical hacker's cookbook : [Электронный ресурс] : practical recipes that combine strategies, attacks, and tools for advanced penetration testing / / Himanshu Sharma., 2019. - 1 online resource : с. (Введено оглавление)


DDC 005.8
S 53

Sharma, Himanshu,.
    Kali Linux, an ethical hacker's cookbook : : practical recipes that combine strategies, attacks, and tools for advanced penetration testing / / Himanshu Sharma. - Second edition. - Birmingham, UK : : Packt Publishing,, 2019. - 1 online resource : : il. - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/42DD796F-CA57-4E21-8D29-008B0BF0D066. - ISBN 9781789953701. - ISBN 1789953707
Previous edition published: 2017. Description based on online resource; title from title page (Safari, viewed May 15, 2019).
Параллельные издания: Print version: : Sharma, Himanshu Kali Linux - an Ethical Hacker's Cookbook : Practical Recipes That Combine Strategies, Attacks, and Tools for Advanced Penetration Testing, 2nd Edition. - Birmingham : Packt Publishing Ltd,c2019. - ISBN 9781789952308
    Содержание:
Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Kali -- An Introduction; Configuring Kali Linux; Getting ready; How to do it...; How it works...; Configuring the Xfce environment; How to do it...; Configuring the MATE environment; How to do it...; Configuring the LXDE environment; How to do it...; Configuring the E17 environment; How to do it...; Configuring the KDE environment; How to do it...; Prepping with custom tools; Getting ready; How to do it...; Aquatone; Subfinder; There's more...; Zone Walking using DNSRecon; Getting ready
How to do it...There's more...; Setting up I2P for anonymity; How to do it...; There's more...; Pentesting VPN's ike-scan; Getting ready; How to do it...; Cracking the PSK; There's more...; Setting up proxychains; How to do it...; Using proxychains with Tor; Going on a hunt with Routerhunter; Getting ready; How to do it...; Chapter 2: Gathering Intel and Planning Attack Strategies; Getting a list of subdomains; How to do it...; Using Shodan for fun and profit; Getting ready; How to do it...; Shodan Honeyscore; How to do it...; Shodan plugins; How to do it...; Censys; How to do it...; See also
Using Nmap to find open portsHow to do it...; Using scripts; See also; Bypassing firewalls with Nmap; How to do it...; TCP ACK scan (-sA); TCP Window scan (-sW); Idle scan; How it works...; Searching for open directories using GoBuster; How to do it...; Hunting for SSL flaws; How to do it...; See also; Automating brute force with BruteSpray; How to do it...; Digging deep with TheHarvester; How to do it...; How it works...; Finding technology behind webapps using WhatWeb; How to do it...; Scanning IPs with masscan; How to do it...; Finding origin servers with CloudBunny; How to do it...
Sniffing around with KismetHow to do it...; See also; Testing routers with Firewalk; How to do it...; How it works...; Chapter 3: Vulnerability Assessment -- Poking for Holes; Using the infamous Burp; How to do it...; Exploiting WSDLs with Wsdler; How to do it...; Using Intruder; How to do it...; Using golismero; How to do it...; See also; Exploring Searchsploit; How to do it...; Exploiting routers with routersploit; Getting ready; How to do it...; Using Metasploit; How to do it...; Automating Metasploit; How to do it...; Writing a custom resource script; How to do it...; See also
Setting up a database in MetasploitHow to do it...; Generating payloads with MSFPC; How to do it...; Emulating threats with Cobalt Strike; Getting ready; How to do it...; There's more...; Chapter 4: Web App Exploitation -- Beyond OWASP Top 10; Exploiting XSS with XSS Validator; Getting ready; How to do it...; Injection attacks with sqlmap; How to do it...; See also; Owning all .svn and .git repositories; How to do it...; Winning race conditions; How to do it...; See also; Exploiting XXEs; How to do it...; See also; Exploiting Jboss with JexBoss; How to do it...; Exploiting PHP Object Injection

~РУБ DDC 005.8

Рубрики: Penetration testing (Computer security)

   Computer security.


   Computers--Access control.


   Computer networks--Security measures.


   Computer networks--Security measures.


   Computer security.


   Computers--Access control.


   Penetration testing (Computer security)


   COMPUTERS / Security / General.


   COMPUTERS / Networking / Security.


   COMPUTERS / Security / Online Safety & Privacy.


Аннотация: With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.

