The document discusses various Python data structures and modules for working with data structures efficiently. It covers the abc module for defining abstract base classes, the array module for efficient storage of homogeneous data, the bisect module for working with sorted lists, the collections module which provides high-performance container data types like deque and defaultdict, namedtuple for creating tuple subclasses with named fields, heapq for priority queue implementation, and itertools for functions generating efficient iterators.
The document discusses various Python data structures and modules for working with data structures efficiently. It covers the abc module for defining abstract base classes, the array module for efficient storage of homogeneous data, the bisect module for working with sorted lists, the collections module which provides high-performance container data types like deque and defaultdict, namedtuple for creating tuple subclasses with named fields, heapq for priority queue implementation, and itertools for functions generating efficient iterators.
Cybercrime in Russia: Trends and IssuesAlex Matrosov
This report focuses on the development of Russian cybercrime. Firstly, it summarizes the economic and geopolitical factors that underlie computer crime, and which must be taken into consideration by researchers seeking to predict upcoming developments in cybercrime and cybercrime targeting. It goes on to look at the other ways in which Russian presence in the criminal cybersphere can be tracked, considering the technical approaches used by hackers in the region, how they link with economic and geographic factors, as well as with the part played by law enforcement in the investigation of international computer crimes.
The presentation will cover the following topics:
1. How cybercrime is interlinked with economic and geographical factors in Russia. The implications of the banking and instant payment systems of the Russian Federation.
2. Law Enforcement. The laws that currently obtain in the area of Russian computer crime: Legal evasions and loopholes.
3. Technical trends. The use of botnets to steal money from the Internet banking system for corporate clients: Technological and statistical analysis of the malware families involved, the organizational structures of the perpetrators, and the calculation of damages.
4. Successfully prosecuted cases in 2010. Complex investigation: spam affiliates, the WinLock case and others.
5. How DDoS attacks and botnet operations in Russian networks were tracked in co-operation with the Russian honeynet Project.
"파이썬 성능 잠재력을 끌어내는 실용적인 개발 전략서"
미샤 고렐릭,이안 오스발트 지음 / 김영근,오현석 옮김 | 한빛미디어 | 2016년 8월 | 30,000원
★ 파이썬 3 대응
★ 프로토타이핑에서 실무 운영까지 살아가는 파이썬 코드의 비밀
아이디어 무한경쟁이 펼쳐지는 대(大)스타트업 시대! 높은 생산성으로 유명한 파이썬은 최우선 고려사항이다. 한 가지, 컴파일 언어 대비 느린 성능 때문에 성공한 서비스나 성능이 중요한 기능은 컴파일 언어로 다시 작성하곤 한다. 하지만 실무 운영까지 파이썬 코드를 계속 이어가는 방법이 있다면?
이 책은 파이썬을 둘러싼 설계와 작동 원리를 설명하고 이에 기반한 실용적인 구현 전략을 소개한다. 멀티코어 아키텍처와 클러스터의 이점을 활용하려면 어떻게 해야 하는가? 안정성을 잃지 않고 확장하는 방법은 무엇인가? 여러분은 이에 대한 명확한 해법을 찾고 방대한 소셜 데이터까지도 눈부신 속도로 처리해내는 파이썬 코드를 얻게 될 것이다.
★ 주요 내용
● numpy, Cython, 프로파일러 활용하기
● 파이썬의 시선으로 바라보는 컴퓨터 아키텍처 이해하기
● CPU 시간과 메모리 사용량을 프로파일링하여 병목 지점 찾기
● 상황에 맞는 컬렉션으로 효율적인 프로그램 작성하기
● 행렬과 벡터 연산 가속하기
● 네이티브 코드로 컴파일하기
● 대량의 I/O와 연산 동시 수행하기
● 원격 클러스터로 병렬 처리하기
● 적은 메모리로 대규모 데이터 처리하기
Understanding the black hat hacker eco systemDavid Sweigert
This document discusses how misaligned incentives work against cybersecurity. It finds that there are three levels of misaligned incentives:
1) Between attackers and defenders, where attackers are incentivized by a fluid criminal market while defenders are constrained by bureaucracy.
2) Within organizations, where cybersecurity strategies are not fully implemented, and where executives and operators measure success differently.
3) Individual incentives for "black hats" are clear in the criminal cyber market, which drives innovation, while defenders work within organizations with different goals and metrics for success.
The document reports on a survey that found cybersecurity is now a top priority for organizations due to losses from breaches. However, executives still see cybersecurity as
This document outlines an introduction to object oriented programming in Python. It discusses Python's support for multiple programming paradigms including procedural, object-oriented, and functional. Python allows programmers to choose the paradigm best suited to the problem. The document then covers Python classes, stating that a class is a Python object that returns a new instance when called. Classes contain attributes that can be descriptors like functions or normal data. Inheritance allows classes to delegate attribute lookup to parent classes.
PyCon 2014 발표 http://pycon.kr/2014/program/8 자료 입니다. 파이썬을 기반으로 금융데이터(주식시장 데이터)에 대한 이해와 수집/분석을 위한 구체적인 방법들 소개합니다.
