Verleger: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
2609
E-book

Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes

Matthew Nohr, Isaac Rabinovitch

AppFog is the leading platform-as-a-service provider of PHP, Ruby, Node.js, and Java solutions. It is used by developers worldwide to deploy tens of thousands of applications. AppFog delivers a reliable, scalable, and fast platform for deploying applications in the cloud.This book is a hands-on guide that will walk you through creating and deploying applications to the cloud using AppFog, which will allow you to get your application deployed without the hassle of setting up servers.This book demonstrates how to use the AppFog service to build an application and have it running in the Cloud. It will walk you through the initial AppFog setup process and explain how to create your first application in minutes.You will also discover how to use services such as databases to make your applications more powerful. You will also learn how to create applications from scratch.You will find out everything you need to know to get an application running in the cloud for the first time.

2610
E-book

Getting Started with Citrix XenApp 6.5. Design and implement Citrix farms based on XenApp 6.5 with this book and

Guillermo Musumeci, Guillermo Musumeci

XenApp is the leader in application hosting and virtualization delivery, allowing users from different platforms such Windows, Mac, Linux, and mobile devices to connect to their business applications. Using XenApp, you can deploy secure applications quickly to thousands of users.XenApp 6.5 brings with it exciting new features such as a brand new management console, Instant App access, Multi-stream ICA, Single Sign-on and SmartAuditor enhancements, and more.Getting Started with Citrix XenApp 6.5 provides comprehensive details on how to design, implement, and maintain Citrix farms based on XenApp 6.5. Additionally, you will learn to use management tools and scripts for daily tasks such as managing servers, published resources, printers, and connections.Getting Started with Citrix XenApp 6.5 starts by introducing the basics and new features of the brand new version such as installing servers and configuring components, and then teaches you how to publish applications and resources on the client device before moving on to configuring content redirection. Author Guillermo Musumeci includes a use case throughout the book to explain advanced topics like creating management scripts and deploying and optimizing XenApp for Citrix XenServer, VMware ESX, and Microsoft Hyper-V virtual machines. It will guide you through an unattended installation of XenApp and components on physical servers. By the end of this book you will have enough knowledge to successfully design and manage your own XenApp 6.5 Farms.

2611
E-book

Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud

Sreekanth Iyer, Dr. Nataraj Nagaratnam

Security is a primary concern for enterprises going through digital transformation and accelerating their journey to multi-cloud environments. This book recommends a simple pattern-based approach to architecting, designing and implementing security for workloads deployed on AWS, Microsoft Azure, Google Cloud, and IBM Cloud.The book discusses enterprise modernization trends and related security opportunities and challenges. You’ll understand how to implement identity and access management for your cloud resources and applications. Later chapters discuss patterns to protect cloud infrastructure (compute, storage and network) and provide protection for data at rest, in transit and in use. You’ll also learn how to shift left and include security in the early stages of application development to adopt DevSecOps. The book also deep dives into threat monitoring, configuration and vulnerability management, and automated incident response. Finally, you’ll discover patterns to implement security posture management backed with intelligence and automated protection to stay ahead of threats.By the end of this book, you’ll have learned all the hybrid cloud security patterns and be able to use them to create zero trust architecture that provides continuous security and compliance for your cloud workloads.

2612
E-book

MongoDB Fundamentals. A hands-on guide to using MongoDB and Atlas in the real world

Amit Phaltankar, Juned Ahsan, Michael Harrison, Liviu Nedov

MongoDB is one of the most popular database technologies for handling large collections of data. This book will help MongoDB beginners develop the knowledge and skills to create databases and process data efficiently.Unlike other MongoDB books, MongoDB Fundamentals dives into cloud computing from the very start – showing you how to get started with Atlas in the first chapter. You will discover how to modify existing data, add new data into a database, and handle complex queries by creating aggregation pipelines. As you progress, you'll learn about the MongoDB replication architecture and configure a simple cluster. You will also get to grips with user authentication, as well as techniques for backing up and restoring data. Finally, you'll perform data visualization using MongoDB Charts.You will work on realistic projects that are presented as bitesize exercises and activities, allowing you to challenge yourself in an enjoyable and attainable way. Many of these mini-projects are based around a movie database case study, while the last chapter acts as a final project where you will use MongoDB to solve a real-world problem based on a bike-sharing app.By the end of this book, you'll have the skills and confidence to process large volumes of data and tackle your own projects using MongoDB.

