Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
5521
Ebook
5522
Ebook

Architectural Visualization in Unreal Engine 5. Create photorealistic architectural interior renderings in UE5

Ludovico Palmeri

If you excel at creating beautiful architectural renderings using traditional software but want to master real-time, interactive visualizations, this book will show you how the versatile Unreal Engine 5 enables such transformations effortlessly. While UE5 is widely popular, existing online training resources can be overwhelming and often lack a focus on Architectural visualization. This comprehensive guide is for both beginners and experienced users offering a clear, end-to-end approach to creating stunning visualizations from scratch as well as managing tight deadlines, striving for photorealism, and handling typical client revisions inherent to architectural visualization.The book starts with an introduction to UE5 and its capabilities, as well as the basic concepts and principles of architectural visualization. You'll then progress to essential topics such as setting up a project, modeling and texturing 3D assets, lighting and materials, and post-processing effects. Along the way, you'll find practical tips, best practices, and hands-on exercises to develop your skills by applying what you learn.By the end of this book, you'll have acquired the skills to confidently create high-quality architectural visualizations in UE5 and become proficient in building an architectural interior scene to produce professional still images.

5523
Ebook

Pentaho Data Integration 4 Cookbook. Over 70 recipes to solve ETL problems using Pentaho Kettle

Adri?É?íÂ!°n Sergio Pulvirenti, Lance Walter, María Carina Roldán, Adrian Sergio Pulvirenti

Pentaho Data Integration (PDI, also called Kettle), one of the data integration tools leaders, is broadly used for all kind of data manipulation such as migrating data between applications or databases, exporting data from databases to flat files, data cleansing, and much more. Do you need quick solutions to the problems you face while using Kettle?Pentaho Data Integration 4 Cookbook explains Kettle features in detail through clear and practical recipes that you can quickly apply to your solutions. The recipes cover a broad range of topics including processing files, working with databases, understanding XML structures, integrating with Pentaho BI Suite, and more.Pentaho Data Integration 4 Cookbook shows you how to take advantage of all the aspects of Kettle through a set of practical recipes organized to find quick solutions to your needs. The initial chapters explain the details about working with databases, files, and XML structures. Then you will see different ways for searching data, executing and reusing jobs and transformations, and manipulating streams. Further, you will learn all the available options for integrating Kettle with other Pentaho tools.Pentaho Data Integration 4 Cookbook has plenty of recipes with easy step-by-step instructions to accomplish specific tasks. There are examples and code that are ready for adaptation to individual needs.

5524
Ebook

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Whether you’re looking to crack passwords as part of a thorough security audit or aiming to recover vital information, this book will equip you with the skills to accomplish your goals. Written by a cybersecurity expert with over fifteen years of experience in penetration testing, Ethical Password Cracking offers a thorough understanding of password protection and the correct approach to retrieving password-protected data.As you progress through the chapters, you first familiarize yourself with how credentials are stored, delving briefly into the math behind password cracking. Then, the book will take you through various tools and techniques to help you recover desired passwords before focusing on common cracking use cases, hash recovery, and cracking. Real-life examples will prompt you to explore brute-force versus dictionary-based approaches and teach you how to apply them to various types of credential storage.By the end of this book, you'll understand how passwords are protected and how to crack the most common credential types with ease.

5525
Ebook

VMware NSX Cookbook

Bayu Wibowo, Tony Sangha

This book begins with a brief introduction to VMware's NSX for vSphere Network Virtualization solutions and how to deploy and configure NSX components and features such as Logical Switching, Logical Routing, layer 2 bridging and the Edge Services Gateway. Moving on to security, the book shows you how to enable micro-segmentation through NSX Distributed Firewall and Identity Firewall and how to do service insertion via network and guest introspection. After covering all the feature configurations for single-site deployment, the focus then shifts to multi-site setups using Cross-vCenter NSX. Next, the book covers management, backing up and restoring, upgrading, and monitoring using built-in NSX features such as Flow Monitoring, Traceflow, Application Rule Manager, and Endpoint Monitoring. Towards the end, you will explore how to leverage VMware NSX REST API using various tools from Python to VMware vRealize Orchestrator.

