Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
5729
Ebook

Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats

Ru Campbell, Viktor Hedberg, Heike Ritter

This book will help you get up and running with Microsoft 365 Defender and help you use the whole suite effectively.You’ll start with a quick overview of cybersecurity risks that modern organizations face, such as ransomware and APT attacks, how Microsoft is making massive investments in security today, and gain an understanding of how to deploy Microsoft Defender for Endpoint by diving deep into configurations and their architecture.As you progress, you’ll learn how to configure Microsoft Defender Antivirus, and onboard and manage macOS, Android, and Linux MDE devices for effective solutions. You’ll also learn how to deploy Microsoft Defender for Identity and explore its different deployment methods that can protect your hybrid identity platform, as well as how to configure Microsoft Defender for Office 365 and Cloud Apps, and manage KQL queries for advanced hunting with ease. Toward the end, you’ll find out how M365D can be integrated with Sentinel and how to use APIs for incident response.By the end of this book, you will have a deep understanding of Microsoft 365 Defender, and how to protect and respond to security threats.

5730
Ebook

DevOps: Puppet, Docker, and Kubernetes. Practical recipes to make the most of DevOps with powerful tools

Neependra Khare, Ke-Jou Carol Hsu, Hideto Saito, John Arundel, ...

With so many IT management and DevOps tools on the market, both open source and commercial, it’s difficult to know where to start. DevOps is incredibly powerful when implemented correctly, and here’s how to get it done.This Learning Path covers three broad areas: Puppet, Docker, and Kubernetes. This Learning Path is a large resource of recipes to ease your daily DevOps tasks. We begin with recipes that help you develop a complete and expert understanding of Puppet’s latest and most advanced features. Then we provide recipes that help you efficiently work with the Docker environment. Finally, we show you how to better manage containers in different scenarios in production using Kubernetes.This course is based on these books:1. Puppet Cookbook, Third Edition 2. Docker Cookbook 3. Kubernetes Cookbook

5731
Ebook

Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler

Ravi Devarasetty

Many organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications.You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise.By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution.

5732
Ebook

Unlocking the Secrets of Prompt Engineering. Master the art of creative language generation to accelerate your journey from novice to pro

Gilbert Mizrahi, Daniel Serfaty

Unlocking the Secrets of Prompt Engineering is your key to mastering the art of AI-driven writing. This book propels you into the world of large language models (LLMs), empowering you to create and apply prompts effectively for diverse applications, from revolutionizing content creation and chatbots to coding assistance.Starting with the fundamentals of prompt engineering, this guide provides a solid foundation in LLM prompts, their components, and applications. Through practical examples and use cases, you'll discover how LLMs can be used for generating product descriptions, personalized emails, social media posts, and even creative writing projects like fiction and poetry. The book covers advanced use cases such as creating and promoting podcasts, integrating LLMs with other tools, and using AI for chatbot development. But that’s not all. You'll also delve into the ethical considerations, best practices, and limitations of using LLM prompts as you experiment and optimize your approach for best results.By the end of this book, you'll have unlocked the full potential of AI in writing and content creation to generate ideas, overcome writer's block, boost productivity, and improve communication skills.

5733
Ebook

Enterprise Architecture with .NET. Expert-backed advice for information system design, down to .NET and C# implementation

Jean-Philippe Gouigoux, Dalila Tamzalit

The software development domain continues to grow exponentially, and information systems have become the backbone of most industries, including non-digital-native ones. However, technical debt, coupling, and a high level of maintenance - sometimes bringing IT systems to a complete halt – continue to present a problem. The software industry has to still apply standards-based, modular, and repeatable approaches that exist in other industries.This book demonstrates such methods in action, particularly business/IT alignment principles. As you progress, you’ll cover advanced concepts and theories currently researched in academia. Then, you’ll be guided toward a practical framework to transfer these approaches to actual software architecture. Finally, a dedicated section will help you apply the knowledge you gain to a sample application in .NET where API design, dependency management, and code writing will be explained in detail to relate to the business-alignment principles explained at the beginning. Throughout the book, you’ll get equipped with the skills to create modular, long-living applications that serve your users better.By the end of this .NET book, you’ll not only have learned new concepts but also gained the ability to apply them immediately to your upcoming software endeavors.

5734
Ebook
5735
Ebook

Oracle BPM Suite 11g Developer's cookbook. Over 80 advanced recipes to develop rich, interactive business processes using the Oracle Business Process Management Suite with this book and

Vivek Acharya

Oracle Business Process Management Suite is a complete set of tools for creating, executing, and optimizing business processes.Oracle BPM Suite 11g offers the flexibility that business demands, hand-in-hand with the power IT requires. The result is an agile platform that brings together your existing applications, enabling you to react quickly to new business requirements.With this cookbook we will develop rich, interactive business processes using the Oracle Business Process Management suite.With Oracle BPM Suite 11g Developer's Cookbook, a common process model based on BPMN is presented to the specific role assigned to readers in each chapter. Explore Oracle BPM 11g with Modelling, Implementation, Simulation, Deployment, Exception Management, BPM and SOA in Concert, Advanced Rules and Human tasks, End User Interaction and Run-time.Oracle BPM Suite 11g Developer's Cookbook will help readers learn BPM 11g through a Real World Sample Process.This book is divided into four sections: the first section, Modeling, lays the foundation and demonstrates how to implement the Modeling of Business processes for a Use Case of a Fictitious Organization which needs BPM to be implemented at their site (with data objects and information handling). In the second section, Implementation, we learn about Process Implementation, Human Interaction, Business Rules, and much more. In the third section, Measuring, we learn about Post Process Development, Performance Analysis and Simulation Models. In the last section, Deployment, Migration and Run-Time, we learn deployment and migration, and Post Deployment Run-Time.

