Publisher: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
2625
Ebook

MooTools 1.2 Beginner's Guide. Learn how to create dynamic, interactive, and responsive cross-browser web applications using this popular JavaScript framework

Ian Haycox, Garrick Cheung, Jacob Gube

MooTools is a simple-to-use JavaScript library, ideal for people with basic JavaScript skills who want to elevate their web applications to a superior level. If you're a newcomer to MooTools looking to build dynamic, rich, and user-interactive web site applications this beginner's guide with its easy-to-follow step-by-step instructions is all you need to rapidly get to grips with MooTools.

2626
Ebook

Domino 7 Application Development. Writing and upgrading applications for the latest IBM Lotus Notes Domino Platform

Timothy Speed, Tim Speed, Stephen Cooke, Raphael Savir, ...

Written by Lotus insiders, the book provides a practical guide to developing applications making use of the important features and enhancements introduced in Notes/Domino 7. These experienced experts use their own experiences to map out the benefits you could gain, and the dangers you may face, as you develop Domino applications in your business. Written by specific experts, edited and overseen by Lotus content generator Dick McCarrick, this book is the definitive guide to developing Domino 7 applications. TECHNOLOGYDomino is an application server that can be used as a standalone web server or as the server component of IBM's Lotus Domino product which provides a powerful collaborative platform for development of customized business applications. It also provides enterprise-grade email, messaging, and scheduling capabilities.

2627
Ebook
2628
Ebook

Advanced Machine Learning with Python. Solve challenging data science problems by mastering cutting-edge machine learning techniques in Python

Victor Marak, Nishant Shukla, John Hearty, Jeffery Yee, ...

Designed to take you on a guided tour of the most relevant and powerful machine learning techniques in use today by top data scientists, this book is just what you need to push your Python algorithms to maximum potential. Clear examples and detailed code samples demonstrate deep learning techniques, semi-supervised learning, and more - all whilst working with real-world applications that include image, music, text, and financial data. The machine learning techniques covered in this book are at the forefront of commercial practice. They are applicable now for the first time in contexts such as image recognition, NLP and web search, computational creativity, and commercial/financial data modeling. Deep Learning algorithms and ensembles of models are in use by data scientists at top tech and digital companies, but the skills needed to apply them successfully, while in high demand, are still scarce. This book is designed to take the reader on a guided tour of the most relevant and powerful machine learning techniques. Clear descriptions of how techniques work and detailed code examples demonstrate deep learning techniques, semi-supervised learning and more, in real world applications. We will also learn about NumPy and Theano.By this end of this book, you will learn a set of advanced Machine Learning techniques and acquire a broad set of powerful skills in the area of feature selection & feature engineering.

2629
Ebook

PyTorch Deep Learning Hands-On. Build CNNs, RNNs, GANs, reinforcement learning, and more, quickly and easily

Sherin Thomas, Sudhanshu Passi

PyTorch Deep Learning Hands-On is a book for engineers who want a fast-paced guide to doing deep learning work with PyTorch. It is not an academic textbook and does not try to teach deep learning principles. The book will help you most if you want to get your hands dirty and put PyTorch to work quickly.PyTorch Deep Learning Hands-On shows how to implement the major deep learning architectures in PyTorch. It covers neural networks, computer vision, CNNs, natural language processing (RNN), GANs, and reinforcement learning. You will also build deep learning workflows with the PyTorch framework, migrate models built in Python to highly efficient TorchScript, and deploy to production using the most sophisticated available tools.Each chapter focuses on a different area of deep learning. Chapters start with a refresher on how the model works, before sharing the code you need to implement it in PyTorch.This book is ideal if you want to rapidly add PyTorch to your deep learning toolset.

2630
Ebook

Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics

Yuri Diogenes, Dr. Erdal Ozkaya

The book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system.In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.

2631
Ebook

Learn Docker ,Äi Fundamentals of Docker 19.x. Build, test, ship, and run containers with Docker and Kubernetes - Second Edition

Gabriel N. Schenker

Containers enable you to package an application with all the components it needs, such as libraries and other dependencies, and ship it as one package. Docker containers have revolutionized the software supply chain in both small and large enterprises.Starting with an introduction to Docker fundamentals and setting up an environment to work with it, you’ll delve into concepts such as Docker containers, Docker images, and Docker Compose. As you progress, the book will help you explore deployment, orchestration, networking, and security. Finally, you’ll get to grips with Docker functionalities on public clouds such as Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP), and learn about Docker Enterprise Edition features. Additionally, you’ll also discover the benefits of increased security with the use of containers.By the end of this Docker book, you’ll be able to build, ship, and run a containerized, highly distributed application on Docker Swarm or Kubernetes, running on-premises or in the cloud.