- 마켓 데이터 수집과 저장
- 거래소 상장 종목 분석
- 금융 데이터의 측정과 분포
- 야후 파이낸스 활용
- 이동평균, 기술적 분석, 상관분석
- 데이터 시각화
Risks to Cloud based critical infrastructure -- DHS bulletinDavid Sweigert
Critical infrastructure organizations that use cloud services face both common and unique security risks. Cloud services are vulnerable to denial of service attacks like traditional IT systems, but also risks specific to virtual environments such as hyperjacking, where a malicious actor gains control of virtual machines. When security incidents do occur, cloud providers often do not provide many details, making response difficult. As critical infrastructure increasingly relies on cloud computing, security standards and vetting of cloud providers needs to improve to help manage risks.
Content Marketing Ideas! How to Find the Best Stories to Tell Your CustomersTopRank Marketing Agency
The document discusses content marketing strategies and frameworks. It emphasizes the importance of customer empathy and using customer insights to inform content creation. Specifically, it recommends mapping content topics to customer buying cycles and personas, focusing content on answering common customer questions. It also provides tips for generating content ideas from customer journeys, topic clusters targeting specific stages of the buying cycle, and leveraging different data sources. The overall message is that content should be highly relevant to customers by understanding their goals, pain points and situations.
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)David Sweigert
The document provides information on various topics for the CompTIA CASP exam, including:
1. Virtual Trusted Platform Modules (vTPM) which provide secure storage and cryptographic functions to virtual machines.
2. SELinux which added Mandatory Access Control to the Linux kernel to control access between subjects and objects.
3. Differences between common storage protocols like iSCSI, Fibre Channel over Ethernet, and NFS vs CIFS.
It also covers topics like dynamic disk pools vs RAID, Microsoft Group Policies, and differences between network attached storage and storage area networks.
FPV Streaming server system built by Go with ffmpeg.
Receive analog video transmitted by drone, convert it to digital video and streaming to mobile devices.
Improving monitoring systems Interoperability with OpenMetricsChan Shik Lim
Introduction Prometheus with OpenMetrics for improving monitoring system interoperability.
- Introduction Prometheus
- Introduction OpenMetrics
- Demo: Prometheus and Datadog integration with OpenMetrics
This document discusses TimescaleDB, an open-source time-series database built on PostgreSQL. It provides an overview of TimescaleDB, including that it uses hypertables to store time-series data across partitions, allows for easy SQL queries, and scales both vertically and horizontally. The document then demonstrates how to install TimescaleDB, create a hypertable from an existing PostgreSQL table to store time-series data, insert sample data, and perform queries on the data. It concludes with references for more information.
Talk about Kubernetes cluster on baremetal servers for serve internal services.
Sharing my experiences about setup and manage kubernetes cluster on premise.
At first, start with single master kubernetes cluster and enhanced by many opensource softwares.
Add more master nodes for increase server availability.
Use Rook, MetalLB, Ceph, mysql-operator and more opensource projects.
19. 다중상속
기반클래스검사순서를명확하게 하기 힘든경우에는클래스생성불가
>>> class X(object):
... pass
...
>>> class Y(X):
... pass
...
>>> class Z(X, Y):
... pass
...
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
TypeError: Cannot create a consistent method resolution
order (MRO) for bases X, Y
19
33. 프로퍼티
프로퍼티를설정하거나삭제하는메서드
>>> class Foo(object):
... def __init__(self, name):
... self.__name = name
... @property
... def name(self):
... return self.__name
... @name.setter
... def name(self, value):
... if not isinstance(value, str):
... raise TypeError("Must be a string")
... self.__name = value
... @name.deleter
... def name(self):
... raise TypeError("Can't delete name")
...
33
34. 프로퍼티
>>> f = Foo("John")
>>> f.name = "Jane"
>>> f.name = 42
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "<stdin>", line 10, in name
TypeError: Must be a string
>>> del f.name
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "<stdin>", line 14, in name
TypeError: Can't delete name
속성name은@property 장식자를이용해읽기 전용프로퍼티로정의
@name.setter 는설정을위한추가 메서드연결
@name.deleter 는삭제를위한추가 메서드연결
추가 메서드는원본프로퍼티이름과 동일
34
65. 메타클래스
메타클래스는객체를정의하는방식에제약을가하고자할때주로사용
모든메서드에문서화문자열이존재해야하는것을강제하는메타클래스예
class DocMeta(type):
def __init__(self, name, bases, attrs):
for key, value in attrs.items():
# 특수 메서드와 private 메서드는 넘어감
if key.startswith("__"):
continue
# 호출 가능하지 않은 것은 넘어감
if not hasattr(value, "__call__"):
continue
# 문서화 문자열을 가지고 있는지 검사
if not getattr(value, "__doc__"):
raise TypeError(
"%s must have a docstring" % key)
type.__init__(self, name, bases, attrs)
65
67. 메타클래스
문서화가 필요한클래스기반클래스로Documented지정
>>> class Foo(Documented):
... def spam(self, a, b):
... print("spam")
...
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "<stdin>", line 11, in __init__
TypeError: spam must have a docstring
67