Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
3569
Ebook

Instant Moodle Quiz Module How-to. Create Moodle quizzes to enhance learning using practical, hands-on recipes

Joan Coy, Moodle Trust

Enhancing learning experience and improving student success has many instructors searching for effective tools. Moodle Quiz is just such a tool to aid instructors in creating powerful assessment experiences for their learners. Instant Moodle Quiz Module How-to is a practical, hands-on guide that provides you with a number of clear step-by-step procedures, which will help you take advantage of the real power that is behind Moodle Quiz, and give you a good grounding in using it to achieve effective assessment in your courses.This book covers how Moodle Quiz module can be used to create effective assessment FOR and OF learning in your courses. It will take you through a number of clear, practical recipes that will help you harness the power of Moodle Quiz quickly and painlessly.You will begin by learning to set up clear categories, carefully designed questions and helpful feedback to create the question bank that is the foundation of Moodle Quiz. Once you have configured the quiz and specified your security requirements, you can select questions by hand or randomly. Once learners have completed the quiz you can interact one-on-one or examine statistical data for large groups using the easily generated reports.Using Instant Moodle Quiz Module How-to you will learn how to create effective quizzes and how to provide meaningful feedback and evaluate results.

3570
Ebook

Monitoring Elasticsearch

Dan Noble, Pulkit Agrawal, Mahmoud Lababidi

ElasticSearch is a distributed search server similar to Apache Solr with a focus on large datasets, a schema-less setup, and high availability. This schema-free architecture allows ElasticSearch to index and search unstructured content, making it perfectly suited for both small projects and large big data warehouses with petabytes of unstructured data.This book is your toolkit to teach you how to keep your cluster in good health, and show you how to diagnose and treat unexpected issues along the way. You will start by getting introduced to ElasticSearch, and look at some common performance issues that pop up when using the system. You will then see how to install and configure ElasticSearch and the ElasticSearch monitoring plugins. Then, you will proceed to install and use the Marvel dashboard to monitor ElasticSearch. You will find out how to troubleshoot some of the common performance and reliability issues that come up when using ElasticSearch. Finally, you will analyze your cluster’s historical performance, and get to know how to get to the bottom of and recover from system failures.This book will guide you through several monitoring tools, and utilizes real-world cases and dilemmas faced when using ElasticSearch, showing you how to solve them simply, quickly, and cleanly.

3571
Ebook

Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook. Over 130 simple but incredibly effective recipes for configuring, supporting, and enhancing EnterpriseOne SCM with this book and

Kashif Rasheed

Oracle's JD Edwards Enterprise One Supply Chain Management (SCM) aids your business in enhancing your interactions with enterprise suppliers, and this practical cookbook provides essential implementation sequences to make the most of the suite. The functionality across the application described in this comprehensive guide allows you to be proactive in reacting to real-time information and developing procurement strategies and best practices.Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook explains with step by step instructions how to fully implement the EnterpriseOne Supply Chain suite, set up Inventory Management, Procurement Management and Sales Order Management, and much more. Each chapter will provide you the details of setup-related information, and instructions which will direct you in configuring your company's business processes.This business-ready cookbook provides you with all the instructions you need to set up the SCM application, and utilize it based on your company's individual business requirements. It begins by demonstrating how to review inventory quantity information and perform physical inventory through cycle count and tag count, and later moves onto how to configure the interactive application, and how to set up the batch versions.Along the way it will also cover the item master information, classification, AAI setup, and system integration. Ultimately, Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook will equip you with the knowledge to configure and take advantage of the entire SCM system.

3572
Ebook

Getting Started with SketchUp Pro. Embark on your 3D modeling adventure with expert tips, tricks, and best practices

David S. Sellers

Owing to its ability to create models quickly and with high level of dimensional accuracy, SketchUp Pro has become a popular choice for many industries, including architecture, interior design, landscape architecture, and video game design. If you are seeking to adopt Trimble's exceptional design software, Getting Started with SketchUp Pro serves as an ideal primer to prepare and equip you for its use.This book will help you lay the foundation of a project from scratch, set up appropriate units, and follow a guided path to structure your 3D models. You’ll explore the workflows used for creating designs from sketches, making CAD drawings (DWG), and even updating your existing 3D models. Finally, you’ll work with extensions and 3D Warehouse to find new workflows and models to add to your skill set.By the end of this SketchUp book, you’ll be able to confidently create and share models of your design through CAD drawings and 3D views, and even take them online through the 3D Warehouse

3573
Ebook

Instant MinGW Starter. Develop, debug and profile your C++ applications using the MinGW open source software

Ilya Shpigor

If you need stable, dynamically developed, and easy-to-configure instrumentation for application development, look no further than MinGW. It supplies all the dynamic tools you need to enable you to develop Microsoft Windows applications, while allowing for easy integration with the software that you already use. This book will give you the expert guidance you will need to start developing applications with Instant MinGW. As well as help you to become an experienced user of MinGW, the book will also detail some of the more common pitfalls that beginners face when first using the software, and more importantly, how to avoid them yourself. This book will help  you through the installation process, and help introduce you to compilation, debugging, and profiling with MinGW. It will guide you in importing existing projects developed with Visual C++ Integrated Development Environment to MinGW, and show you how to start using it to develop your current projects with minimal effort.This book will also introduce you to developing applications with several well-known, open source, GUI libraries and the MinGW software.With Instant MinGW Starter, you will gain a reliable, comprehensive, and supremely beneficial introduction to the MinGW software, and quickly learn how to use it for new, and old, projects. 

3574
Ebook

Microsoft System Center Configuration Manager. Deploy a scalable solution by ensuring high availability and disaster recovery using Configuration Manager with this book and

Marius Sandbu

Microsoft Configuration Manager is both extensive and complex, and for many, it is the primary tool for Enterprise management. With each new release, Configuration Manager continually proves itself to be the ultimate solution for managing both clients and mobile devices.This book covers in detailed and easy-to-understand steps how to set up highly available Configuration Manager roles and backend services such as SQL, DNS, and AD. You will learn how to plan for high availability, what kind of roles there are, and how they scale.The book starts by examining what needs to be taken into account when planning for high availability before moving on to focus on the different roles and how they can be set up. The book will also go through different scenarios as well as various backup and recovery procedures. You will learn how to identify bottlenecks within the different components and create sample design scenarios for high availability on Configuration Manager. The book will also look at the different high availability options and how to deploy them.

3575
Ebook

Modernizing Oracle Tuxedo Applications with Python. A practical guide to using Oracle Tuxedo in the 21st century

Aivars Kalvans

Despite being developed in the 1980s, Oracle Tuxedo still runs a significant part of critical infrastructure and is not going away any time soon. Modernizing Oracle Tuxedo Applications with Python will help you get to grips with the most important Tuxedo concepts by writing Python code.The book starts with an introduction to Oracle Tuxedo and guides you in installing its latest version and Python bindings for Tuxedo on Linux. You'll then learn how to build your first server and client, configure Tuxedo, and start running an application. As you advance, you'll understand load balancing and work with the BBL server, which is at the heart of a Tuxedo application. This Tuxedo book will also cover Boolean expressions and different ways to export Tuxedo buffers for storage and transmission, before showing you how to implement servers and clients and use the management information base to change the configuration dynamically. Once you've learned how to configure Tuxedo for transactions and control them in application code, you'll discover how to use the store-and-forward functionality to reach destinations and use an Oracle database from a Tuxedo application.By the end of this Oracle Tuxedo book, you'll be able to perform common Tuxedo programming tasks with Python and integrate Tuxedo applications with other parts of modern infrastructure.

3576
Ebook

Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory

Svetlana Ostrovskaya, Oleg Skulkin

Memory Forensics is a powerful analysis technique that can be used in different areas, from incident response to malware analysis. With memory forensics, you can not only gain key insights into the user's context but also look for unique traces of malware, in some cases, to piece together the puzzle of a sophisticated targeted attack.Starting with an introduction to memory forensics, this book will gradually take you through more modern concepts of hunting and investigating advanced malware using free tools and memory analysis frameworks. This book takes a practical approach and uses memory images from real incidents to help you gain a better understanding of the subject and develop the skills required to investigate and respond to malware-related incidents and complex targeted attacks. You'll cover Windows, Linux, and macOS internals and explore techniques and tools to detect, investigate, and hunt threats using memory forensics. Equipped with this knowledge, you'll be able to create and analyze memory dumps on your own, examine user activity, detect traces of fileless and memory-based malware, and reconstruct the actions taken by threat actors.By the end of this book, you'll be well-versed in memory forensics and have gained hands-on experience of using various tools associated with it.

3577
Ebook

Offensive Security Using Python. A hands-on guide to offensive tactics and threat mitigation using practical strategies

Rejah Rehim, Manindar Mohan, Grant Ongers

Offensive Security Using Python is your go-to manual for mastering the quick-paced field of offensive security. This book is packed with valuable insights, real-world examples, and hands-on activities to help you leverage Python to navigate the complicated world of web security, exploit vulnerabilities, and automate challenging security tasks.From detecting vulnerabilities to exploiting them with cutting-edge Python techniques, you’ll gain practical insights into web security, along with guidance on how to use automation to improve the accuracy and effectiveness of your security activities. You’ll also learn how to design personalized security automation tools. While offensive security is a great way to stay ahead of emerging threats, defensive security plays an equal role in protecting organizations from cyberattacks. In this book, you’ll get to grips with Python secure coding techniques to improve your ability to recognize dangers quickly and take appropriate action. As you progress, you’ll be well on your way to handling the contemporary challenges in the field of cybersecurity using Python, as well as protecting your digital environment from growing attacks.By the end of this book, you’ll have a solid understanding of sophisticated offensive security methods and be able to stay ahead in the constantly evolving cybersecurity space.

3578
Ebook
3579
Ebook
3580
Ebook

Instant jQuery 2.0 Table Manipulation How-to. Enhance and add functionality with interactivity to your HTML tables with jQuery

Charlie Griefer

When jQuery was introduced, it took the JavaScript world by storm. Years later, it shows no sign of slowing down. Its powerful yet concise syntax helps to simplify tasks that might otherwise be difficult or complex. Whether you're a JavaScript novice or an expert, jQuery is a valuable addition to your toolbox.Instant jQuery 2.0 Table Manipulation How-to shows you how to quickly and easily add style and functionality to your HTML tables. You'll be amazed to see how easy it is. Just don't let your customers know!HTML tables can be boring. Sure, we can make them more stylish with CSS, but users want interactivity. They want to be able to sort columns, see totals, filter data, and page through information in easily digestible chunks.Starting off with a plain HTML table, and an ID and a few class attributes, you will see the transformations occur with just a few lines of jQuery. Instant jQuery 2.0 Table Manipulation How-to progresses to showing you how to highlight specific table cells and filter table data, and even sort columns or page through data.Regardless of your skill level with JavaScript or jQuery, this book will walk you through the deceptively simple steps needed to add functionality and interactivity to your HTML tables.

3581
Ebook

Cacti 0.8 Network Monitoring. Monitor your network with ease!

S. M. Ibrahim Lavlu, Dinangkur Kundu, Cacti Project Paypal donate@cacti.net, S M Ibrahim Lavlu

Cacti is a network monitoring tool that provides graphic solutions to your everyday monitoring issues. It has a wide variety of features and misusing them can mean that you are not monitoring your network as closely as you think. This book takes you through all of the key features of Cacti and shows how to use them for maximum effectiveness.This book will teach you how to use Cacti effectively to monitor your network through its web interface leaving aside all the heavy chunks of code. You will be introduced to all the features of Cacti in an easy-to-understand format. This book introduces Cacti and goes through its complete installation and setup. After a quick look, it will teach you to use Cacti's amazing graph templating and user management features. You will learn to customize graphs and make them better looking and easier to understand. It will teach you to provide the paths to any external script or command using Cacti. Then it will take you through importing and managing new templates and also customizing them. Creating users and assigning permissions to them is the next step in this book. Towards the end, you will learn to take backups and restore the system.

3582
Ebook

Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration

Vladimir Yakovlev, Dameon D. Welch

Check Point firewalls are the premiere firewalls, access control, and threat prevention appliances for physical and virtual infrastructures. With Check Point’s superior security, administrators can help maintain confidentiality, integrity, and the availability of their resources protected by firewalls and threat prevention devices. This hands-on guide covers everything you need to be fluent in using Check Point firewalls for your operations.This book familiarizes you with Check Point firewalls and their most common implementation scenarios, showing you how to deploy them from scratch. You will begin by following the deployment and configuration of Check Point products and advance to their administration for an organization. Once you’ve learned how to plan, prepare, and implement Check Point infrastructure components and grasped the fundamental principles of their operation, you’ll be guided through the creation and modification of access control policies of increasing complexity, as well as the inclusion of additional features. To run your routine operations infallibly, you’ll also learn how to monitor security logs and dashboards. Generating reports detailing current or historical traffic patterns and security incidents is also covered.By the end of this book, you'll have gained the knowledge necessary to implement and comfortably operate Check Point firewalls.

3583
Ebook
3584
Ebook