Видавець: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
3905
Eлектронна книга
3906
Eлектронна книга

Mastering JavaScript Object-Oriented Programming. Advanced patterns, faster techniques, higher quality code

Andrea Chiarelli

ECMAScript 6 introduces several new Object-Oriented features that drastically change the way developers structure their projects. Web developers now have some advanced OOP functionality at their disposal to build large-scale applications in JavaScript.With this book, we'll provide you with a comprehensive overview of OOP principles in JavaScript and how they can be implemented to build sophisticated web applications. Kicking off with a subtle refresher on objects, we'll show you how easy it is to define objects with the new ES6 classes. From there, we'll fly you through some essential OOP principles, forming a base for you to get hands-on with encapsulation. You'll get to work with the different methods of inheritance and we'll show you how to avoid using inheritance with Duck Typing. From there, we'll move on to some advanced patterns for object creation and you'll get a strong idea of how to use interesting patterns to present data to users and to bind data. We'll use the famous promises to work with asynchronous processes and will give you some tips on how to organize your code effectively. You'll find out how to create robust code using SOLID principles and finally, we'll show you how to clearly define the goals of your application architecture to get better, smarter, and more effective coding. This book is your one-way ticket to becoming a JavaScript Jedi who can be counted on to deliver flexible and maintainable code.

3907
Eлектронна книга

Blackboard Essentials for Teachers. You only need basic computer skills to follow this course on creating web pages and interactive features for your students using Blackboard. Building and managing powerful eLearning courses has never been simpler

William Rice, William Rice

Blackboard is the world's most popular commercial learning management system. With Blackboard you can construct and deliver professional quality elearning courses with ease. Its many features, which allow you to manage courses, grading and assessments, and social collaboration, are the standard against which other learning management systems are measured. Blackboard Essentials for Teachers shows you how to use Blackboard's most essential features by guiding you through the development of a demonstration course, built on Blackboard's free site for teachers, coursesites.com. You will also learn more about Blackboard's most important features, such as the gradebook, using clear instructions to guide you every step of the way. By following an example course, this book will guide you, step-by-step, through creating your own Blackboard course. Start by adding static material for students to view, such as pages, links, and media. Then, add interaction to your courses, with discussion boards, blogs, and wikis. Most importantly, engage your students in your course by communicating with them, assessing them, and putting them into groups. Blackboard Essentials for Teachers will enable you to take your elearning course from inception, to construction, to delivery.

3908
Eлектронна книга

AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap

Jonathan Helmus

Cloud security has always been treated as the highest priority by AWS while designing a robust cloud infrastructure. AWS has now extended its support to allow users and security experts to perform penetration tests on its environment. This has not only revealed a number of loopholes and brought vulnerable points in their existing system to the fore, but has also opened up opportunities for organizations to build a secure cloud environment. This book teaches you how to perform penetration tests in a controlled AWS environment.You'll begin by performing security assessments of major AWS resources such as Amazon EC2 instances, Amazon S3, Amazon API Gateway, and AWS Lambda. Throughout the course of this book, you'll also learn about specific tests such as exploiting applications, testing permissions flaws, and discovering weak policies. Moving on, you'll discover how to establish private-cloud access through backdoor Lambda functions. As you advance, you'll explore the no-go areas where users can’t make changes due to vendor restrictions and find out how you can avoid being flagged to AWS in these cases. Finally, this book will take you through tips and tricks for securing your cloud environment in a professional way.By the end of this penetration testing book, you'll have become well-versed in a variety of ethical hacking techniques for securing your AWS environment against modern cyber threats.

3909
Eлектронна книга

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.

3910
Eлектронна книга

Extending Microsoft Dynamics 365 Finance and Supply Chain Management Cookbook. Create and extend secure and scalable ERP solutions to improve business processes - Second Edition

Simon Buxton

Dynamics 365 Finance and Supply Chain Management is Microsoft’s ERP solution, which can be implemented as a cloud or on-premise solution to facilitate better decision-making with the help of contemporary, scalable ERP system tools. This book is updated with the latest features of Dynamics 365 Finance and Supply Chain Management including Chain of Command (CoC), Acceptance Test Libraries (ATL), and Business Events. The book not only features more than 100 tutorials that allow you to create and extend business solutions, but also addresses specific problems and offers solutions with insights into how they work.This cookbook starts by helping you set up a Azure DevOps project and taking you through the different data types and structures used to create tables. You will then gain an understanding of user interfaces, write extensible code, manage data entities, and even model Dynamics 365 ERP for security. As you advance, you’ll learn how to work with various in-built Dynamics frameworks such as SysOperation, SysTest, and Business Events. Finally, you’ll get to grips with automated build management and workflows for better application state management.By the end of this book, you’ll have become proficient in packaging and deploying end-to-end scalable solutions with Microsoft Dynamics 365 Finance and Supply Chain Management.

