Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
793
Ebook

Learn Clip Studio Paint. Create impressive comics and Manga art in world-class graphics software - Second Edition

Liz Staley

Clip Studio Paint, the successor to Manga Studio, is used by over four million illustrators and comic creators around the world. This book will guide you through every step of learning this software, from system requirements and installation, all the way through to exporting your work for print or the web. Learn how to create new documents, customize tools to fit your working style, use ruler tools to create anything from straight lines to intricate backgrounds, add 3D elements, create comic panels using the specialized panel tools, utilize screentones and materials, add text and word balloons to your comics, create sound effects, easily flat and color your comics using reference layers, and bring your drawings to life using the animation features. By the end of this book, you will be able to navigate the Clip Studio Interface and program preferences, customize the various tools, and be able to create your own black-and-white and color illustrations and comics from start to finish.

794
Ebook

Analytics for the Internet of Things (IoT). Intelligent analytics for your intelligent devices

Andrew Minteer

We start with the perplexing task of extracting value from huge amounts of barely intelligible data. The data takes a convoluted route just to be on the servers for analysis, but insights can emerge through visualization and statistical modeling techniques. You will learn to extract value from IoT big data using multiple analytic techniques. Next we review how IoT devices generate data and how the information travels over networks. You’ll get to know strategies to collect and store the data to optimize the potential for analytics, and strategies to handle data quality concerns. Cloud resources are a great match for IoT analytics, so Amazon Web Services, Microsoft Azure, and PTC ThingWorx are reviewed in detail next. Geospatial analytics is then introduced as a way to leverage location information. Combining IoT data with environmental data is also discussed as a way to enhance predictive capability. We’ll also review the economics of IoT analytics and you’ll discover ways to optimize business value.By the end of the book, you’ll know how to handle scale for both data storage and analytics, how Apache Spark can be leveraged to handle scalability, and how R and Python can be used for analytic modeling.

795
Ebook

IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices

Aaron Guzman, Aditya Gupta

IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market, but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices.This book follows a recipe-based approach, giving you practical experience in securing upcoming smart devices. It starts with practical recipes on how to analyze IoT device architectures and identify vulnerabilities. Then, it focuses on enhancing your pentesting skill set, teaching you how to exploit a vulnerable IoT device, along with identifying vulnerabilities in IoT device firmware. Next, this book teaches you how to secure embedded devices and exploit smart devices with hardware techniques. Moving forward, this book reveals advanced hardware pentesting techniques, along with software-defined, radio-based IoT pentesting with Zigbee and Z-Wave. Finally, this book also covers how to use new and unique pentesting techniques for different IoT devices, along with smart devices connected to the cloud.By the end of this book, you will have a fair understanding of how to use different pentesting techniques to exploit and secure various IoT devices.

796
Ebook

Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack

Prashant Priyam

Security issues are still a major concern forall IT organizations. For many enterprises,the move to cloud computing has raisedconcerns for security, but when applicationsare architected with focus on security,cloud platforms can be made just as secureas on-premises platforms. Cloud instancescan be kept secure by employing securityautomation that helps make your data meetyour organization's security policy.This book starts with the basics of whycloud security is important and howautomation can be the most effective wayof controlling cloud security. You willthen delve deeper into the AWS cloudenvironment and its security servicesby dealing with security functions suchas Identity and Access Managementand will also learn how these servicescan be automated. Moving forward,you will come across aspects suchas cloud storage and data security, automatingcloud deployments, and so on. Then,you'll work with OpenStack security modulesand learn how private cloud securityfunctions can be automated for bettertime- and cost-effectiveness. Toward the endof the book, you will gain an understandingof the security compliance requirementsfor your Cloud.By the end of this book, you will havehands-on experience of automating yourcloud security and governance.