DDC 006.37
E 76

Escrivá, David Millán.
    OpenCV 4 Computer Vision Application Programming Cookbook. / David Millán. Escrivá, Laganiere, Robert. - [Place of publication not identified] : : 2019., Б. г. - 1 online resource. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/B700133F-76C9-4D0F-8FD1-3B8A0D362E98. - ISBN 9781789345285 (electronic bk.). - ISBN 1789345286 (electronic bk.)
Vendor-supplied metadata.
Параллельные издания: Print version: : Millán Escrivá, David. OpenCV 4 Computer Vision Application Programming Cookbook : Build Complex Computer Vision Applications with OpenCV and C++, 4th Edition. - Birmingham : Packt Publishing, Limited, ©2019. - ISBN 9781789340723
    Содержание:
Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Playing with Images; Installing the OpenCV library; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using Qt for OpenCV developments; The OpenCV developer site; See also; Loading, displaying, and saving images; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Clicking on images; Drawing on images; Running the example with Qt; See also; Exploring the cv::Mat data structure; How to do it ... ; How it works ... ; There's more ... ; The input and output arrays
See alsoDefining regions of interest; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using image masks; See also; Chapter 2: Manipulating the Pixels; Accessing pixel values; Getting ready; How to do it ... ; How it works ... ; There's more ... ; The cv::Mat_ template class; See also; Scanning an image with pointers; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Other color reduction formulas; Having input and output arguments; Efficient scanning of continuous images; Low-level pointer arithmetics; See also; Scanning an image with iterators; Getting ready
How to do it ... How it works ... ; There's more ... ; See also; Writing efficient image-scanning loops; How to do it ... ; How it works ... ; There's more ... ; See also; Scanning an image with neighbor access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Performing simple image arithmetic; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Overloaded image operators; Splitting the image channels; Remapping an image; How to do it ... ; How it works ... ; See also; Chapter 3: Processing Color Images with Classes; Comparing colors using the strategy design pattern
How to do it ... How it works ... ; There's more ... ; Computing the distance between two color vectors; Using OpenCV functions; The functor or function object; The OpenCV base class for algorithms; See also; Segmenting an image with the GrabCut algorithm; How to do it ... ; How it works ... ; See also; Converting color representations; Getting ready; How to do it ... ; How it works ... ; See also; Representing colors with hue, saturation, and brightness; How to do it ... ; How it works ... ; There's more ... ; Using colors for detection -- skin tone detection; Chapter 4: Counting the Pixels with Histograms
Computing the image histogramGetting started; How to do it ... ; How it works ... ; There's more ... ; Computing histograms of color images; See also; Applying lookup tables to modify the image's appearance; How to do it ... ; How it works ... ; There's more ... ; Stretching a histogram to improve the image contrast; Applying a lookup table on color images; Equalizing the image histogram; How to do it ... ; How it works ... ; Backprojecting a histogram to detect specific image content; How to do it ... ; How it works ... ; There's more ... ; Backprojecting color histograms

~РУБ DDC 006.37

Рубрики: Application Development.

   Computer Vision.


   Application Software--Development.


   Computers--Artificial Intelligence--Computer Vision & Pattern Recognition.


   Computers--Software Development & Engineering--General.


   Computer vision--Programming.


   C++ (Computer program language)


   Application software.


Аннотация: This book will present a variety of CV algorithms using the standard library. It will implement any shortfall that might come in CV by practicing the recipes that implement various tasks such as image processing and object recognition among others. It will help you in implementing CV algorithms to meet the technical requirement of your projects.

Доп.точки доступа:
Laganiere, Robert.

Escrivá, David Millán. OpenCV 4 Computer Vision Application Programming Cookbook. [Электронный ресурс] / David Millán. Escrivá, Laganiere, Robert. - 1 online resource. с. (Введено оглавление)

5.

Escrivá, David Millán. OpenCV 4 Computer Vision Application Programming Cookbook. [Электронный ресурс] / David Millán. Escrivá, Laganiere, Robert. - 1 online resource. с. (Введено оглавление)