2613
E-book

Working with Odoo 11. Configure, manage, and customize your Odoo system - Third Edition

Greg Moss

Odoo is an all-in-one management software that offers an array of business applications, forming a complete suite of enterprise management applications. Odoo 11 comes with advances on usability, speed, and design.Working with Odoo 11 starts with how to set up Odoo, both online and on your own server. You’ll then configure the basic company settings required to quickly get your first Odoo system up and running. Later, you’ll explore customer relationship management in Odoo and its importance in a modern business environment. You'll then dive into purchasing applications with Odoo, learn some of the primary functionalities of ERP systems for manufacturing operations, and use analytic accounting to provide better reporting. After that, you'll learn how to work with Odoo for mobile, and finally, you will walk through the recent Odoo 11 features with respect to the community and enterprise edition, giving you a complete understanding of what Odoo can do for your business.

2614
E-book

SAFe(R) for DevOps Practitioners. Implement robust, secure, and scaled Agile solutions with the Continuous Delivery Pipeline

Robert Wen, Harry Koehnemann

Product development and release faces overlapping challenges due to the combined pressure of delivering high-quality products in shorter time-to-market cycles, along with maintaining proper operation and ensuring security in a complex high-tech environment. This calls for new ways of overcoming these challenges from design to development, to release, and beyond. SAFe® for DevOps Practitioners helps you use a DevOps approach with the Scaled Agile Framework and details how value streams help you resolve these challenges using examples and use cases.The book begins by explaining how the CALMR approach makes DevOps effective in resolving product development roadblocks. Next, you’ll learn to apply value stream management to establish a value stream that enables product development flow, measure its effectiveness through appropriate feedback loops, and find ways of improving it. Finally, you’ll get to grips with implementing a continuous delivery pipeline that optimizes the value stream through four phases during release on demand. This book complements the latest SAFe DevOps courses, and you’ll find it useful while studying for the SAFe DevOps Practitioner (SDP) certification.By the end of this DevOps book, you’ll have gained a clear understanding of how to achieve continuous execution and release on demand using DevOps and SAFe.

2615
E-book

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Nir Yehoshua, Uriel Kosayev

Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions.The book starts by introducing you to the cybersecurity landscape, focusing on cyber threats, malware, and more. You will learn how to collect leads to research antivirus and explore the two common bypass approaches used by the authors. Once you’ve covered the essentials of antivirus research and bypassing, you'll get hands-on with bypassing antivirus software using obfuscation, encryption, packing, PowerShell, and more. Toward the end, the book covers security improvement recommendations, useful for both antivirus vendors as well as for developers to help strengthen the security and malware detection capabilities of antivirus software.By the end of this security book, you'll have a better understanding of antivirus software and be able to confidently bypass antivirus software.

2616
E-book

Observability with Grafana. Monitor, control, and visualize your Kubernetes and cloud platforms using the LGTM stack

Rob Chapman, Peter Holmes

To overcome application monitoring and observability challenges, Grafana Labs offers a modern, highly scalable, cost-effective Loki, Grafana, Tempo, and Mimir (LGTM) stack along with Prometheus for the collection, visualization, and storage of telemetry data.Beginning with an overview of observability concepts, this book teaches you how to instrument code and monitor systems in practice using standard protocols and Grafana libraries. As you progress, you’ll create a free Grafana cloud instance and deploy a demo application to a Kubernetes cluster to delve into the implementation of the LGTM stack. You’ll learn how to connect Grafana Cloud to AWS, GCP, and Azure to collect infrastructure data, build interactive dashboards, make use of service level indicators and objectives to produce great alerts, and leverage the AI & ML capabilities to keep your systems healthy. You’ll also explore real user monitoring with Faro and performance monitoring with Pyroscope and k6. Advanced concepts like architecting a Grafana installation, using automation and infrastructure as code tools for DevOps processes, troubleshooting strategies, and best practices to avoid common pitfalls will also be covered.After reading this book, you’ll be able to use the Grafana stack to deliver amazing operational results for the systems your organization uses.