5526
Ebook

Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Wolf Halton, Manoj Kumar Singh, Bo Weaver

Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important.Thus, you not only learn penetrating in the machine you also learn Windows privilege’s escalations. With easy to follow step-by-step instructions and support images, you will be able to quickly pen test your system and network.

5527
Ebook

BPEL PM and OSB operational management with Oracle Enterprise Manager 10g Grid Control. Manage the operational tasks for multiple BPEL and OSB environments centrally

In the SOA world, managing distributed services and service infrastructures is critical. Oracle Enterprise Manager – an all-encompassing management product – facilitates increased management capabilities for databases, application servers, and packaged applications. BPEL PM and OSB are two compelling, market leading products that are driving Service-Oriented Architecture (SOA) implementation across enterprises.There is a lack of clarity around real-world operational use cases that would help operational administrators in their day-to-day tasks. Further, the documentation available online does not provide much information on administering BPEL PM and OSB with Enterprise Manager Grid Control efficiently.This book will help you set up the framework for managing operational tasks from a central location using Oracle Enterprise Manager Grid Control in a step-by-step functional approach. You will learn to automate various operational tasks that are essential for the smooth running of Oracle SOA products in production, thus increasing the efficiency of your SOA projects.This book shows how top-drawer management capabilities from Oracle Enterprise Manager Grid Control can be used to effectively manage your Oracle SOA environment. You start by discovering one or more BPEL and OSB components centrally. The book then explains how to monitor BPEL processes and OSB services, and how to get alerts on service availability and performance problems. It covers the management of BPEL and OSB infrastructure components and how to manage their configurations in a central repository. It follows a hands-on approach, showing you how to use an automated approach for deploying BPEL processes and OSB projects.By the end of this book, you will have learned several techniques to set up a framework that will help you manage your SOA environment from a central location.

5528
Ebook

SELinux System Administration. Effectively secure your Linux systems with SELinux - Second Edition

Sven Vermeulen

Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system’s secure state across Linux distributions, helping you keep application vulnerabilities at bay. This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux’s configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux. By the end of the book you will know how SELinux works and how you can tune it to meet your needs.

5529
Ebook
5530
Ebook

Software Architecture for Busy Developers. Talk and act like a software architect in one weekend

Stéphane Eyskens

Are you a seasoned developer who likes to add value to a project beyond just writing code? Have you realized that good development practices are not enough to make a project successful, and you now want to embrace the bigger picture in the IT landscape? If so, you're ready to become a software architect; someone who can deal with any IT stakeholder as well as add value to the numerous dimensions of software development.The sheer volume of content on software architecture can be overwhelming, however. Software Architecture for Busy Developers is here to help. Written by Stéphane Eyskens, author of The Azure Cloud Native Mapbook, this book guides you through your software architecture journey in a pragmatic way using real-world scenarios. By drawing on over 20 years of consulting experience, Stéphane will help you understand the role of a software architect, without the fluff or unnecessarily complex theory.You'll begin by understanding what non-functional requirements mean and how they concretely impact target architecture. The book then covers different frameworks used across the entire enterprise landscape with the help of use cases and examples. Finally, you'll discover ways in which the cloud is becoming a game changer in the world of software architecture.By the end of this book, you'll have gained a holistic understanding of the architectural landscape, as well as more specific software architecture skills. You'll also be ready to pursue your software architecture journey on your own - and in just one weekend!

5531
Ebook

Instant RaphaelJS Starter. Get to grips with RaphaelJS - a powerful cross-browser compatible vector graphics library, to create interactive 2D graphics and animations with ease

Krishna Sagar

Drawing in a browser without images has been around for a long time but it was a complex task with browser support issues. Raphael JS aims to solve all these problems with simple and clear methods to draw cross-browser compatible drawings. Imagine drawing complex dials, graphs, and meters for a dashboard, all without images, and the ability to dynamically manipulate those drawings. Creativity is the only limit with Raphael JS.Instant RaphaelJS Starter is a practical, hands-on guide that provides you with a number of clear step-by-step exercises, which will help you take advantage of the real power that is behind Raphael JS, and give you a good grounding in using it in your web pages.Instant RaphaelJS Starter looks at the HTML5 video formats available, and breaks down the mystery and confusion that surrounds which format to use. It will take you through a number of clear, practical recipes that will help you to take advantage of the new HTML5 video standard, quickly and painlessly. You will also learn how to draw your own shapes using any vector graphics editor, or by using one of the pre-defined shapes. We will also take a look at adding functionality such as DOM events, or animations, as well as how to manipulate the shapes dynamically. If you want to take advantage of imageless vector graphics for browsers using Raphael JS, then this is the book for you.You will learn everything you need to know to convert shapes and perform animations, as well as how to draw custom shapes with simple techniques using Raphael JS and use them across multiple browsers.