DDC 006.37
E 76

Escrivá, David Millán.
    OpenCV 4 Computer Vision Application Programming Cookbook. / David Millán. Escrivá, Laganiere, Robert. - [Place of publication not identified] : : 2019., Б. г. - 1 online resource. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/B700133F-76C9-4D0F-8FD1-3B8A0D362E98. - ISBN 9781789345285 (electronic bk.). - ISBN 1789345286 (electronic bk.)
Vendor-supplied metadata.
Параллельные издания: Print version: : Millán Escrivá, David. OpenCV 4 Computer Vision Application Programming Cookbook : Build Complex Computer Vision Applications with OpenCV and C++, 4th Edition. - Birmingham : Packt Publishing, Limited, ©2019. - ISBN 9781789340723
    Содержание:
Cover; Title Page; Copyright and Credits; About Packt; Contributors; Table of Contents; Preface; Chapter 1: Playing with Images; Installing the OpenCV library; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using Qt for OpenCV developments; The OpenCV developer site; See also; Loading, displaying, and saving images; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Clicking on images; Drawing on images; Running the example with Qt; See also; Exploring the cv::Mat data structure; How to do it ... ; How it works ... ; There's more ... ; The input and output arrays
See alsoDefining regions of interest; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Using image masks; See also; Chapter 2: Manipulating the Pixels; Accessing pixel values; Getting ready; How to do it ... ; How it works ... ; There's more ... ; The cv::Mat_ template class; See also; Scanning an image with pointers; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Other color reduction formulas; Having input and output arguments; Efficient scanning of continuous images; Low-level pointer arithmetics; See also; Scanning an image with iterators; Getting ready
How to do it ... How it works ... ; There's more ... ; See also; Writing efficient image-scanning loops; How to do it ... ; How it works ... ; There's more ... ; See also; Scanning an image with neighbor access; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Performing simple image arithmetic; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Overloaded image operators; Splitting the image channels; Remapping an image; How to do it ... ; How it works ... ; See also; Chapter 3: Processing Color Images with Classes; Comparing colors using the strategy design pattern
How to do it ... How it works ... ; There's more ... ; Computing the distance between two color vectors; Using OpenCV functions; The functor or function object; The OpenCV base class for algorithms; See also; Segmenting an image with the GrabCut algorithm; How to do it ... ; How it works ... ; See also; Converting color representations; Getting ready; How to do it ... ; How it works ... ; See also; Representing colors with hue, saturation, and brightness; How to do it ... ; How it works ... ; There's more ... ; Using colors for detection -- skin tone detection; Chapter 4: Counting the Pixels with Histograms
Computing the image histogramGetting started; How to do it ... ; How it works ... ; There's more ... ; Computing histograms of color images; See also; Applying lookup tables to modify the image's appearance; How to do it ... ; How it works ... ; There's more ... ; Stretching a histogram to improve the image contrast; Applying a lookup table on color images; Equalizing the image histogram; How to do it ... ; How it works ... ; Backprojecting a histogram to detect specific image content; How to do it ... ; How it works ... ; There's more ... ; Backprojecting color histograms

~РУБ DDC 006.37

Рубрики: Application Development.

   Computer Vision.


   Application Software--Development.


   Computers--Artificial Intelligence--Computer Vision & Pattern Recognition.


   Computers--Software Development & Engineering--General.


   Computer vision--Programming.


   C++ (Computer program language)


   Application software.


Аннотация: This book will present a variety of CV algorithms using the standard library. It will implement any shortfall that might come in CV by practicing the recipes that implement various tasks such as image processing and object recognition among others. It will help you in implementing CV algorithms to meet the technical requirement of your projects.

Доп.точки доступа:
Laganiere, Robert.

DDC 005.13/3
H 32

Harwani, B. M.,
    Practical C programming : : solutions for modern C developers to create efficient and well-structured programs / / B.M. Harwani. - Birmingham, UK : : Packt Publishing,, 2020. - 1 online resource (1 volume) : : il. - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/89F3D57B-DBD5-4B12-96DD-3EBCFE24D704. - ISBN 9781838647988. - ISBN 1838647988
Description based on online resource; title from title page (Safari, viewed July 28, 2020).
Параллельные издания: Print version: : Harwani, B.M. Practical C Programming : Solutions for Modern C Developers to Create Efficient and Well-Structured Programs. - Birmingham : Packt Publishing, Limited, ©2020

~РУБ DDC 005.13/3

Рубрики: C (Computer program language)

   Computer programming.


   C (Computer program language)


   Computer programming


Аннотация: Practical C Programming will teach you how to deal with C and its idiosyncrasies, and benefit from its new features, through bite-sized recipes. Each recipe in the book addresses a specific problem through a discussion that reveals and explains the solution to the recipe. This book will teach all you need to know to become a better C programmer.

Harwani, B. M., Practical C programming : [Электронный ресурс] : solutions for modern C developers to create efficient and well-structured programs / / B.M. Harwani., 2020. - 1 online resource (1 volume) : с.

6.