2617
E-book

Programming in C#: Exam 70-483 (MCSD) Guide. Learn basic to advanced concepts of C#, including C# 8, to pass Microsoft MCSD 70-483 exam

Simaranjit Singh Bhalla, SrinivasMadhav Gorthi

Programming in C# is a certification from Microsoft that measures the ability of developers to use the power of C# in decision making and creating business logic. This book is a certification guide that equips you with the skills that you need to crack this exam and promote your problem-solving acumen with C#.The book has been designed as preparation material for the Microsoft specialization exam in C#. It contains examples spanning the main focus areas of the certification exam, such as debugging and securing applications, and managing an application's code base, among others. This book will be full of scenarios that demand decision-making skills and require a thorough knowledge of C# concepts. You will learn how to develop business logic for your application types in C#. This book is exam-oriented, considering all the patterns for Microsoft certifications and practical solutions to challenges from Microsoft-certified authors.By the time you've finished this book, you will have had sufficient practice solving real-world application development problems with C# and will be able to carry your newly-learned skills to crack the Microsoft certification exam to level up your career.

2618
E-book

The OSINT Handbook. A practical guide to gathering and analyzing online information

Dale Meredith, Greg Shields

The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities and counter the surge in online threats that this powerful toolset was built to tackle. Starting with an introduction to the concept of OSINT, this book will take you through all the applications, as well as the legal and ethical considerations associated with OSINT research. You'll conquer essential techniques for gathering and analyzing information using search engines, social media platforms, and other web-based resources. As you advance, you’ll get to grips with anonymity and techniques for secure browsing, managing digital footprints, and creating online personas. You'll also gain hands-on experience with popular OSINT tools such as Recon-ng, Maltego, Shodan, and Aircrack-ng, and leverage OSINT to mitigate cyber risks with expert strategies that enhance threat intelligence efforts. Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with both the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT.

2619
E-book

PLCs for Beginners. An introductory guide to building robust PLC programs with Structured Text

M. T. White

With the rise of smart factories and advanced technology, the demand for PLC programmers with expertise beyond ladder logic is surging. Written by M.T. White, a seasoned DevOps engineer and adjunct CIS instructor, this guide offers insights from the author’s extensive experience in PLC and HMI programming across industries. This book introduces a fresh approach to PLC programming, preparing you for future automation challenges through computer science and text-based programming.Starting with the basic components of PLCs and their integration with other modules, this book gives you a clear understanding of system functionality and helps you master PLC program execution by learning about flow and essential components for effective programming. You'll understand program design with pseudocode and flowcharts, vital for planning programs, and cover Boolean logic intricacies, harnessing logical functions and truth tables for precise control statements. The book gives you a comprehensive grasp of Structured Text, its syntax and features crucial for efficient programming. The book also focuses on advanced topics like cybersecurity in PLC systems and leveraging generative AI (GenAI), such as ChatGPT, to enhance productivity.By the end of this book, you’ll be able to design real-world projects using pseudocode and flowcharts, and implement those designs in Structured Text.

2620
E-book

C# 8 and .NET Core 3 Projects Using Azure. Build professional desktop, mobile, and web applications that meet modern software requirements - Second Edition

Paul Michaels, Dirk Strauss, Jas Rademeyer

.NET Core is a general-purpose, modular, cross-platform, and opensource implementation of .NET. The latest release of .NET Core 3 comes with improved performance and security features, along with support for desktop applications. .NET Core 3 is not only useful for new developers looking to start learning the framework, but also for legacy developers interested in migrating their apps. Updated with the latest features and enhancements, this updated second edition is a step-by-step, project-based guide.The book starts with a brief introduction to the key features of C# 8 and .NET Core 3.You'll learn to work with relational data using Entity Framework Core 3, before understanding how to use ASP.NET Core. As you progress, you’ll discover how you can use .NET Core to create cross-platform applications. Later, the book will show you how to upgrade your old WinForms apps to .NET Core 3. The concluding chapters will then help you use SignalR effectively to add real-time functionality to your applications, before demonstrating how to implement MongoDB in your apps. Finally, you'll delve into serverless computing and how to build microservices using Docker and Kubernetes.By the end of this book, you'll be proficient in developing applications using .NET Core 3.

