Видавець: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
4929
Aудіокнига

iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

Gianluca Tiepolo

Professionals working in the mobile forensics industry will be able to put their knowledge to work with this practical guide to learning how to extract and analyze all available data from an iOS device.This audiobook is a comprehensive, how-to guide that leads investigators through the process of collecting mobile devices and preserving, extracting, and analyzing data, as well as building a report. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this book starts by covering the fundamentals of mobile forensics and how to overcome challenges in extracting data from iOS devices. Once you've walked through the basics of iOS, you’ll learn how to use commercial tools to extract and process data and manually search for artifacts stored in database files. Next, you'll find out the correct workflows for handling iOS devices and understand how to extract valuable information to track device usage. You’ll also get to grips with analyzing key artifacts, such as browser history, the pattern of life data, location data, and social network forensics.By the end of this audiobook, you'll be able to establish a proper workflow for handling iOS devices, extracting all available data, and analyzing it to gather precious insights that can be reported as prosecutable evidence.

4930
Eлектронна книга

Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs

Maurício Harley

Understanding API security is crucial as APIs form the backbone of modern interconnected applications, making them prime targets for cyberattacks. Drawing on nearly 30 years of cybersecurity experience and an extensive background in network security and forensic analysis, this book provides the knowledge and tools to strengthen your API security practices and protect against cyber threats comprehensively.This book begins by establishing a foundational understanding of APIs, particularly focusing on REST and GraphQL, emphasizing their critical role and potential security vulnerabilities. It guides you through setting up a penetration testing environment to ensure the practical application of concepts. You’ll learn reconnaissance techniques, information-gathering strategies, and the discovery of API vulnerabilities. Authentication and authorization testing are thoroughly explored, covering mechanisms, weaknesses, and methods to bypass security controls. By comprehensively addressing these aspects, the book equips you to understand, identify, and mitigate risks, strengthening API security and effectively minimizing potential attack surfaces.By the end of this book, you’ll have developed practical skills to identify, exploit, and secure APIs against various vulnerabilities and attacks.

4931
Eлектронна книга

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips you with the skills to secure AI technologies, moving beyond research hype or business-as-usual activities. Learn how to defend AI and LLM systems against manipulation and intrusion through adversarial attacks such as poisoning, trojan horses, and model extraction, leveraging DevSecOps, MLOps, and other methods to secure systems.This strategy-based book is a comprehensive guide to AI security, combining structured frameworks with practical examples to help you identify and counter adversarial attacks. Part 1 introduces the foundations of AI and adversarial attacks. Parts 2, 3, and 4 cover key attack types, showing how each is performed and how to defend against them. Part 5 presents secure-by-design AI strategies, including threat modeling, MLSecOps, and guidance aligned with OWASP and NIST. The book concludes with a blueprint for maturing enterprise AI security based on NIST pillars, addressing ethics and safety under Trustworthy AI.By the end of this book, you’ll be able to develop, deploy, and secure AI systems against the threat of adversarial attacks effectively.

4932
Eлектронна книга

Exam Ref AZ-104 Microsoft Azure Administrator Certification and Beyond. Master Azure administration and pass the AZ-104 exam with confidence - Third Edition

Donovan Kelly

Take the first step toward excellence in Azure management and earning your Microsoft certification with this hands-on guide!This third edition of Exam Ref AZ-104 Microsoft Azure Administrator Certification and Beyond offers comprehensive insights and step-by-step instructions that follow the latest AZ-104 exam objectives. You’ll work your way from foundational topics such as Azure identity management and governance to essential skills such as deploying and managing storage solutions, configuring virtual networks, and monitoring Azure resources. Each chapter includes practice questions to reinforce your understanding and enhance your practical skills. The book also provides you with access to online mock exams, interactive flashcards, and expert exam tips, helping you assess your readiness and boost your confidence before the exam.By the end of this book, you won’t just be prepared to pass the AZ-104 exam – you’ll also have the expertise needed to efficiently manage Azure environments in real-world scenarios.