3911
Aудіокнига

Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence

William Oettinger

Computer Forensics, being a broad topic, involves a variety of skills which will involve seizing electronic evidence, acquiring data from electronic evidence, data analysis, and finally developing a forensic report.This book will help you to build up the skills you need to work in a highly technical environment. This book's ideal goal is to get you up and running with forensics tools and techniques to successfully investigate crime and corporate misconduct. You will discover ways to collect personal information about an individual from online sources. You will also learn how criminal investigations are performed online while preserving data such as e-mails, images, and videos that may be important to a case. You will further explore networking and understand Network Topologies, IP Addressing, and Network Devices. Finally, you will how to write a proper forensic report, the most exciting portion of the forensic exam process.By the end of this book, you will have developed a clear understanding of how to acquire, analyze, and present digital evidence, like a proficient computer forensics investigator.

3912
Eлектронна книга

Mastering Terraform. A practical guide to building and deploying infrastructure on AWS, Azure, and GCP

Mark Tinderholt, Armon Dadgar

As cloud technology and automation evolve, managing infrastructure as code, integrating security, and handling microservices complexity have become critical challenges. This book takes a hands-on approach to teaching Terraform, helping you build efficient cloud infrastructure using real-world scenarios and best practices.It begins with an introduction to Terraform's architecture, covering its command-line interface and HashiCorp Configuration Language. You’ll learn best practices, architectural patterns, and how to implement Terraform across virtual machines, Docker/Kubernetes, serverless environments, and cloud platforms like AWS, Azure, and GCP. The book also covers integrating Terraform into CI/CD pipelines with other technologies to automate infrastructure provisioning and management.Additional chapters focus on security, monitoring, troubleshooting, and cost optimization. You'll also gain insights into preparing for the Terraform Associate certification. By the end, you’ll have the skills to build, automate, and manage cloud infrastructure effectively.

3913
Eлектронна книга

Implementing Microsoft Dynamics NAV. Implementing Microsoft Dynamics NAV 2016 - Third Edition

Alex Chow, Cristina Nicolas Lorente, Laura Nicolas Lorente

Microsoft Dynamics NAV 2016 is an Enterprise Resource Planning (ERP) application used in all kinds of organizations around the world. It provides a great variety of functionality out-of-the-box in different topics such as accounting, sales, purchase processing, logistics, or manufacturing. It also allows companies to grow the application by customizing the solution to meet specific requirements.This book is a hands-on tutorial on working with a real Dynamics NAV implementation. You will learn about the team from your Microsoft Dynamics NAV partner as well as the team within the customer’s company. This book provides an insight into the different tools available to migrate data from the client’s legacy system into Microsoft Dynamics NAV. If you are already live with Microsoft Dynamics NAV, this books talks about upgrades and what to expect from them. We’ll also show you how to implement additional or expanding functionalities within your existing Microsoft Dynamics NAV installation, perform data analysis, debug error messages, and implement free third-party add-ons to your existing installation.This book will empower you with all the skills and knowledge you need for a successful implementation.

3914
Eлектронна книга

Mastering Kubernetes. Large scale container deployment and management

Gigi Sayfan

Kubernetes is an open source system to automate the deployment, scaling, and management of containerized applications. If you are running more than just a few containers or want automated management of your containers, you need Kubernetes.This book mainly focuses on the advanced management of Kubernetes clusters. It covers problems that arise when you start using container orchestration in production. We start by giving you an overview of the guiding principles in Kubernetes design and show you the best practises in the fields of security, high availability, and cluster federation. You will discover how to run complex stateful microservices on Kubernetes including advanced features as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage back ends. Using real-world use cases, we explain the options for network configuration and provides guidelines on how to set up, operate, and troubleshoot various Kubernetes networking plugins. Finally, we cover custom resource development and utilization in automation and maintenance workflows. By the end of this book, you’ll know everything you need to know to go from intermediate to advanced level.