5736
Ebook
5737
Ebook

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.

5738
Ebook

UiPath Administration and Support Guide. Learn industry-standard practices for UiPath program support and administration activities

Arun Kumar Asokan

UiPath administration, support, maintenance, monitoring, and deployment activities are mandatory and more challenging than developing bots. This is a major issue for many firms that are looking to scale their RPA programs.This book will help in training new UiPath users/resources involved in administration and support tasks to address existing skill gaps in RPA market. The book starts with an introduction to the UiPath Platform. You'll learn how to set up UiPath Platform administration, support, monitoring, reporting, deployment, and maintenance. After that, you’ll cover advanced topics, such as, using the orchestrator API for support operations, security, and risk management. In addition to this, best practices for each of the topics will be covered.By the end of this book, you will have the knowledge you need to work on the support and monitoring of UiPath programs of any size.

5739
Ebook

Unlock Your Creativity with Photopea. Edit and retouch images, and create striking text and designs with the free online software

Michael Burton, Ellie Altomare

Photopea is a comprehensive image and photo editing design tool that provides essential features and capabilities comparable to Adobe Photoshop. This book covers the latest version of Photopea, featuring step-by-step instructions for image editing, improving and enhancing designs with text and effects, and creating eye-catching projects for print and the web.The first part of this book will teach you how to navigate the workspace, use the best tools for specific tasks and projects, and make perfect selections. You’ll also discover how to remove backgrounds, merge and/or add objects, and adjust colors to create impressive images. Later, you’ll explore layers and compositing techniques, and get hands on with retouching images like a pro. The book will demonstrate how to create collages and use brushes, color wheels, and swatches for drawing and painting. You’ll also learn how to apply impressive text to images to create posters, flyers, and logos.By the end of this book, you'll have learned how to retouch, paint, enhance, and manipulate images; how to use templates provided by Photopea; and finally, how to apply your skills to projects.

5740
Ebook
5741
Ebook

Learn Power BI. A comprehensive, step-by-step guide for beginners to learn real-world business intelligence - Second Edition

Greg Deckler

To succeed in today's transforming business world, organizations need business intelligence capabilities to make smarter decisions faster than ever before. This updated second edition of Learn Power BI takes you on a journey of data exploration and discovery, using Microsoft Power BI to ingest, cleanse, and organize data in order to unlock key business insights that can then be shared with others.This newly revised and expanded edition of Learn Power BI covers all of the latest features and interface changes and takes you through the fundamentals of business intelligence projects, how to deploy, adopt, and govern Power BI within your organization, and how to leverage your knowledge in the marketplace and broader ecosystem that is Power BI. As you progress, you will learn how to ingest, cleanse, and transform your data into stunning visualizations, reports, and dashboards that speak to business decision-makers.By the end of this Power BI book, you will be fully prepared to be the data analysis hero of your organization – or even start a new career as a business intelligence professional.

5742
Ebook

Privacy-Preserving Machine Learning. A use-case-driven approach to building and protecting ML pipelines from privacy and security threats

Srinivasa Rao Aravilli, Sam Hamilton

– In an era of evolving privacy regulations, compliance is mandatory for every enterprise – Machine learning engineers face the dual challenge of analyzing vast amounts of data for insights while protecting sensitive information – This book addresses the complexities arising from large data volumes and the scarcity of in-depth privacy-preserving machine learning expertise, and covers a comprehensive range of topics from data privacy and machine learning privacy threats to real-world privacy-preserving cases – As you progress, you’ll be guided through developing anti-money laundering solutions using federated learning and differential privacy – Dedicated sections will explore data in-memory attacks and strategies for safeguarding data and ML models – You’ll also explore the imperative nature of confidential computation and privacy-preserving machine learning benchmarks, as well as frontier research in the field – Upon completion, you’ll possess a thorough understanding of privacy-preserving machine learning, equipping them to effectively shield data from real-world threats and attacks

5743
Ebook

The C++ Workshop. Learn to write clean, maintainable code in C++ and advance your career in software engineering

Dale Green, Kurt Guntheroth, Shaun Ross Mitchell

C++ is the backbone of many games, GUI-based applications, and operating systems. Learning C++ effectively is more than a matter of simply reading through theory, as the real challenge is understanding the fundamentals in depth and being able to use them in the real world. If you're looking to learn C++ programming efficiently, this Workshop is a comprehensive guide that covers all the core features of C++ and how to apply them. It will help you take the next big step toward writing efficient, reliable C++ programs.The C++ Workshop begins by explaining the basic structure of a C++ application, showing you how to write and run your first program to understand data types, operators, variables and the flow of control structures. You'll also see how to make smarter decisions when it comes to using storage space by declaring dynamic variables during program runtime.Moving ahead, you'll use object-oriented programming (OOP) techniques such as inheritance, polymorphism, and class hierarchies to make your code structure organized and efficient. Finally, you'll use the C++ standard library?s built-in functions and templates to speed up different programming tasks.By the end of this C++ book, you will have the knowledge and skills to confidently tackle your own ambitious projects and advance your career as a C++ developer.

5744
Ebook