4933
Eлектронна книга

Mastering Terraform. A practical guide to building and deploying infrastructure on AWS, Azure, and GCP

Mark Tinderholt, Armon Dadgar

As cloud technology and automation evolve, managing infrastructure as code, integrating security, and handling microservices complexity have become critical challenges. This book takes a hands-on approach to teaching Terraform, helping you build efficient cloud infrastructure using real-world scenarios and best practices.It begins with an introduction to Terraform's architecture, covering its command-line interface and HashiCorp Configuration Language. You’ll learn best practices, architectural patterns, and how to implement Terraform across virtual machines, Docker/Kubernetes, serverless environments, and cloud platforms like AWS, Azure, and GCP. The book also covers integrating Terraform into CI/CD pipelines with other technologies to automate infrastructure provisioning and management.Additional chapters focus on security, monitoring, troubleshooting, and cost optimization. You'll also gain insights into preparing for the Terraform Associate certification. By the end, you’ll have the skills to build, automate, and manage cloud infrastructure effectively.

4934
Eлектронна книга

Effective .NET Memory Management. Build memory-efficient cross-platform applications using .NET Core

Trevoir Williams

In today’s software development landscape, efficient memory management is crucial for ensuring application performance and scalability. Effective .NET Memory Management addresses this need by explaining the intricacies of memory utilization within .NET Core apps, from fundamental concepts to advanced optimization techniques. Starting with an overview of memory management basics, you’ll quickly go through .NET’s garbage collection system. You’ll grasp the mechanics of memory allocation and gain insights into the distinctions between stack and heap memory and the nuances of value types and reference types. Building on this foundation, this book will help you apply practical strategies to address real-world app demands, spanning profiling memory usage, spotting memory leaks, and diagnosing performance bottlenecks, through clear explanations and hands-on examples. This book goes beyond theory, detailing actionable techniques to optimize data structures, minimize memory fragmentation, and streamline memory access in scenarios involving multithreading and asynchronous programming for creating responsive and resource-efficient apps that can scale without sacrificing performance. By the end of this book, you’ll have gained the knowledge to write clean, efficient code that maximizes memory usage and boosts app performance.

4935
Eлектронна книга

Bare-Metal Embedded C Programming. Develop high-performance embedded systems with C for Arm microcontrollers

Israel Gbati, Georgios Papanikolaou

Bare-Metal Embedded C Programming takes you on an unparalleled journey to equip you with the skills and knowledge to excel in the world of embedded systems. The author, with over a decade of hands-on experience in engineering, takes a unique, practical approach to teach you how to decode microcontroller datasheets so that you’re able to extract vital information for precise firmware development. Register manipulation will become second nature to you as you learn to craft optimized code from scratch.The book provides in-depth insights into the hardware intricacies of microcontrollers. You'll navigate user manuals and documentation with ease, ensuring a profound understanding of the underlying technology. The true uniqueness of this book lies in its commitment to fostering independent expertise. Instead of simply copy pasting, you'll develop the capability to create firmware with confidence, paving the way for professional-grade mastery.By the end of this book, you'll have honed your skills in reading datasheets, performing register manipulations, and crafting optimized code, as well as gained the confidence needed to navigate hardware intricacies and write optimized firmware independently, making you a proficient and self-reliant embedded systems developer.

4936
Eлектронна книга

Quick Start Kubernetes. Unlock the Full Potential of Kubernetes for Scalable Application Management - Second Edition

Nigel Poulton

Begin with an introduction to Kubernetes, understanding its importance and architecture. These foundational chapters will set the stage for your exploration into Kubernetes' capabilities. As you progress, you'll learn how to set up Kubernetes and containerize an application, equipping you with practical skills for real-world application management.The course continues with a focus on running applications on Kubernetes, where you will delve into self-healing mechanisms, scaling, and performing rolling updates. Each chapter builds on the last, ensuring a seamless learning experience that integrates theoretical knowledge with hands-on practice. You'll understand how Kubernetes maintains application health and performance, providing a robust environment for modern applications.Concluding with advanced operational techniques and future steps, the course prepares you to leverage Kubernetes for continuous development and deployment. Whether you're scaling applications to meet demand or ensuring seamless updates with minimal downtime, you'll be equipped with the skills necessary for efficient and effective Kubernetes management. This course is your gateway to becoming proficient in one of the most essential tools in the DevOps toolkit.

