Verleger: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
5473
E-book

Penetration Testing: A Survival Guide. A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, ...

The need for penetration testers has grown well over what the IT industry ever anticipated. Running just a vulnerability scanner is no longer an effective method to determine whether a business is truly secure. This learning path will help you develop the most effective penetration testing skills to protect your Windows, web applications, and Android devices. The first module focuses on the Windows platform, which is one of the most common OSes, and managing its security spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Employs the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. In this module first,you’ll be introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities so you can exploit a system remotely. You’ll not only learn to penetrate in the machine, but will also learn to work with Windows privilege escalations.The second module will help you get to grips with the tools used in Kali Linux 2.0 that relate to web application hacking. You will get to know about scripting and input validation flaws, AJAX, and security issues related to AJAX. You will also use an automated technique called fuzzing so you can identify flaws in a web application. Finally, you’ll understand the web application vulnerabilities and the ways they can be exploited.In the last module, you’ll get started with Android security. Android, being the platform with the largest consumer base, is the obvious primary target for attackers. You’ll begin this journey with the absolute basics and will then slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. You’ll gain the skills necessary to perform Android application vulnerability assessments and to create an Android pentesting lab.This Learning Path is a blend of content from the following Packt products:• Kali Linux 2: Windows Penetration Testing by Wolf Halton and Bo Weaver• Web Penetration Testing with Kali Linux, Second Edition by Juned Ahmed Ansari• Hacking Android by Srinivasa Rao Kotipalli and Mohammed A. Imran

5474
E-book

Programming Microsoft Dynamics 365 Business Central. Build customized business applications with the latest tools in Dynamics 365 Business Central - Sixth Edition

Marije Brummel, David A. Studebaker, Christopher D. Studebaker

Microsoft Dynamics 365 Business Central is a full ERP business solution suite with a robust set of development tools to support customization and enhancement. These tools can be used to tailor Business Central's in-built applications to support complete management functions for finance, supply chain, manufacturing, and operations.Using a case study approach, this book will introduce you to Dynamics 365 Business Central and Visual Studio Code development tools to help you become a productive Business Central developer. You'll also learn how to evaluate a product's development capabilities and manage Business Central-based development and implementation. You'll explore application structure, the construction of and uses for each object type, and how it all fits together to build apps that meet special business requirements.By the end of this book, you'll understand how to design and develop high-quality software using the Visual Studio Code development environment, the AL language paired with the improved editor, patterns, and features.

5475
E-book

Mastering Git. Attain expert level proficiency with Git for enhanced productivity and efficient collaboration

Jakub Narębski, Jakub S Narebski

Git is one of the most popular types of Source Code Management (SCM) and Distributed Version Control System (DVCS). Despite the powerful and versatile nature of the tool enveloping strong support for nonlinear development and the ability to handle large projects efficiently, it is a complex tool and often regarded as “user-unfriendly”. Getting to know the ideas and concepts behind the architecture of Git will help you make full use of its power and understand its behavior. Learning the best practices and recommended workflows should help you to avoid problems and ensure trouble-free development.The book scope is meticulously designed to help you gain deeper insights into Git's architecture, its underlying concepts, behavior, and best practices. Mastering Git starts with a quick implementation example of using Git for a collaborative development of a sample project to establish the foundation knowledge of Git operational tasks and concepts. Furthermore, as you progress through the book, the tutorials provide detailed descriptions of various areas of usage: from archaeology, through managing your own work, to working with other developers. This book also helps augment your understanding to examine and explore project history, create and manage your contributions, set up repositories and branches for collaboration in centralized and distributed version control, integrate work from other developers, customize and extend Git, and recover from repository errors. By exploring advanced Git practices, you will attain a deeper understanding of Git’s behavior, allowing you to customize and extend existing recipes and write your own.