797
Ebook

Hands-On Business Intelligence with Qlik Sense. Implement self-service data analytics with insights and guidance from Qlik Sense experts

Pablo Labbe, Clever Anjos, Kaushik Solanki, Jerry DiMaso

Qlik Sense allows you to explore simple-to-complex data to reveal hidden insights and data relationships to make business-driven decisions.Hands-On Business Intelligence with Qlik Sense begins by helping you get to grips with underlying Qlik concepts and gives you an overview of all Qlik Sense’s features. You will learn advanced modeling techniques and learn how to analyze the data loaded using a variety of visualization objects. You’ll also be trained on how to share apps through Qlik Sense Enterprise and Qlik Sense Cloud and how to perform aggregation with AGGR. As you progress through the chapters, you’ll explore the stories feature to create data-driven presentations and update an existing story. This book will guide you through the GeoAnalytics feature with the geo-mapping object and GeoAnalytics connector. Furthermore, you’ll learn about the self-service analytics features and perform data forecasting using advanced analytics. Lastly, you’ll deploy Qlik Sense apps for mobile and tablet. By the end of this book, you will be well-equipped to run successful business intelligence applications using Qlik Sense's functionality, data modeling techniques, and visualization best practices.

798
Ebook

Ceph: Designing and Implementing Scalable Storage Systems. Design, implement, and manage software-defined storage solutions that provide excellent performance

Michael Hackett, Vikhyat Umrao, Karan Singh, Nick Fisk, ...

This Learning Path takes you through the basics of Ceph all the way to gaining in-depth understanding of its advanced features. You’ll gather skills to plan, deploy, and manage your Ceph cluster. After an introduction to the Ceph architecture and its core projects, you’ll be able to set up a Ceph cluster and learn how to monitor its health, improve its performance, and troubleshoot any issues. By following the step-by-step approach of this Learning Path, you’ll learn how Ceph integrates with OpenStack, Glance, Manila, Swift, and Cinder. With knowledge of federated architecture and CephFS, you’ll use Calamari and VSM to monitor the Ceph environment. In the upcoming chapters, you’ll study the key areas of Ceph, including BlueStore, erasure coding, and cache tiering. More specifically, you’ll discover what they can do for your storage system. In the concluding chapters, you will develop applications that use Librados and distributed computations with shared object classes, and see how Ceph and its supporting infrastructure can be optimized. By the end of this Learning Path, you'll have the practical knowledge of operating Ceph in a production environment.This Learning Path includes content from the following Packt products:• Ceph Cookbook by Michael Hackett, Vikhyat Umrao and Karan Singh• Mastering Ceph by Nick Fisk• Learning Ceph, Second Edition by Anthony D'Atri, Vaibhav Bhembre and Karan Singh

799
Ebook

Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications

Carlos A. Lozano, Dhruv Shah, Riyaz Ahemed Walikar

Burp suite is a set of graphic tools focused towards penetration testing of web applications. Burp suite is widely used for web penetration testing by many security professionals for performing different web-level security tasks.The book starts by setting up the environment to begin an application penetration test. You will be able to configure the client and apply target whitelisting. You will also learn to setup and configure Android and IOS devices to work with Burp Suite. The book will explain how various features of Burp Suite can be used to detect various vulnerabilities as part of an application penetration test. Once detection is completed and the vulnerability is confirmed, you will be able to exploit a detected vulnerability using Burp Suite. The book will also covers advanced concepts like writing extensions and macros for Burp suite. Finally, you will discover various steps that are taken to identify the target, discover weaknesses in the authentication mechanism, and finally break the authentication implementation to gain access to the administrative console of the application.By the end of this book, you will be able to effectively perform end-to-end penetration testing with Burp Suite.

800
Ebook

Professional SQL Server High Availability and Disaster Recovery. Implement tried-and-true high availability and disaster recovery solutions with SQL Server

Ahmad Osama

Professional SQL Server High Availability and Disaster Recovery explains the high availability and disaster recovery technologies available in SQL Server: Replication, AlwaysOn, and Log Shipping. You’ll learn what they are, how to monitor them, and how to troubleshoot any related problems. You will be introduced to the availability groups of AlwaysOn and learn how to configure them to extend your database mirroring. Through this book, you will be able to explore the technical implementations of high availability and disaster recovery technologies that you can use when you create a highly available infrastructure, including hybrid topologies. Note that this course does not cover SQL Server Failover Cluster Installation with shared storage.By the end of the book, you’ll be equipped with all that you need to know to develop robust and high performance infrastructure.