4937
Eлектронна книга

Learn SQL using MySQL in One Day and Learn It Well. SQL for beginners with Hands-on Project

Jamie Chan

Learn SQL (using MySQL) in One Day and Learn It Well is the ultimate guide for beginners aiming to grasp the complexities of SQL through hands-on learning. Starting with an introduction to the essence of databases, this book methodically advances through defining and manipulating tables, mastering data insertion, updates, deletions, and executing sophisticated data selection techniques across its comprehensive chapters. It further explores the creation and utility of views, the implementation of triggers to automate database responses, and the intricacies of variables, stored routines, control flow tools, and cursors, culminating in a capstone project that brings all concepts together.Culminating in a project , this book offers a unique opportunity to apply all the learned concepts in a practical, real-world scenario, reinforcing the skills and knowledge acquired throughout the chapters. The appendices provide additional resources including table definitions for practical exercises modeled on real-world scenarios.Embark on a learning journey that transitions you from novice to proficient in managing and querying databases with MySQL, empowering you with the skills to tackle real-world data challenges.

4938
Eлектронна книга

Apache Spark for Machine Learning. Build and deploy high-performance big data AI solutions for large-scale clusters

Deepak Gowda

In the world of big data, efficiently processing and analyzing massive datasets for machine learning can be a daunting task. Written by Deepak Gowda, a data scientist with over a decade of experience and 30+ patents, this book provides a hands-on guide to mastering Spark’s capabilities for efficient data processing, model building, and optimization. With Deepak’s expertise across industries such as supply chain, cybersecurity, and data center infrastructure, he makes complex concepts easy to follow through detailed recipes.This book takes you through core machine learning concepts, highlighting the advantages of Spark for big data analytics. It covers practical data preprocessing techniques, including feature extraction and transformation, supervised learning methods with detailed chapters on regression and classification, and unsupervised learning through clustering and recommendation systems. You’ll also learn to identify frequent patterns in data and discover effective strategies to deploy and optimize your machine learning models. Each chapter features practical coding examples and real-world applications to equip you with the knowledge and skills needed to tackle complex machine learning tasks.By the end of this book, you’ll be ready to handle big data and create advanced machine learning models with Apache Spark.

4939
Eлектронна книга

Tools and Skills for .NET 8. Get the career you want with good practices and patterns to design, debug, and test your solutions 

Mark J. Price

Unlock the full potential of .NET development with Tools and Skills for .NET 8.Dive into source code management using Git and learn how to navigate projects while ensuring version control. Discover advanced debugging techniques and troubleshooting strategies to identify and resolve issues, and gain practical insights on documenting your code, APIs, and services, fostering project clarity and maintainability. Delve into the world of cryptography, ensuring confidentiality and integrity throughout your development lifecycle.Elevate your skills as you explore cutting-edge topics such as building intelligent apps using custom LLM-based chat services, mastering dependency injection, optimizing performance through testing, and Docker containerization. Harness the power of cloud-native development with .NET Aspire, unlocking the benefits of modern cloud platforms. With guidance on software architecture best practices, this book empowers you to build robust, scalable and maintainable applications.Advance your career with invaluable insights on job readiness and interview preparation, positioning yourself as a top-tier candidate in today's competitive job market.Whether you're a seasoned .NET professional or an aspiring developer looking to enhance your skills, this book is your ultimate companion on the journey to .NET mastery.