5476
E-book

Mastering QuickBooks 2020. The ultimate guide to bookkeeping and QuickBooks Online

Crystalynn Shelton

Intuit QuickBooks is an accounting software package that helps small business owners to manage all their bookkeeping tasks. Its complete range of accounting capabilities, such as tracking income and expenses, managing payroll, simplifying taxes, and accepting online payments, makes QuickBooks software a must-have for business owners and aspiring bookkeepers.This book is a handy guide to using QuickBooks Online to manage accounting tasks and drawing business insights by generating reports easily. Using a fictitious company, the book demonstrates how to create a QuickBooks Online account; customize key settings for a business; manage customers, vendors, and products and services; generate reports; and close the books at the end of the period. QuickBooks records your debits and credits, so you don't need to learn accounting. However, you will find out what happens under the hood and understand how your financial statements are impacted by what you do in QuickBooks. You'll also discover tips, shortcuts, and best practices that will help you save time and become a QuickBooks pro.By the end of this book, you'll have become well-versed with the features of QuickBooks and be able to set up your business and manage all bookkeeping tasks with ease.

5477
E-book

Cryptography Algorithms. Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography - Second Edition

Massimo Bertaccini

This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments.You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more complex math as the book progresses. By getting your foot in the door with how elliptic curves, zero knowledge protocols, homomorphic encryption, and quantum computing shape today’s cybersecurity landscape and its attacks and defenses, you will have the groundwork on which to build professional cryptographic experience.This edition will help keep you up to date with the most innovative cryptographic algorithms, ensuring you're well-prepared to navigate the rapidly evolving world of data privacy and cybersecurity. With a focus on emerging trends and challenges, including quantum cryptography you'll acquire the knowledge needed to stay at the forefront of this dynamic field.With the latest updates and an expanded scope, this new edition ensures you're well-prepared to face the ever-evolving landscape of cybersecurity with confidence and expertise.

5478
E-book
5479
E-book

Adobe Illustrator for Creative Professionals. Develop skills in vector graphic illustration and build a strong design portfolio with Illustrator 2022

Clint Balsar

Adobe Illustrator is a vector-based art tool for visual creatives. It is an industry-standard tool that helps you take a design from concept to completion, including the process of peer collaboration and client feedback.Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin to build confidence as you master the methods of successful illustrators in the industry by exploring crucial tools and techniques of Adobe Illustrator. You’ll learn how to create objects using different tools and methods while assigning varied attributes and appearances. Throughout the book, you’ll strengthen your skills in developing structures for maintaining organization as your illustration grows.By the end of this Adobe Illustrator book, you’ll have gained the confidence you need to not only create content in the desired format and for the right audience but also build eye-catching vector art based on solid design principles.

5480
E-book

Microsoft 365 Certified Fundamentals MS-900 Exam Guide. Gain the knowledge and problem-solving skills needed to pass the MS-900 exam on your first attempt - Third Edition

Aaron Guilmette, Yura Lee, Marcos Zanre

The MS-900 exam tests your understanding of Microsoft 365 services and components, along with their implementation, security, licensing, and general cloud concepts. This revised third edition helps you gain detailed actionable insights into the topics included in the latest syllabus, covering each topic according to its weight in the exam.You’ll begin by reviewing key cloud concepts, including cloud computing, services, and development models, and then explore different cloud architectures and learn what Microsoft offers as a service in the form of SaaS, IaaS, and PaaS. As you advance, you’ll get to grips with core Microsoft 365 components as well as the processes and tools used for managing Windows 10, Windows 11, and Microsoft 365 apps. This edition also includes expanded information on the Microsoft Viva Suite, formerly Workplace Analytics. The chapters shed light on security, compliance, privacy, and trust in Microsoft 365, and provide additional guidance regarding the pricing and support offered by Microsoft for different services and apps.By the end of this MS-900 book, you’ll have gained all the knowledge and skills needed to confidently appear for the exam.

5481
E-book

Machine Learning Engineering with MLflow. Manage the end-to-end machine learning life cycle with MLflow

Natu Lauchande

MLflow is a platform for the machine learning life cycle that enables structured development and iteration of machine learning models and a seamless transition into scalable production environments.This book will take you through the different features of MLflow and how you can implement them in your ML project. You will begin by framing an ML problem and then transform your solution with MLflow, adding a workbench environment, training infrastructure, data management, model management, experimentation, and state-of-the-art ML deployment techniques on the cloud and premises. The book also explores techniques to scale up your workflow as well as performance monitoring techniques. As you progress, you’ll discover how to create an operational dashboard to manage machine learning systems. Later, you will learn how you can use MLflow in the AutoML, anomaly detection, and deep learning context with the help of use cases. In addition to this, you will understand how to use machine learning platforms for local development as well as for cloud and managed environments. This book will also show you how to use MLflow in non-Python-based languages such as R and Java, along with covering approaches to extend MLflow with Plugins.By the end of this machine learning book, you will be able to produce and deploy reliable machine learning algorithms using MLflow in multiple environments.

