Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Introduction 1. Basic SQL Commands 2. SQL Functions 3. Data Manipulation 4. Database Administration 5. Performing CRUD Operations 6. The Hard Hitting Concept Of Nested Queries And Recursive 7. Making Your Database Secure 8. Tables Modifying And Controlling 9. Aggregate Functions, Delete, & Update 10. Relationships & Join Queries 11. Expressions 12. Sequences & Injection 13. Creating Databases and Definition Table Relationships 14. Filtering with Operators, Sorting with ORDER BY Conclusion Introduction 1. Python Variables 2. Python Oops Concepts 3. Python Magic Method 4. The Principles Of Algorithm Design 5. How To Use Your Python Skills 6. Development Tools 7. The Best Python Libraries To Use With Data Science 8. Lists And Dictionaries 9. How To Handle Unstructured Data With Text Mining 10. Variable Scope And Lifetime In Python Functions 11. Future Of Python Conclusion Introduction 1. Ethical Hacker 2. The Meaning of Ethical Hacking And Types 3. Pick Your Hat 4. Programming Linux 5. The Hacking Process 6. Kali Linux Tools 7. Malware And Cyber Attacks 8. Virtual Private Networks To Help 9. Attacking With Frameworks 10. Real Examples Of How To Hack With Kali Linux 11. Cryptography And Network Security Conclusion Introduction 1. Hacking with Kali Linux 2. Back Door Attacks 3. Cybersecurity 4. Wireless Networking 5. How to Initiate A Hack Using Kali Linux? 6. Your First Hack 7. Ethical Hacking and Penetration Testing 8. Solving Level Problems 9. Exploitation of Computer Systems 10. How to Spoof Addresses 11. FAQs Conclusion
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion