Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
3649
Ebook

IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing

Lewis Heuermann

As cyber threats evolve and regulations tighten, IT professionals struggle to maintain effective auditing practices and ensure robust cybersecurity across complex systems. Drawing from over a decade of submarine military service and extensive cybersecurity experience, Lewis offers a unique blend of technical expertise and field-tested insights in this comprehensive field manual.Serving as a roadmap for beginners as well as experienced professionals, this manual guides you from foundational concepts and audit planning to in-depth explorations of auditing various IT systems and networks, including Cisco devices, next-generation firewalls, cloud environments, endpoint security, and Linux systems. You’ll develop practical skills in assessing security configurations, conducting risk assessments, and ensuring compliance with privacy regulations. This book also covers data protection, reporting, remediation, advanced auditing techniques, and emerging trends.Complete with insightful guidance on building a successful career in IT auditing, by the end of this book, you’ll be equipped with the tools to navigate the complex landscape of cybersecurity and compliance, bridging the gap between technical expertise and practical application.

3650
Ebook

Enterprise GENERATIVE AI Well-Architected Framework & Patterns. An Architect's Real-life Guide to Adopting Generative AI in Enterprises at Scale

Suvoraj Biswas

The course begins with an insightful introduction to the burgeoning field of Generative AI, laying down a robust framework for understanding its applications within the AWS ecosystem.The course focuses on meticulously detailing the five pillars of the AWS Well-Architected Framework—Operational Excellence, Security, Compliance, Reliability, and Cost Optimization. Each module is crafted to provide you with a comprehensive understanding of these essential areas, integrating Generative AI technologies. You'll learn how to navigate the complexities of securing AI systems, ensuring they comply with legal and regulatory standards, and designing them for unparalleled reliability. Practical sessions on cost optimization strategies for AI projects will empower you to deliver value without compromising on performance or scalability. Furthermore, the course delves into System Architecture Excellence, emphasizing the importance of robust design principles in creating effective Generative AI solutions.The course wraps up by offering a forward-looking perspective on the Common Architectural Pattern for FM/LLM Integration & Adoption within the AWS framework. You'll gain hands-on experience with AWS solutions specifically tailored for Generative AI applications, including Lambda, API Gateway, and DynamoDB, among others.

3651
Ebook

Full Stack Development with Spring Boot 3 and React. Build modern web applications using the power of Java, React, and TypeScript - Fourth Edition

Juha Hinkula

If you’re an existing Java developer who wants to go full stack or pick up another frontend framework, this book is your concise introduction to React. In this three-part build-along, you’ll create a robust Spring Boot backend, a React frontend, and then deploy them together.This new edition is updated to Spring Boot 3 and includes expanded content on security and testing. For the first time ever, it also covers React development with the in-demand TypeScript.You’ll explore the elements that go into creating a REST API and testing, securing, and deploying your applications. You’ll learn about custom Hooks, third-party components, and MUI.By the end of this book, you'll be able to build a full stack application using the latest tools and modern best practices.

3652
Ebook

PostgreSQL 16 Administration Cookbook. Solve real-world Database Administration challenges with 180+ practical recipes and best practices

Gianni Ciolli, Boriss Mejías, Jimmy Angelakos, Vibhor Kumar, ...

PostgreSQL has seen a huge increase in its customer base in the past few years and is becoming one of the go-to solutions for anyone who has a database-specific challenge. This PostgreSQL book touches on all the fundamentals of Database Administration in a problem-solution format. It is intended to be the perfect desk reference guide.This new edition focuses on recipes based on the new PostgreSQL 16 release. The additions include handling complex batch loading scenarios with the SQL MERGE statement, security improvements, running Postgres on Kubernetes or with TPA and Ansible, and more. This edition also focuses on certain performance gains, such as query optimization, and the acceleration of specific operations, such as sort. It will help you understand roles, ensuring high availability, concurrency, and replication. It also draws your attention to aspects like validating backups, recovery, monitoring, and scaling aspects. This book will act as a one-stop solution to all your real-world database administration challenges.By the end of this book, you will be able to manage, monitor, and replicate your PostgreSQL 16 database for efficient administration and maintenance with the best practices from experts.

3653
Ebook

Cryptography Algorithms. Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography - Second Edition

Massimo Bertaccini

As cyber threats evolve, so must our cryptographic defenses. This updated edition of Cryptographic Algorithms delves into the latest advancements in encryption, cybersecurity, and data protection, ensuring you stay ahead in this rapidly changing field. Whether you're an aspiring or seasoned cybersecurity professional, this book equips you with the expertise to confidently tackle modern security challenges.Written by Dr. Massimo Bertaccini—a cryptography researcher, inventor, and cybersecurity expert—this book goes beyond theory, offering real-world applications backed by his inventions and patents. His expertise in zero-knowledge proofs, homomorphic encryption, and blockchain security makes this an essential resource for mastering cryptographic security.With updated algorithms, in-depth explanations, and a comprehensive overview of next-gen cryptographic advancements, this second edition provides the tools to protect sensitive data, implement secure cryptographic systems, and defend against emerging cybersecurity threats.By the end of this book, you’ll have hands-on expertise in modern cryptographic techniques—empowering you to build robust security solutions and stay at the forefront of cybersecurity innovation.

3654
Ebook

Ghidra Software Reverse-Engineering for Beginners. Master the art of debugging, from understanding code to mitigating threats - Second Edition

David Álvarez Pérez, Ravikant Tiwari

Written by David Álvarez Pérez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs.This updated edition walks you through implementing Ghidra’s capabilities and automating reverse-engineering tasks with its plugins. You’ll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too.This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you’ll acquire the skills necessary for handling real-world cybersecurity challenges.By the end of this Ghidra book, you’ll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.

3655
Ebook

RxJS Cookbook for Reactive Programming. Discover 40+ real-world solutions for building async, event-driven web apps

Nikola Mitrović , Santosh Yadav

Building modern web applications that are responsive and resilient is essential in this rapidly evolving digital world. Imagine effortlessly managing complex data streams and creating seamless user experiences—this book helps you do just that by adopting RxJS to boost your development skills and transform your approach to reactive programming.Written by a seasoned software engineer and consultant with a decade of industry experience, this book equips you to harness the power of RxJS techniques, patterns, and operators tailored for real-world scenarios. Each chapter is filled with practical recipes designed to tackle a variety of challenges, from managing side effects and ensuring error resiliency in client applications to developing real-time chat applications and event-driven microservices. You’ll learn how to integrate RxJS with popular frameworks, such as Angular and NestJS, gaining insights into modern web development practices that enhance performance and interactivity.By the end of this book, you’ll have mastered reactive programming principles, the RxJS library, and working with Observables, while crafting code that reacts to changes in data and events in a declarative and asynchronous way.

3656
Ebook

Canva Cookbook. Unlock the full potential of Canva with practical recipes for creating stunning visuals effortlessly

Barbara Tulissi

Want to create professional social media graphics, presentations, videos, and ads? Drawing from her expertise in digital design, Barbara Tulissi will guide you through Canva's user-friendly platform, showcasing how to create stunning visuals and transform your basic Canva knowledge into professional-level design skills. The Canva Cookbook starts with a quick overview of Canva, guiding you through its main features and ensuring you're set up for success, before focusing on creating a brand. You will do this through workbook-like questions and activities, that will help you understand your brand's vision, values, and voice. After that, each chapter focuses on specific design objectives, providing step-by-step recipes on crafting engaging social media content, creating eye-catching videos and ads, and developing print-ready materials. Through a blend of theory, instructions, and examples, you'll also learn how to make your designs more accessible – including the use of captions and alt text – as well as how to harness the power of Canva AI for efficient and impactful brand storytelling.By the end of this book, you will have gained skills to craft brand identities, marketing documents, stop-scrolling ads, and print-ready materials, and mastered Canva AI’s Magic Studio to automate and enhance your design workflow.

3657
Ebook

Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise

Daniel W. Dieterle

Unlock the secrets of Windows password security with Password Cracking with Kali Linux, your essential guide to navigating password-cracking techniques. This book offers a comprehensive introduction to Windows security fundamentals, arming you with the knowledge and tools for effective ethical hacking.The course begins with a foundational understanding of password security, covering prerequisites, lab setup, and an overview of the journey ahead. You'll explore Kerberoasting, tools like Rubeus, Mimikatz, and various attack methods, providing a solid base for understanding password vulnerabilities.The course focuses on practical applications of password cracking, including wordlist generation using tools like Crunch and Hashcat, and exploring various attack strategies. You'll delve into John the Ripper and Hashcat functionalities, learning to identify hash types and crack complex passwords efficiently.The course wraps up with advanced techniques in Linux password cracking and defense strategies. You'll gain insights into creating leaderboards, achievements, and monetizing games, equipping you with skills to not just crack passwords but also secure systems effectively.

3658
Ebook

Efficient Cloud FinOps. A practical guide to cloud financial management and optimization with AWS, Azure, and GCP

Alfonso San Miguel Sánchez, Danny Obando García

In response to the escalating challenges of cloud adoption, where balancing costs and maximizing cloud values is paramount, FinOps practices have emerged as the cornerstone of fi nancial optimization. This book serves as your comprehensive guide to understanding how FinOps is implemented in organizations worldwide through team collaboration and proper cloud governance.Presenting FinOps from a practical point of view, covering the three phases—inform, optimize, and operate—this book demonstrates an end-to-end methodology for optimizing costs and performing financial management in the cloud. You’ll learn how to design KPIs and dashboards for judicious cost allocation, covering key features of cloud services such as reserved instances, rightsizing, scaling, and automation for cost optimization. This book further simplifi es architectural concepts and best practices, enabling you to design superior and more optimized solutions. Finally, you’ll discover potential synergies and future challenges, from the integration of artifi cial intelligence to cloud sustainability considerations, to prepare for the future of cloud FinOps.By the end of this book, you’ll have built the expertise to seamlessly implement FinOps practices across major public clouds, armed with insights and ideas to propel your organization toward business growth.

3659
Ebook

Mastering DevOps on Microsoft Power Platform. Build, deploy, and secure low-code solutions on Power Platform using Azure DevOps and GitHub

Uroš Kastelic, József Zoltán Vadkerti

Mastering DevOps on Microsoft Power Platform is your guide to revolutionizing business-critical solution development. Written by two Microsoft Technology Specialists with extensive experience in enterprise-scale Power Platform implementations and DevOps practices, this book teaches you how to design, build, and secure efficient DevOps processes by adapting custom software development practices to the Power Platform toolset, dramatically reducing time, cost, and errors in app modernization and quality assurance.The book introduces application life cycle management (ALM) and DevOps-enabled architecture, design patterns, and CI/CD practices, showing you why companies adopt DevOps with Power Platform. You'll master environment and solution management using Dataverse, Git, the Power Platform CLI, Azure DevOps, and GitHub Copilot.Implementing the shift-left approach in DevSecOps using GitHub Advanced Security features, you’ll create a Power Platform tenant governed by controls, automated tests, and backlog management. You’ll also discover advanced concepts, such as fusion architecture, pro-dev extensibility, and AI-infused applications, along with tips to avoid common pitfalls.By the end of this book, you’ll be able to build CI/CD pipelines from development to production, enhancing the life cycle of your business solutions on Power Platform.

3660
Ebook

ROS 2 from Scratch. Get started with ROS 2 and create robotics applications with Python and C++

Edouard Renard

ROS 2 from Scratch, written by the cofounder of a robotics company with years of experience in teaching and engineering, will equip you with the skills necessary to develop cutting-edge robotic systems efficiently.This book will help you understand why you should use Robot Operating System (ROS), clarifying what ROS is and isn’t. It focuses on applied learning—no unnecessary filler, no abstract theory, and no abrupt leaps into complex topics. You’ll discover how to install ROS 2, set up your environment, and explore concepts through hands-on experiments, as well as create a ROS 2 application for a custom robot. The chapters expand upon core concepts such as nodes, communication via topics, client-server interactions with services, complex behaviors using actions, runtime configurations with parameters, and seamless node orchestration via launch files. Each concept is clearly explained with the help of real-life analogies and practical examples, using Python and C++. The book will also guide you through creating a real-world project that incorporates TFs, URDF, RViz, and Gazebo.By the end of this book, you’ll be able to create new software for any robot in no time and easily join existing projects for new job roles, research endeavors, and beyond.

3661
Ebook

Microsoft 365 Certified Fundamentals MS-900 Exam Guide. Gain the knowledge and problem-solving skills needed to pass the MS-900 exam on your first attempt - Third Edition

Aaron Guilmette, Yura Lee, Marcos Zanre

The MS-900 exam tests your understanding of Microsoft 365 services and components, along with their implementation, security, licensing, and general cloud concepts. This revised third edition helps you gain detailed actionable insights into the topics included in the latest syllabus, covering each topic according to its weight in the exam.You’ll begin by reviewing key cloud concepts, including cloud computing, services, and development models, and then explore different cloud architectures and learn what Microsoft offers as a service in the form of SaaS, IaaS, and PaaS. As you advance, you’ll get to grips with core Microsoft 365 components as well as the processes and tools used for managing Windows 10, Windows 11, and Microsoft 365 apps. This edition also includes expanded information on the Microsoft Viva Suite, formerly Workplace Analytics. The chapters shed light on security, compliance, privacy, and trust in Microsoft 365, and provide additional guidance regarding the pricing and support offered by Microsoft for different services and apps.By the end of this MS-900 book, you’ll have gained all the knowledge and skills needed to confidently appear for the exam.

3662
Ebook

Machine Learning Hero. Master Data Science with Python Essentials

Cuantum Technologies LLC

This book takes you on a journey through the world of machine learning, beginning with foundational concepts such as supervised and unsupervised learning, and progressing to advanced topics like feature engineering, hyperparameter tuning, and dimensionality reduction. Each chapter blends theory with practical exercises to ensure a deep understanding of the material.The book emphasizes Python, introducing essential libraries like NumPy, Pandas, Matplotlib, and Scikit-learn, along with deep learning frameworks like TensorFlow and PyTorch. You’ll learn to preprocess data, visualize insights, and build models capable of tackling complex datasets. Hands-on coding examples and exercises reinforce concepts and help bridge the gap between knowledge and application.In the final chapters, you'll work on real-world projects like predictive analytics, clustering, and regression. These projects are designed to provide a practical context for the techniques learned and equip you with actionable skills for data science and AI roles. By the end, you'll be prepared to apply machine learning principles to solve real-world challenges with confidence.

3663
Ebook

Debunking C++ Myths. Embark on an insightful journey to uncover the truths behind popular C++ myths and misconceptions

Alexandru Bolboacă, Ferenc-Lajos Deák

Think you know C++? Think again.For decades, C++ has been clouded by myths and misunderstandings—from its early design decisions to misconceptions that still linger today. Claims like C++ is too hard to learn or C++ is obsolete are often rooted in some truth, but they are outdated and fail to capture the language’s ongoing evolution and modern capabilities.Written by industry veterans with over 40 years of combined experience, this book uncovers the myths, exploring their origins and relevance in the context of today’s C++ landscape. It equips you with a deeper understanding of advanced features and best practices to elevate your projects. Each chapter tackles a specific misconception, shedding light on C++'s modern features, such as smart pointers, lambdas, and concurrency. You’ll learn practical strategies to navigate common challenges like code portability and compiler compatibility, as well as how to incorporate modern best practices into your C++ codebase to optimize performance and future-proof your projects. By the end of this book, you’ll have a comprehensive understanding of C++'s evolution, equipping you to make informed decisions and harness its powerful features to enhance your skills, coding practices, and projects.

3664
Ebook

The OSINT Handbook. A practical guide to gathering and analyzing online information

Dale Meredith, Greg Shields

The OSINT Handbook offers practical guidance and insights to enhance your OSINT capabilities and counter the surge in online threats that this powerful toolset was built to tackle. Starting with an introduction to the concept of OSINT, this book will take you through all the applications, as well as the legal and ethical considerations associated with OSINT research. You'll conquer essential techniques for gathering and analyzing information using search engines, social media platforms, and other web-based resources. As you advance, you’ll get to grips with anonymity and techniques for secure browsing, managing digital footprints, and creating online personas. You'll also gain hands-on experience with popular OSINT tools such as Recon-ng, Maltego, Shodan, and Aircrack-ng, and leverage OSINT to mitigate cyber risks with expert strategies that enhance threat intelligence efforts. Real-world case studies will illustrate the role of OSINT in anticipating, preventing, and responding to cyber threats. By the end of this book, you'll be equipped with both the knowledge and tools to confidently navigate the digital landscape and unlock the power of information using OSINT.