Apress – PowerShell Core for SQL Server – Automating Your Transact-SQL Scripts

Apress – PowerShell Core for SQL Server – Automating Your Transact-SQL Scripts
English | Size: 549.17 MB
Category: Programming


Get up and running with accessing SQL Server from PowerShell Core. By the end of this video you’ll have learned how to issue Transact-SQL statements and get results back, how to insert, modify, and delete data in the database, and how to import and export data to and from SQL Server. You’ll be equipped to automate database administration and other maintenance tasks through using PowerShell to automate the execution of Transact-SQL scripts that are stored in files that you can easily edit to keep up with changing business needs.

Apress – Ethical Hacking – Orchestrating Attacks

Apress – Ethical Hacking – Orchestrating Attacks
English | Size: 389.43 MB
Category: HACKING | Networking | Security

Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an antivirus bypass framework. You will then learn how to bypass Windows Defender and other antivirus software. Following this, you will look at the post-exploitation phase of the attack to determine the value of the compromised machine and to maintain control of it for later use. Shifting the focus to website attacks, you will look at various vulnerabilities to watch out for and exploit. Finally, you will go through a number of attacks that can breach your website. Key attacks such as SQL injection, XSS, and buffer overflows will be analyzed in detail.

Apress – Ethical Hacking Orchestrating Attacks

Apress – Ethical Hacking Orchestrating Attacks
English | Size: 389.43 MB
Category: CBTs

Focus on the key attacks you can use to detect flaws in websites and networks. You will begin by installing your virtual machine and Kali Linux on your system. You will also install your server and host a buggy web application. Starting with network attacks, you will begin by installing an antivirus bypass framework. You will then learn how to bypass Windows Defender and other antivirus software. Following this, you will look at the post-exploitation phase of the attack to determine the value of the compromised machine and to maintain control of it for later use. Shifting the focus to website attacks, you will look at various vulnerabilities to watch out for and exploit. Finally, you will go through a number of attacks that can breach your website. Key attacks such as SQL injection, XSS, and buffer overflows will be analyzed in detail.

Apress Arduino for Absolute Beginners Getting Started

Apress Arduino for Absolute Beginners Getting Started-ZH
English | Size: 376.87 MB
Category: Tutorial

Are you interested in Arduino and electronics, but aren’t sure how to get started? Beginning with no assumed knowledge, we will cover the basic set up for the Arduino and the Arduino IDE, as well as a few components and how to use them. This video will equip you with enough base knowledge to empower you to start exploring on your own.