3915
Eлектронна книга

Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit

Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh

Penetration testing (or ethical hacking) is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats.This Learning Path starts with an in-depth explanation of what hacking and penetration testing are. You’ll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it’s exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to strengthen your defense against online attacks.By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities.This Learning Path includes content from the following Packt books:• Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez• Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al.

3916
Eлектронна книга

Apps and Services with .NET 8. Build practical projects with Blazor, .NET MAUI, gRPC, GraphQL, and other enterprise technologies - Second Edition

Mark J. Price

Elevate your practical C# and .NET skills to the next level with this new edition of Apps and Services with .NET 8.With chapters that put a variety of technologies into practice, including Web API, gRPC, GraphQL, and SignalR, this book will give you a broader scope of knowledge than other books that often focus on only a handful of .NET technologies. You’ll dive into the new unified model for Blazor Full Stack and leverage .NET MAUI to develop mobile and desktop apps.This new edition introduces the latest enhancements, including the seamless implementation of web services with ADO.NET SqlClient's native Ahead-of-Time (AOT) support. Popular library coverage now includes Humanizer and Noda Time. There’s also a brand-new chapter that delves into service architecture, caching, queuing, and robust background services.By the end of this book, you’ll have a wide range of best practices and deep insights under your belt to help you build rich apps and efficient services.

3917
Eлектронна книга

Moodle 2.5 Multimedia. Adding multimedia to Moodle will make it work even harder for you as a teaching tool. Learn the easy way how images, video, audio, and maps can transform your courses. No special technical skills needed. - Second Edition

Joao Pedro Soares Fernandes

Multimedia is a very old human endeavor. It has taken mankind almost 30,000 years since painting on cave walls to get a combination of text, image, sound, and video all working in the same medium, that is, in motion pictures. Finally, after thousands of years of human history, we can all (not just an elite few) create multimedia easily using Moodle. Moodle was built around an idea of learning that happens when a group of people construct things for one another, collaboratively creating a small culture of shared artifacts with shared meanings.A tutorial-based guide, with clear illustrations and examples of how to create, convert and add multimedia to Moodle using a range of free e-learning software tools and web applications. This book follows the design of resources and activities for the course “Music for everyday life”. The tasks presented are quick and easy to do for teachers and trainers with busy schedules.Giving readers an insight into the creation and integration of multimedia in Moodle courses.Starting with images you will learn to create photo collages, screenshots and comic strips. Then you will discover audio and how to extract audio from CDs to create a soundtrack for a movie and a podcast. Later, you will use video to produce a trailer for a movie, photo slideshows, online TVs and screencasts. Following that, you will develop an understanding of interactive elements and web communication, such as online maps, interactive timelines or web meetings. Finally, you will look at multimedia quizzes and assessment of multimedia assignments, ending with general issues on copyright, licensing and safety.A focus of the book is to show readers that using multimedia is not just about improving instruction, but also improving the ways in which students can can now create multimedia easily, and share it without great effort.. To make this easier, many of the moodle tutorials in the book will be based on activities designed for students to create, discuss and assess each other's multimedia works.

3918
Eлектронна книга
3919
Eлектронна книга

Embracing Microservices Design. A practical guide to revealing anti-patterns and architectural pitfalls to avoid microservices fallacies

Ovais Mehboob Ahmed Khan, Nabil Siddiqui, Timothy Oleson, Mark Fussell

Microservices have been widely adopted for designing distributed enterprise apps that are flexible, robust, and fine-grained into services that are independent of each other. There has been a paradigm shift where organizations are now either building new apps on microservices or transforming existing monolithic apps into microservices-based architecture.This book explores the importance of anti-patterns and the need to address flaws in them with alternative practices and patterns. You'll identify common mistakes caused by a lack of understanding when implementing microservices and cover topics such as organizational readiness to adopt microservices, domain-driven design, and resiliency and scalability of microservices. The book further demonstrates the anti-patterns involved in re-platforming brownfield apps and designing distributed data architecture. You’ll also focus on how to avoid communication and deployment pitfalls and understand cross-cutting concerns such as logging, monitoring, and security. Finally, you’ll explore testing pitfalls and establish a framework to address isolation, autonomy, and standardization.By the end of this book, you'll have understood critical mistakes to avoid while building microservices and the right practices to adopt early in the product life cycle to ensure the success of a microservices initiative.

3920
Eлектронна книга