5482
E-book

Unity 2021 Shaders and Effects Cookbook. Over 50 recipes to help you transform your game into a visually stunning masterpiece - Fourth Edition

John P. Doran

Shaders enable you to create powerful visuals for your game projects. However, creating shaders for your games can be notoriously challenging with various factors such as complex mathematics standing in the way of attaining the level of realism you crave for your shaders.The Unity 2021 Shaders and Effects Cookbook helps you overcome that with a recipe-based approach to creating shaders using Unity. This fourth edition is updated and enhanced using Unity 2021 features and tools covering Unity's new way of creating particle effects with the VFX Graph. You'll learn how to use VFX Graph for advanced shader development. The book also features updated recipes for using Shader Graph to create 2D and 3D elements. You'll cover everything you need to know about vectors, how they can be used to construct lighting, and how to use textures to create complex effects without the heavy math. You'll also understand how to use the visual-based Shader Graph for creating shaders without any code.By the end of this Unity book, you'll have developed a set of shaders that you can use in your Unity 3D games and be able to accomplish new effects and address the performance needs of your Unity game development projects. So, let's get started!

5483
E-book

Unleashing the Power of Data with Trusted AI. A guide for board members and executives

Wendy Turner-Williams

Written by a distinguished leader and innovator who has been instrumental in spearheading digital, cloud, and AI transformations across global brands, Unleashing the Power of Data with Trusted AI is an indispensable resource that will make you AI-ready.This comprehensive guide is designed to meet the urgent need for clarity and to give you actionable insights into today's rapidly evolving landscape of AI and its fundamental driver - data. You’ll delve into the exciting world of AI and its integration with data, uncover its significance, ethical considerations, and strategic applications with real-life success stories from industry giants like Starbucks, Netflix, and Siemens. You’ll also witness first-hand how the integration of data and AI has reshaped markets and elevated customer experiences, and discover the future of generative AI based on several surveys and case studies. You’ll gain an understanding of how AI has evolved across industries, empowering decision-making and fostering innovation. Tailored for board members, executives, innovators, and tech enthusiasts, this immersive guide will reshape your understanding of data and AI synergy.By the end of this guide, you’ll be able to lead your teams, customers, partners, and organizations confidently and responsibly in the era of AI.

5484
E-book

Linux Device Driver Development. Everything you need to start with device driver development for Linux kernel and embedded Linux - Second Edition

John Madieu

Linux is by far the most-used kernel on embedded systems. Thanks to its subsystems, the Linux kernel supports almost all of the application fields in the industrial world. This updated second edition of Linux Device Driver Development is a comprehensive introduction to the Linux kernel world and the different subsystems that it is made of, and will be useful for embedded developers from any discipline.You'll learn how to configure, tailor, and build the Linux kernel. Filled with real-world examples, the book covers each of the most-used subsystems in the embedded domains such as GPIO, direct memory access, interrupt management, and I2C/SPI device drivers. This book will show you how Linux abstracts each device from a hardware point of view and how a device is bound to its driver(s). You’ll also see how interrupts are propagated in the system as the book covers the interrupt processing mechanisms in-depth and describes every kernel structure and API involved. This new edition also addresses how not to write device drivers using user space libraries for GPIO clients, I2C, and SPI drivers.By the end of this Linux book, you’ll be able to write device drivers for most of the embedded devices out there.

5485
E-book

Mastering Articulate Storyline. Learn how to push Articulate Storyline to its limits and create breath taking stories by deepening your understanding of the product's capabilities!