5532
Ebook

Flux Architecture. Design and Build Modern JavaScript Web Applications

Adam Boduch

Whilst React has become Facebook’s poster-child for clean, complex, and modern web development, it has quietly been underpinned by its simplicity. It’s just a view. The real beauty in React is actually the architectural pattern that handles data in and out of React applications: Flux. With Flux, you’re able to build data-rich applications that engage your users, and scale to meet every demand. It is a key part of the Facebook technology stack that serves billions of users every day.This book will start by introducing the Flux pattern and help you get an understanding of what it is and how it works. After this, we’ll build real-world React applications that highlight the power and simplicity of Flux in action. Finally, we look at the landscape of Flux and explore the Alt and Redux libraries that make React and Flux developments easier.Filled with fully-worked examples and code-first explanations, by the end of the book, you'll not only have a rock solid understanding of the architecture, but will be ready to implement Flux architecture in anger.

5533
Ebook

R Deep Learning Essentials. A step-by-step guide to building deep learning models using TensorFlow, Keras, and MXNet - Second Edition

Mark Hodnett, Joshua F. Wiley

Deep learning is a powerful subset of machine learning that is very successful in domains such as computer vision and natural language processing (NLP). This second edition of R Deep Learning Essentials will open the gates for you to enter the world of neural networks by building powerful deep learning models using the R ecosystem.This book will introduce you to the basic principles of deep learning and teach you to build a neural network model from scratch. As you make your way through the book, you will explore deep learning libraries, such as Keras, MXNet, and TensorFlow, and create interesting deep learning models for a variety of tasks and problems, including structured data, computer vision, text data, anomaly detection, and recommendation systems. You’ll cover advanced topics, such as generative adversarial networks (GANs), transfer learning, and large-scale deep learning in the cloud. In the concluding chapters, you will learn about the theoretical concepts of deep learning projects, such as model optimization, overfitting, and data augmentation, together with other advanced topics.By the end of this book, you will be fully prepared and able to implement deep learning concepts in your research work or projects.

5534
Ebook
5535
Ebook

Microsoft Power BI Performance Best Practices. Learn practical techniques for building high-speed Power BI solutions - Second Edition

Thomas LeBlanc, Bhavik Merchant, Kenneth Neal

In a world dominated by data, organizations heavily rely on business intelligence tools like Power BI for deriving insights and informed decision-making. Yet, as data volumes grow and user demands increase, achieving optimal performance becomes challenging. Author Thomas LeBlanc, a seasoned Business Intelligence Architect with over 30 years of IT experience, draws on his extensive expertise to guide you in overcoming challenges related to slow performance, data modeling, query optimization, visualization design, deployment, administration, integration, compliance, and security.This book covers topics ranging from architecture and data modeling to Power BI premium features, DAX formulas, and collaboration, helping you to gain a deep understanding of the Power BI architecture, design efficient data models, create efficient queries, and improve visualization performance. You’ll also learn best practices to deploy and manage Power BI solutions, integrate with other tools and systems, ensure compliance and security, and collaborate with team members.By the end of the book, you’ll have developed your knowledge and skills to design, build, and maintain high-performing, scalable, and efficient Power BI solutions to drive unparalleled business success.