Harwani, B. M., Practical C programming : [Электронный ресурс] : solutions for modern C developers to create efficient and well-structured programs / / B.M. Harwani., 2020. - 1 online resource (1 volume) : с.


DDC 005.13/3
H 32

Harwani, B. M.,
    Practical C programming : : solutions for modern C developers to create efficient and well-structured programs / / B.M. Harwani. - Birmingham, UK : : Packt Publishing,, 2020. - 1 online resource (1 volume) : : il. - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/89F3D57B-DBD5-4B12-96DD-3EBCFE24D704. - ISBN 9781838647988. - ISBN 1838647988
Description based on online resource; title from title page (Safari, viewed July 28, 2020).
Параллельные издания: Print version: : Harwani, B.M. Practical C Programming : Solutions for Modern C Developers to Create Efficient and Well-Structured Programs. - Birmingham : Packt Publishing, Limited, ©2020

~РУБ DDC 005.13/3

Рубрики: C (Computer program language)

   Computer programming.


   C (Computer program language)


   Computer programming


Аннотация: Practical C Programming will teach you how to deal with C and its idiosyncrasies, and benefit from its new features, through bite-sized recipes. Each recipe in the book addresses a specific problem through a discussion that reveals and explains the solution to the recipe. This book will teach all you need to know to become a better C programmer.

DDC 005.133
D 50

Dey, Sandipan,.
    Python image processing cookbook : : over 60 recipes to help you perform complex image processing and computer vision tasks with ease / / Sandipan Dey. - Birmingham, UK : : Packt Publishing,, 2020. - 1 online resource (1 volume) : : il. - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/32F70928-7AFA-4EB7-ABD5-5F9FD0024EF3. - ISBN 9781789535181. - ISBN 1789535182
Description based on online resource; title from title page (Safari, viewed September 16, 2020).

~РУБ DDC 005.133

Рубрики: Image processing.

   Python (Computer program language)


   Computer vision.


   Machine learning.


   Computer vision


   Image processing


   Machine learning


   Python (Computer program language)


Dey, Sandipan,. Python image processing cookbook : [Электронный ресурс] : over 60 recipes to help you perform complex image processing and computer vision tasks with ease / / Sandipan Dey., 2020. - 1 online resource (1 volume) : с.

7.

Dey, Sandipan,. Python image processing cookbook : [Электронный ресурс] : over 60 recipes to help you perform complex image processing and computer vision tasks with ease / / Sandipan Dey., 2020. - 1 online resource (1 volume) : с.


DDC 005.133
D 50

Dey, Sandipan,.
    Python image processing cookbook : : over 60 recipes to help you perform complex image processing and computer vision tasks with ease / / Sandipan Dey. - Birmingham, UK : : Packt Publishing,, 2020. - 1 online resource (1 volume) : : il. - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/32F70928-7AFA-4EB7-ABD5-5F9FD0024EF3. - ISBN 9781789535181. - ISBN 1789535182
Description based on online resource; title from title page (Safari, viewed September 16, 2020).

~РУБ DDC 005.133

Рубрики: Image processing.

   Python (Computer program language)


   Computer vision.


   Machine learning.


   Computer vision


   Image processing


   Machine learning


   Python (Computer program language)


DDC 510.285/536
M 84

Morley, Sam,.
    Applying math with Python : : practical recipes for solving computational math problems using Python programming and its libraries / / Sam Morley. - Birmingham, UK : : Packt Publishing,, 2020. - 1 online resource (1 volume) : : il. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/1883E65B-8F13-45CA-BC7E-9C056AA18D5D. - ISBN 1838986561 (electronic bk.). - ISBN 9781838986568 (electronic bk.)
Online resource; title from title page (viewed October 30, 2020).

~РУБ DDC 510.285/536

Рубрики: Mathematics--Data processing.

   Python (Computer program language)


   Mathematics--Data processing.


   Python (Computer program language)


Morley, Sam,. Applying math with Python : [Электронный ресурс] : practical recipes for solving computational math problems using Python programming and its libraries / / Sam Morley., 2020. - 1 online resource (1 volume) : с.

8.

Morley, Sam,. Applying math with Python : [Электронный ресурс] : practical recipes for solving computational math problems using Python programming and its libraries / / Sam Morley., 2020. - 1 online resource (1 volume) : с.


DDC 510.285/536
M 84

Morley, Sam,.
    Applying math with Python : : practical recipes for solving computational math problems using Python programming and its libraries / / Sam Morley. - Birmingham, UK : : Packt Publishing,, 2020. - 1 online resource (1 volume) : : il. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/1883E65B-8F13-45CA-BC7E-9C056AA18D5D. - ISBN 1838986561 (electronic bk.). - ISBN 9781838986568 (electronic bk.)
Online resource; title from title page (viewed October 30, 2020).