Ashley Chiasson, Jeffery Batt

Storyline is a powerful e-learning authoring tool that allows you to take your creativity to the next level. However, more often than not, projects don't require such complex interactions, leaving Storyline's full capabilities untapped.This book will provide you with the information you need to take your Storyline development up a notch by leveraging the full suite of possibilities Storyline has to offer.You will be provided with a refresher of the key concepts before we take you deep into the exciting world of enhanced interactivity, variables, and even some JavaScript—oh my! With downloadable activities, you can either follow along and compare your output, use the activities as they are, modify the activities to suit your own needs, or reverse-engineer the activities to better understand how they were developed.

5486
E-book

Architectural Visualization in Unreal Engine 5. Create photorealistic architectural interior renderings in UE5

Ludovico Palmeri

If you excel at creating beautiful architectural renderings using traditional software but want to master real-time, interactive visualizations, this book will show you how the versatile Unreal Engine 5 enables such transformations effortlessly. While UE5 is widely popular, existing online training resources can be overwhelming and often lack a focus on Architectural visualization. This comprehensive guide is for both beginners and experienced users offering a clear, end-to-end approach to creating stunning visualizations from scratch as well as managing tight deadlines, striving for photorealism, and handling typical client revisions inherent to architectural visualization.The book starts with an introduction to UE5 and its capabilities, as well as the basic concepts and principles of architectural visualization. You'll then progress to essential topics such as setting up a project, modeling and texturing 3D assets, lighting and materials, and post-processing effects. Along the way, you'll find practical tips, best practices, and hands-on exercises to develop your skills by applying what you learn.By the end of this book, you'll have acquired the skills to confidently create high-quality architectural visualizations in UE5 and become proficient in building an architectural interior scene to produce professional still images.

5487
E-book

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.

5488
E-book

Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Wolf Halton, Manoj Kumar Singh, Bo Weaver

Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important.Thus, you not only learn penetrating in the machine you also learn Windows privilege’s escalations. With easy to follow step-by-step instructions and support images, you will be able to quickly pen test your system and network.

5489
E-book

Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

Yoram Orzach, Deepanshu Khanna

With the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. Equipped with the knowledge of how to find vulnerabilities and infiltrate organizations through their networks, you’ll be able to think like a hacker and safeguard your organization’s network and networking devices. Network Protocols for Security Professionals will show you how.This comprehensive guide gradually increases in complexity, taking you from the basics to advanced concepts. Starting with the structure of data network protocols, devices, and breaches, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. Once you’ve covered the basics, you’ll learn about attacks that target networks and network devices. Your learning journey will get more exciting as you perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. As you progress, you’ll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.By the end of this network security book, you’ll be well versed in network protocol security and security countermeasures to protect network protocols.

5490
E-book

Software Architecture for Busy Developers. Talk and act like a software architect in one weekend

Stéphane Eyskens

Are you a seasoned developer who likes to add value to a project beyond just writing code? Have you realized that good development practices are not enough to make a project successful, and you now want to embrace the bigger picture in the IT landscape? If so, you're ready to become a software architect; someone who can deal with any IT stakeholder as well as add value to the numerous dimensions of software development.The sheer volume of content on software architecture can be overwhelming, however. Software Architecture for Busy Developers is here to help. Written by Stéphane Eyskens, author of The Azure Cloud Native Mapbook, this book guides you through your software architecture journey in a pragmatic way using real-world scenarios. By drawing on over 20 years of consulting experience, Stéphane will help you understand the role of a software architect, without the fluff or unnecessarily complex theory.You'll begin by understanding what non-functional requirements mean and how they concretely impact target architecture. The book then covers different frameworks used across the entire enterprise landscape with the help of use cases and examples. Finally, you'll discover ways in which the cloud is becoming a game changer in the world of software architecture.By the end of this book, you'll have gained a holistic understanding of the architectural landscape, as well as more specific software architecture skills. You'll also be ready to pursue your software architecture journey on your own - and in just one weekend!