5536
Ebook
5537
Ebook

Tabular Modeling with SQL Server 2016 Analysis Services Cookbook. Create better operational analytics for your users with these business solutions

Derek Wilson

SQL Server Analysis Service (SSAS) has been widely used across multiple businesses to build smart online analytical reporting solutions. It includes two different types of modeling for analysis services: Tabular and Multi Dimensional. This book covers Tabular modeling, which uses tables and relationships with a fast in-memory engine to provide state of the art compression algorithms and query performance.The book begins by quickly taking you through the concepts required to model tabular data and set up the necessary tools and services. As you learn to create tabular models using tools such as Excel and Power View, you’ll be shown various strategies to deploy your model on the server and choose a query mode (In-memory or DirectQuery) that best suits your reporting needs. You’ll also learn how to implement key and newly introduced DAX functions to create calculated columns and measures for your model data. Last but not least, you’ll be shown techniques that will help you administer and secure your BI implementation along with some widely used tips and tricks to optimize your reporting solution.By the end of this book, you’ll have gained hands-on experience with the powerful new features that have been added to Tabular models in SSAS 2016 and you’ll be able to improve user satisfaction with faster reports and analytical queries.

5538
Ebook

Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit

Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh

Penetration testing (or ethical hacking) is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats.This Learning Path starts with an in-depth explanation of what hacking and penetration testing are. You’ll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it’s exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to strengthen your defense against online attacks.By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities.This Learning Path includes content from the following Packt books:• Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez• Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al.

5539
Ebook
5540
Ebook
5541
Ebook

Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark

Glen D. Singh

The current rise in hacking and security breaches makes it more important than ever to effectively pentest your environment, ensuring endpoint protection. This book will take you through the latest version of Kali Linux and help you use various tools and techniques to efficiently deal with crucial security aspects.Through real-world examples, you’ll understand how to set up a lab and later explore core penetration testing concepts. Throughout the course of this book, you’ll get up to speed with gathering sensitive information and even discover different vulnerability assessment tools bundled in Kali Linux 2019. In later chapters, you’ll gain insights into concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections to further build on your pentesting skills. You’ll also focus on techniques such as bypassing controls, attacking the end user and maintaining persistence access through social media. Finally, this pentesting book covers best practices for performing complex penetration testing techniques in a highly secured environment.By the end of this book, you’ll be able to use Kali Linux to detect vulnerabilities and secure your system by applying penetration testing techniques of varying complexity.

5542
Ebook

AutoCAD 2025 Best Practices, Tips, and Techniques. Boost productivity with interface tips, dynamic blocks, annotations, customizations, and more

Jeanne Aarhus

Learning AutoCAD can be overwhelming, and even years of experience might not uncover all that it has to offer. Internationally renowned CAD expert Jeanne Aarhus condenses her extensive experience of over 35 years into many manageable AutoCAD tips and techniques in this guide. Through engaging, easy-to-follow exercise illustrated with real-world examples, you’ll uncover insider knowledge to master AutoCAD’s features.This book provides insights into interface navigation, keyboard shortcuts, blocks, layers, annotation, dimensions, tables, and hidden commands that can significantly streamline your workflow. No matter your experience level, you’ll learn how to make AutoCAD work for you, not the other way around. You’ll also be able to leverage system variables that can affect how your AutoCAD responds. Aarhus guides you through specific commands and best practices to improve your understanding of AutoCAD’s features, helping you standardize your environment, with practical suggestions and customizations.By the end of this book, you’ll have transformed your daily use of AutoCAD with practical advice to apply new methods to improve your productivity.

5543
Ebook
5544
Ebook

AWS Certified DevOps Engineer - Professional Certification and Beyond. Pass the DOP-C01 exam and prepare for the real world using case studies and real-life examples

Adam Book

The AWS Certified DevOps Engineer certification is one of the highest AWS credentials, vastly recognized in cloud computing or software development industries. This book is an extensive guide to helping you strengthen your DevOps skills as you work with your AWS workloads on a day-to-day basis.You'll begin by learning how to create and deploy a workload using the AWS code suite of tools, and then move on to adding monitoring and fault tolerance to your workload. You'll explore enterprise scenarios that'll help you to understand various AWS tools and services. This book is packed with detailed explanations of essential concepts to help you get to grips with the domains needed to pass the DevOps professional exam. As you advance, you'll delve into AWS with the help of hands-on examples and practice questions to gain a holistic understanding of the services covered in the AWS DevOps professional exam. Throughout the book, you'll find real-world scenarios that you can easily incorporate in your daily activities when working with AWS, making you a valuable asset for any organization.By the end of this AWS certification book, you'll have gained the knowledge needed to pass the AWS Certified DevOps Engineer exam, and be able to implement different techniques for delivering each service in real-world scenarios.