~РУБ DDC 510.285/536

Рубрики: Mathematics--Data processing.

   Python (Computer program language)


   Mathematics--Data processing.


   Python (Computer program language)


DDC 332.0285/5133
L 63

Lewinson, Eryk,.
    Python for finance cookbook : : over 50 recipes for applying modern Python libraries to finance data analysis / / Eryk Lewinson. - Birmingham, UK : : Packt,, 2020. - 1 online resource. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/0170BB70-B2EE-42BC-81DC-CC0E8D2F1922. - ISBN 1789617324 (electronic book). - ISBN 9781789617320 (electronic bk.)
Description based on online resource; title from digital title page (viewed on March 12, 2020).
Параллельные издания: Print version: :

~РУБ DDC 332.0285/5133

Рубрики: Finance--Mathematical models.

   Python (Computer program language)


   Finance--Data processing.


Lewinson, Eryk,. Python for finance cookbook : [Электронный ресурс] : over 50 recipes for applying modern Python libraries to finance data analysis / / Eryk Lewinson., 2020. - 1 online resource с.

9.

Lewinson, Eryk,. Python for finance cookbook : [Электронный ресурс] : over 50 recipes for applying modern Python libraries to finance data analysis / / Eryk Lewinson., 2020. - 1 online resource с.


DDC 332.0285/5133
L 63

Lewinson, Eryk,.
    Python for finance cookbook : : over 50 recipes for applying modern Python libraries to finance data analysis / / Eryk Lewinson. - Birmingham, UK : : Packt,, 2020. - 1 online resource. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/0170BB70-B2EE-42BC-81DC-CC0E8D2F1922. - ISBN 1789617324 (electronic book). - ISBN 9781789617320 (electronic bk.)
Description based on online resource; title from digital title page (viewed on March 12, 2020).
Параллельные издания: Print version: :

~РУБ DDC 332.0285/5133

Рубрики: Finance--Mathematical models.

   Python (Computer program language)


   Finance--Data processing.


DDC 005.133
H 30

Harrison, Matt, (1975-).
    Pandas 1.x cookbook : : practical recipes for scientific computing, time series analysis and exploratory data analysis using Python / / Matt Harrison, Theodore Petrou. - Second edition. - Birmingham : : Packt Publishing,, 2020. - 1 online resource. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/F3CF9EF0-70A1-41EB-9D21-46ABE1D1E27E. - ISBN 1839218916. - ISBN 9781839218910 (electronic bk.)
Параллельные издания: Print version: :

~РУБ DDC 005.133

Рубрики: Python (Computer program language)

   Programming languages (Electronic computers)


   Data mining.


   Science--Mathematics--Computer programs.


   Data mining.


   Programming languages (Electronic computers)


   Python (Computer program language)


   Science--Mathematics--Computer programs.



Доп.точки доступа:
Petrou, Theodore, \author.\

Harrison, Matt,. Pandas 1.x cookbook : [Электронный ресурс] : practical recipes for scientific computing, time series analysis and exploratory data analysis using Python / / Matt Harrison, Theodore Petrou., 2020. - 1 online resource с.

10.

Harrison, Matt,. Pandas 1.x cookbook : [Электронный ресурс] : practical recipes for scientific computing, time series analysis and exploratory data analysis using Python / / Matt Harrison, Theodore Petrou., 2020. - 1 online resource с.


DDC 005.133
H 30

Harrison, Matt, (1975-).
    Pandas 1.x cookbook : : practical recipes for scientific computing, time series analysis and exploratory data analysis using Python / / Matt Harrison, Theodore Petrou. - Second edition. - Birmingham : : Packt Publishing,, 2020. - 1 online resource. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/F3CF9EF0-70A1-41EB-9D21-46ABE1D1E27E. - ISBN 1839218916. - ISBN 9781839218910 (electronic bk.)
Параллельные издания: Print version: :

~РУБ DDC 005.133

Рубрики: Python (Computer program language)

   Programming languages (Electronic computers)


   Data mining.


   Science--Mathematics--Computer programs.


   Data mining.


   Programming languages (Electronic computers)


   Python (Computer program language)


   Science--Mathematics--Computer programs.



Доп.точки доступа:
Petrou, Theodore, \author.\

Page 1, Results: 10

 

All acquisitions for 
Or select a month