2621
E-book

Et al. Because not all research deserves a Nobel Prize

B McGraw

Tired of the same old math, science, statistics, and programming memes people post online and want something a little more elaborate? This is the book for you.Tremble as we make up all our own facts and data, hand-draw diagrams in MS Paint, and quote from fictional studies and journals. Cower as authors write in the first person because their study is just a little too personal for them. Recoil from the sheer mass of oversimplified methodology, distilling someone's entire thesis into a paragraph of jokes crude enough to make it into a Mike Myers movie.Over the last few years, we have taken arguments that you would normally have after four Jack and cokes at game night and turned them into properly formatted research papers with a writing tone serious enough to confuse the uninitiated. These papers are high-effort jokes by researchers and scientists for researchers and scientists. They cover a range of topics such as the consequences of re-releasing tourists back into Yellowstone National Park after COVID-19, how to play StarCraft competitively online on a quantum computer, and most importantly, how trees around the globe are becoming increasingly radicalized.

2622
E-book

Amazon S3 Essentials. Get started with Amazon S3 for virtually unlimited cloud and Internet storage

Sunil Gulabani

Amazon Simple Storage Service (Amazon S3), provides developers and IT teams with secure, durable, and highly-scalable object storage. Amazon S3 is easy to use, with a simple web services interface to store and retrieve any amount of data from anywhere on the web.S3 is automatically web scalable and responds to the requirements of your application and traffic, and therefore offers a key element to help companies deal dynamically with any spike in traffic for their application (such as a free e-book offer).This book starts with the basics of the Amazon S3 and its features, and you will quickly get an understanding how to use the Amazon Management Console for Amazon S3 which is the simplest way to manage Amazon S3. Next, we will cover basic operations on bucket, folder, objects. Once the basic operations are understood, you will know how to use Amazon S3 using Java SDK. Following that, you will learn about Copy Objects and Multipart copy objects for large objects size. You will also learn to manage the life cycle of bucket and how to share resources to the different domain by configuring CORS. The book will then guide you through the development and deployment of a static website on Amazon S3 using different services of Amazon.By the end of the book, you will be able to create a scalable application using Amazon S3.

2623
E-book

PrestaShop 1.3 Theming - Beginner's Guide. Develop flexible, powerful, and professional themes for your PrestaShop store through simple steps

Hayati Hashim

Themes in PrestaShop are unique and powerful tools to brand your store for a particular corporate image. Using custom themes you can control the look and functionality of your web store, thereby making your site extremely flexible. Although it might sound like an easy task to build a theme, it is quite challenging to create a custom theme that fits your business needs.This book's prime focus is guiding the readers without much technical know-how, thus enabling them to create a new theme that fulfills the needs of their PrestaShop store. By understanding practical ways to develop your theme for PrestaShop speedily, you can invest more time on developing attractive and unique raw materials. It will simplify the challenging task of creating a unique, new PrestaShop theme through easy-to-follow, practical steps.This book shows how to develop professional themes for your PrestaShop store using some simple steps. The book starts by exploring the various ways of changing the looks (including modules) of your PrestaShop store. It shows you how certain back office administration adjustments can affect the appearance and theme of your store. It then takes you through understanding the code modification of a default theme that results in a new look for your existing theme. The book also covers understanding the PrestaShop architecture and essential syntaxes that control the look of a PrestaShop store. You will also learn about the files that hold the key to themes.By the end of this book, you will have grasped the knowledge to make advanced changes by tweaking the right CSS and module files in order to achieve highly specific outcomes.

2624
E-book

Instant Citrix Security How-to. A guide to bulletproofing your enterprise environment with the excellent security features in Citrix

Carmel Jacob

With the rise of cloud computing and virtualization comes a whole new threat to business security.  When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.Instant Citrix Security How-to will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be the difference between secure data and stolen data.Starting with how to deploy a Citrix Netscaler on DMZ this book presents you with options, their uses, and features that can be enabled. In order to ensure each recipe gives you the most benefit, case studies are included to show you real life implications of your decisions.This book will guide you through the world of load balancing using both content switching and redirection. We will also discuss load balancing based on geographical location and disaster recovery methods.The number of features within each module to reduce server load and CPU is astounding and will make your life, the end user, a walk in the park.