5491
E-book

Instant RaphaelJS Starter. Get to grips with RaphaelJS - a powerful cross-browser compatible vector graphics library, to create interactive 2D graphics and animations with ease

Krishna Sagar

Drawing in a browser without images has been around for a long time but it was a complex task with browser support issues. Raphael JS aims to solve all these problems with simple and clear methods to draw cross-browser compatible drawings. Imagine drawing complex dials, graphs, and meters for a dashboard, all without images, and the ability to dynamically manipulate those drawings. Creativity is the only limit with Raphael JS.Instant RaphaelJS Starter is a practical, hands-on guide that provides you with a number of clear step-by-step exercises, which will help you take advantage of the real power that is behind Raphael JS, and give you a good grounding in using it in your web pages.Instant RaphaelJS Starter looks at the HTML5 video formats available, and breaks down the mystery and confusion that surrounds which format to use. It will take you through a number of clear, practical recipes that will help you to take advantage of the new HTML5 video standard, quickly and painlessly. You will also learn how to draw your own shapes using any vector graphics editor, or by using one of the pre-defined shapes. We will also take a look at adding functionality such as DOM events, or animations, as well as how to manipulate the shapes dynamically. If you want to take advantage of imageless vector graphics for browsers using Raphael JS, then this is the book for you.You will learn everything you need to know to convert shapes and perform animations, as well as how to draw custom shapes with simple techniques using Raphael JS and use them across multiple browsers.

5492
E-book

ZBrush 4 Sculpting for Games: Beginner's Guide. Sculpt machines, environments, and creatures for your game development projects

Manuel Scherer

ZBrush is a fantastic tool for creating models for use in computer games. Using a wide range of powerful tools you can create models for vehicles, props, environments, and characters.This book makes creating game art in ZBrush fast and easy. It covers everything you need to create models of all kinds for your game projects, even if you've never used ZBrush before.Built around four complete ZBrush projects, the book gives you everything you need to sculpt props, vehicles, and creatures in ZBrush. You'll start by creating a spooky tree model, mastering the sculpting, texturing, and decoration skills that are essential for all ZBrush topics. Next you'll move to man-made objects with a sci-fi drone. Next you'll see how to sculpt monsters and other creatures, deal with cloth and other soft materials, and prepare the model to become an animated, controllable character in a game. The final project returns to machines, building a complete, detailed spaceship for use in your sci-fi games.

5493
E-book

R Deep Learning Essentials. A step-by-step guide to building deep learning models using TensorFlow, Keras, and MXNet - Second Edition

Mark Hodnett, Joshua F. Wiley

Deep learning is a powerful subset of machine learning that is very successful in domains such as computer vision and natural language processing (NLP). This second edition of R Deep Learning Essentials will open the gates for you to enter the world of neural networks by building powerful deep learning models using the R ecosystem.This book will introduce you to the basic principles of deep learning and teach you to build a neural network model from scratch. As you make your way through the book, you will explore deep learning libraries, such as Keras, MXNet, and TensorFlow, and create interesting deep learning models for a variety of tasks and problems, including structured data, computer vision, text data, anomaly detection, and recommendation systems. You’ll cover advanced topics, such as generative adversarial networks (GANs), transfer learning, and large-scale deep learning in the cloud. In the concluding chapters, you will learn about the theoretical concepts of deep learning projects, such as model optimization, overfitting, and data augmentation, together with other advanced topics.By the end of this book, you will be fully prepared and able to implement deep learning concepts in your research work or projects.

5494
E-book
5495
E-book
5496
E-book

Active Machine Learning with Python. Refine and elevate data quality over quantity with active learning

Margaux Masson-Forsythe

Building accurate machine learning models requires quality data—lots of it. However, for most teams, assembling massive datasets is time-consuming, expensive, or downright impossible. Led by Margaux Masson-Forsythe, a seasoned ML engineer and advocate for surgical data science and climate AI advancements, this hands-on guide to active machine learning demonstrates how to train robust models with just a fraction of the data using Python's powerful active learning tools.You’ll master the fundamental techniques of active learning, such as membership query synthesis, stream-based sampling, and pool-based sampling and gain insights for designing and implementing active learning algorithms with query strategy and Human-in-the-Loop frameworks. Exploring various active machine learning techniques, you’ll learn how to enhance the performance of computer vision models like image classification, object detection, and semantic segmentation and delve into a machine AL method for selecting the most informative frames for labeling large videos, addressing duplicated data. You’ll also assess the effectiveness and efficiency of active machine learning systems through performance evaluation.By the end of the book, you’ll be able to enhance your active learning projects by leveraging Python libraries, frameworks, and commonly used tools.