4940
Eлектронна книга

Procedural Content Generation with Unreal Engine 5. Harness the PCG framework to take your environment design and art skills to the next level

Paul Martin Eliasz

In the ever-evolving world of games and virtual production, mastering procedural content generator (PCG) opens the door to endless creative possibilities. This book takes you deeper into the realm of procedurally generated environments and assets by showing you how to use the PCG framework integrated into Unreal Engine 5.4 and helping you build the skills to surpass traditional methods and create cutting-edge projects with unparalleled efficiency.This book guides you through the complete level design and tools production pipeline using open-source software. Whether you’re an aspiring technical artist or level designer in real-time visualization and game production, you’ll benefit from following the step-by-step, beginner-friendly approach to crafting custom levels, from jungles to cities, and incorporating 3D assets from libraries such as Quixel or Sketchfab. Next, you’ll get to grips with data preparation, construct a PCG graph to populate assets in your environment, and apply these methods to optimize your projects. You’ll understand how this process enhances your PCG tools, elevating their capacity to improve the quality of your levels.By the end of this book, you’ll be able to seamlessly integrate different elements in Unreal Engine 5, empowering you to create your own PCG tools and transform your game development experience.

4941
Eлектронна книга

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.

4942
Eлектронна книга

Sustainable Cloud Development. Optimize cloud workloads for environmental impact in the GenAI era

Parth Girish Patel, Ishneet Kaur Dua, Steven David

Written by three seasoned AWS solution architects, sustainability mentors, and thought leaders, Sustainable Cloud Development equips cloud professionals with actionable strategies to design, build, and optimize workloads that minimize environmental impact, while maintaining performance and scalability.This book combines practical insights, best practices, and case studies to help you align your cloud operations with global sustainability goals. From foundational concepts such as carbon footprint measurement to advanced techniques such as sustainable software architecture, generative AI lifecycle optimization, and cost-efficient cloud practices, this book covers every aspect of sustainable cloud development. You’ll get to grips with key tools, including AWS Cost Explorer, for analyzing costs and usage over time to right-size deployments; auto scaling for automatically scaling compute resources dynamically based on demand; Amazon Trusted Advisor for reviewing optimization recommendations across critical areas such as cost, performance, and security; and Amazon CloudWatch for detailed monitoring and threshold-based alerting around all resources and applications.This book serves as a practical blueprint for optimizing your cloud workloads for both high performance and a minimal environmental footprint.

4943
Eлектронна книга

Web Development Career Master Plan. Learn what it means to be a web developer and launch your journey toward a career in the industry

Frank W. Zammetti

The world of web development can seem daunting when you’re a beginner and don’t know where to get started. If you’re passionate about web development and want to learn the art of creating captivating websites, then this book is for you.Web Development Career Master Plan will take you on a learning journey, starting from the foundations and progressing through advanced concepts and career development strategies. You'll learn the core pillars of web development, including HTML, CSS, and JavaScript. As you go deeper, you'll explore the landscape of frameworks, libraries, and toolkits. This book also provides valuable insights into containerization, version control, Linux, and IDEs. Additionally, you’ll find expert advice on interview tactics and career growth strategies to secure your first job in web development. But the journey doesn’t end there. While you navigate the twists and turns of web development, you’ll also get a glimpse of what it means to be a web developer, the day-to-day aspects of the job, and the technologies you'll be working with.By the end of this web development book, you'll be well-equipped with the knowledge and tools you need to kick-start your journey and succeed in this dynamic field.

4944
Eлектронна книга

AWS Security Cookbook. Practical solutions for securing AWS cloud infrastructure with essential services and best practices - Second Edition

Heartin Kanikathottu

As a security consultant, implementing policies and best practices to secure your infrastructure is critical. This cookbook discusses practical solutions for safeguarding infrastructure, covering services and features within AWS that help implement security models, such as the CIA triad (confidentiality, integrity, and availability) and the AAA triad (authentication, authorization, and accounting), as well as non-repudiation.This updated second edition starts with the fundamentals of AWS accounts and organizations. The book then guides you through identity and access management, data protection, network security, and encryption. You’ll explore critical topics such as securing EC2 instances, managing keys with KMS and CloudHSM, and implementing endpoint security. Additionally, you’ll learn to monitor your environment using CloudWatch, CloudTrail, and AWS Config, while maintaining compliance with services such as GuardDuty, Macie, and Inspector. Each chapter presents practical recipes for real-world scenarios, allowing you to apply security concepts.By the end of this book, you’ll be well versed in techniques required for securing AWS deployments and be prepared to gain the AWS Certified Security – Specialty certification.