2632
Ebook

MariaDB Essentials. Quickly get up to speed with MariaDB—the leading, drop-in replacement for MySQL, through this practical tutorial

Federico Razzoli, Emilien Kenler

This book will take you through all the nitty-gritty parts of MariaDB, right from the creation of your database all the way to using MariaDB’s advanced features. At the very beginning, we show you the basics, that is, how to install MariaDB. Then, we walk you through the databases and tables of MariaDB, and introduce SQL in MariaDB. You will learn about all the features that have been added in MariaDB but are absent in MySQL.Moving on, you’ll learn to import and export data, views, virtual columns, and dynamic columns in MariaDB. Then, you’ll get to grips with full-text searches and queries in MariaDb. You’ll also be familiarized with the CONNECT storage engine. At the end of the book, you’ll be introduced to the community of MariaDB.

2633
Ebook

Mastering Docker. Enhance your containerization and DevOps skills to deliver production-ready applications - Fourth Edition

Russ McKendrick

Docker has been a game changer when it comes to how modern applications are deployed and created. It has now grown into a key driver of innovation beyond system administration, with a significant impact on the world of web development. Mastering Docker shows you how you can ensure that you're keeping up with the innovations it's driving and be sure you're using it to its full potential. This fourth edition not only demonstrates how to use Docker more effectively but also helps you rethink and reimagine what you can achieve with it.You'll start by building, managing, and storing images along with exploring best practices for working with Docker confidently. Once you've got to grips with Docker security, the book covers essential concepts for extending and integrating Docker in new and innovative ways. You'll also learn how to take control of your containers efficiently using Docker Compose, Docker Swarm, and Kubernetes.By the end of this Docker book, you’ll have a broad yet detailed sense of what's possible with Docker and how seamlessly it fits in with a range of other platforms and tools.

2634
Ebook
2635
Ebook

Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

The Microsoft 365 Security Administration (MS-500) exam is designed to measure your ability to perform technical tasks such as managing, implementing, and monitoring security and compliance solutions for Microsoft 365 environments.This book starts by showing you how to configure and administer identity and access within Microsoft 365. You will learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, the book shows you how RBAC and Azure AD Identity Protection can be used to help you detect risks and secure information in your organization. You will also explore concepts, such as Advanced Threat Protection, Windows Defender ATP, and Threat Intelligence. As you progress, you will learn about additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention, and Cloud App Discovery and Security. The book also ensures you are well prepared to take the exam by giving you the opportunity to work through a mock paper, topic summaries, illustrations that briefly review key points, and real-world scenarios.By the end of this Microsoft 365 book, you will be able to apply your skills in the real world, while also being well prepared to achieve Microsoft certification.

2636
Ebook

Agile Web Application Development with Yii1.1 and PHP5. For PHP developers who know object-oriented programming, this book is the fast track to learning the Yii framework. It takes a step-by-step approach to building a complete real-world application – teaching by practice rather than theory

Jeffrey Winesett, Qiang Xue (Project)

This book is a step by step tutorial in developing a real-world application using the incremental and iterative approach to software development. You learn about agile software development by leaning on the agile nature of the Yii application development framework. You touch on each aspect of the software development lifecycle by building a project task management application from concept through production deployment.After a brief, general introduction to the Yii framework and outlining the software development approach taken throughout the book, the chapters break down in the same way as software development iterations do in real-world projects. After the 1st iteration, you will have a working and tested application with a valid, tested connection to a database.In the 2nd and 3rd iterations, we flesh out our main database entities and domain object model and become familiar with Yii's object-relational-mapping (ORM) layer, Active Record. We also learn how to lean on Yii's auto-generation tools to automatically build our create/read/update/delete (CRUD) functionality against our newly created model. These iterations also focus on how Yii's form validation and submission model works. By the end of the third iteration you will have a working application that allows you to mange projects and issues (tasks) within those projects.The 4th and 5th iterations are dedicated to user management. We learn about the built-in authentication model within Yii to assist in application login and logout functionality. We then dive into the authorization model, first taking advantage of a Yii's simple access control model, then implementing the more sophisticated role-based access control (RBAC) framework that Yii provides.By the end of the 5th iteration, all of the basics of a task management application are in place. The next several iterations are focused on the nice-to-haves. We add user comment functionality, introducing a reusable content portlet architecture approach in the process. We add in an RSS Web feed and demonstrate how easy it is to integrate other third-party tools within a Yii application. We take advantage of Yii's theming structure to help streamline and design the application, and then introduce Yii's internationalization (I18N) features so the application can be adapted to various languages and regions without engineering changes.Finally, we turn our focus to production deployment. We introduce ways to optimize performance and security to prepare the application for a real-world production environment.

