Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Introduction
1. Basic SQL Commands
2. SQL Functions
3. Data Manipulation
4. Database Administration
5. Performing CRUD Operations
6. The Hard Hitting Concept Of Nested Queries And Recursive
7. Making Your Database Secure
8. Tables Modifying And Controlling
9. Aggregate Functions, Delete, & Update
10. Relationships & Join Queries
11. Expressions
12. Sequences & Injection
13. Creating Databases and Definition Table Relationships
14. Filtering with Operators, Sorting with ORDER BY
Conclusion
Introduction
1. Python Variables
2. Python Oops Concepts
3. Python Magic Method
4. The Principles Of Algorithm Design
5. How To Use Your Python Skills
6. Development Tools
7. The Best Python Libraries To Use With Data Science
8. Lists And Dictionaries
9. How To Handle Unstructured Data With Text Mining
10. Variable Scope And Lifetime In Python Functions
11. Future Of Python
Conclusion
Introduction
1. Ethical Hacker
2. The Meaning of Ethical Hacking And Types
3. Pick Your Hat
4. Programming Linux
5. The Hacking Process
6. Kali Linux Tools
7. Malware And Cyber Attacks
8. Virtual Private Networks To Help
9. Attacking With Frameworks
10. Real Examples Of How To Hack With Kali Linux
11. Cryptography And Network Security
Conclusion
Introduction
1. Hacking with Kali Linux
2. Back Door Attacks
3. Cybersecurity
4. Wireless Networking
5. How to Initiate A Hack Using Kali Linux?
6. Your First Hack
7. Ethical Hacking and Penetration Testing
8. Solving Level Problems
9. Exploitation of Computer Systems
10. How to Spoof Addresses
11. FAQs
Conclusion
← Prev
Back
Next →
← Prev
Back
Next →