2637
Ebook

Delphi Cookbook. Over 60 hands-on recipes to help you master the power of Delphi for cross-platform and mobile development on multiple platforms - Second Edition

Daniele Teti

Delphi is a cross-platform Integrated Development Environment (IDE) that supports rapid application development for Microsoft Windows, Apple Mac OS X, Google Android, and Apple iOS. It helps you to concentrate on the real business and save yourself the pain of wandering amid GUI widget details, or having to tackle inter-platform incompatibilities. It also has a wide range of drag-and-drop controls, helping you code your business logic into your business model, and it compiles natively for desktop and mobile platforms.This book will teach you how to design and develop applications, deploy them on the cloud platform, and distribute them within an organization via Google Play and other similar platforms.You will begin with the basics of Delphi and get acquainted with JSON format strings, XSLT transformations, unicode encodings and various types of streams. We then move on to more advanced topics such as developing higher-order functions and using enumerators and RTTI. You will get an understanding of how Delphi RTL functions and how to use FireMonkey in a VCL application. We will then cover topics such as multithreading, using the parallel programming library and putting Delphi on a server. We will also take a look at the new feature of WebBroker Apache modules and then ride the mobile revolution with FireMonkey. By the end of the book, you will be able to develop and deploy cross-platform applications using Delphi .

2638
Ebook

PrestaShop 1.3 Beginner's Guide. Build and customize your online store with this speedy, lightweight e-commerce solution

John Horton, Igor Schlumberger

PrestaShop is a hidden gem. There are many much more widely known online shopping cart solutions that have nothing like the features, potential, and ease of use that this open source, completely free-to-use, system has. But until now there has been no information available on how to make the most of it. This book takes a step-by-step approach to help you set up your own e-commerce store and maximize its potential. Even if you are totally new to e-commerce and PrestaShop, you can have your own functioning e-commerce store quickly and with tiny expenditure. Imagine the feeling when you get that glorious e-mail saying that you have your first paying customer.This practical guide follows the order of developing an active business. Packed with easy-to-follow steps with loads of screenshots and clear explanations, it follows a step-by-step approach to set up a PrestaShop e-commerce store from the very beginning through finding a web host, setting up your PrestaShop store, accepting money from customers, and planning for the future of your business.The first few chapters are a lightening, but thorough, illustration of how to get your shop online, stocked up, and looking smart and unique, including some really cool and really simple product features to show off your wares in style – very quickly. The later chapters are quite diverse and cover some exciting stuff such as newsletters, loyalty schemes, alternative revenue streams, statistics and analytics. You will also learn about security, disaster recovery, payment handling, currencies, taxes, shipping, and more. Towards the end, the chapters cover final preparations before going live, handling orders in PrestaShop, and how to promote your store and get more customers. Once the money starts to flow, the book looks at the future of e-commerce and your PrestaShop business. Then it discusses how to get to the top of your niche and stay there. And then the big secret: to use the knowledge you have gained to turn a single PrestaShop into a thriving e-commerce empire.The Appendix covers a number of worthwhile topics such as a handy PrestaShop control panel reference and various web resources for PrestaShop.

2639
Ebook

Instant EdgeSight for XenApp. Effective, practical instructions to monitor your Citrix XenApp servers using EdgeSight 5.4

Vaqar Hasan

EdgeSight 5.4 is the most comprehensive performance management and reporting solution for the Citrix XenApp infrastructure. Administrators have real-time visibility of session-level performance and visibility of key metrics such as profile load time, login script execution, and so on. It also contains several tools to monitor the XenApp servers and can alert the administrator when the specified alert conditions are met.This book will help you to become proficient in monitoring and generating reports for your Citrix XenApp servers. You will start by setting up the environment for EdgeSight. The book will then go on to discuss the installation, configuration, and troubleshooting of the EdgeSight server.Instant EdgeSight for XenApp contains clear and step-by-step exercises which will help you learn how to use EdgeSight quickly and painlessly. You will install EdgeSight and its agents and learn how to configure server settings, user groups and authentication, and alerts. You will also learn how to manage the real-time dashboard and reports, monitor Citrix license usage and reports, and troubleshoot common issues.This book starts with the basics of introducing the EdgeSight component into your infrastructure before moving on to more advanced topics such as troubleshooting. Readers will learn how to use the EdgeSight tools for day-to-day administration tasks as well as how to efficiently monitor the XenApp servers to achieve best performance for their end users.

2640
Ebook

iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics

Bhanu Birani, Mayank Birani

Mobile device forensics is a branch of digital forensics that involves the recovery of evidence or data in a digital format from a device without affecting its integrity. With the growing popularity of iOS-based Apple devices, iOS forensics has developed immense importance. To cater to the need, this book deals with tasks such as the encryption and decryption of files, various ways to integrate techniques withsocial media, and ways to grab the user events and actions on the iOS app. Using practical examples, we’ll start with the analysis keychain and raw disk decryption, social media integration, and getting accustomed to analytics tools. You’ll also learn how to distribute the iOS apps without releasing them to Apple’s App Store. Moving on, the book covers test flights and hockey app integration, the crash reporting system, recovery tools, and their features. By the end of the book, using the aforementioned techniques, you will be able to successfully analyze iOS-based devices forensically.