Verleger: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
953
E-book

Alexa Skills Projects. Build exciting projects with Amazon Alexa and integrate it with Internet of Things

Madhur Bhargava

Amazon Echo is a smart speaker developed by Amazon, which connects to Amazon’s Alexa Voice Service and is entirely controlled by voice commands. Amazon Echo is currently being used for a variety of purposes such as home automation, asking generic queries, and even ordering a cab or pizza.Alexa Skills Projects starts with a basic introduction to Amazon Alexa and Echo. You will then deep dive into Alexa Programmingconcepts such as Intents, Slots, Lambdas and maintaining your skill’s state using DynamoDB. You will get a clear understanding of how some of the most popular Alexa Skills work, and gain experience of working with real-world Amazon Echo applications. In the concluding chapters, you will explore the future of voice-enabled applications and their coverage with respect to the Internet of Things.By the end of the book, you will have learned to design Alexa Skills for specific purposes and interact with Amazon Echo to execute these skills.

954
E-book

Working with Odoo 10. One stop guide for your enterprise needs - Second Edition

Greg Moss

Para 1: Take full advantage of the benefits of the Odoo module ecosystem whilst learning how to modernise your business with Working with Odoo 10. Covering everything from Odoo development essentials through to CRM and analytic accounting, this guide is a must-have for Odoo beginners. Para 2: A powerful set of open source enterprise management applications, Odoo 10 gives you access to a website builder, integrated e-commerce features, and a fast-growing community to allow you to transform your business. Para 3: With this Odoo book you?ll learn how to set up Odoo online, configure basic company settings, and then explore CRM in Odoo. You?ll cover all the Odoo development essentials and much more, including purchasing application, ERP systems, analytic accounting, and other recent Odoo features. Para 4: What?s Inside ? Understand Odoo installation & the basics of implementing Odoo in your business ? Explore accounting & finance setup and modules to help business efficiency ? Build a website with Odoo ? Customise and configure Odoo to an advanced level

955
E-book

R Data Analysis Projects. Build end to end analytics systems to get deeper insights from your data

Gopi Subramanian

R offers a large variety of packages and libraries for fast and accurate data analysis and visualization. As a result, it’s one of the most popularly used languages by data scientists and analysts, or anyone who wants to perform data analysis. This book will demonstrate how you can put to use your existing knowledge of data analysis in R to build highly efficient, end-to-end data analysis pipelines without any hassle.You’ll start by building a content-based recommendation system, followed by building a project on sentiment analysis with tweets. You’ll implement time-series modeling for anomaly detection, and understand cluster analysis of streaming data. You’ll work through projects on performing efficient market data research, building recommendation systems, and analyzing networks accurately, all provided with easy to follow codes. With the help of these real-world projects, you’ll get a better understanding of the challenges faced when building data analysis pipelines, and see how you can overcome them without compromising on the efficiency or accuracy of your systems. The book covers some popularly used R packages such as dplyr, ggplot2, RShiny, and others, and includes tips on using them effectively.By the end of this book, you’ll have a better understanding of data analysis with R, and be able to put your knowledge to practical use without any hassle.

956
E-book

Zabbix 4 Network Monitoring. Monitor the performance of your network devices and applications using the all-new Zabbix 4.0 - Third Edition

Patrik Uytterhoeven, Rihards Olups

Zabbix 4 Network Monitoring is the perfect starting point for monitoring the performance of your network devices and applications with Zabbix. Even if you’ve never used a monitoring solution before, this book will get you up and running quickly. You’ll learn to monitor more sophisticated operations with ease and soon feel in complete control of your network, ready to meet any challenges you might face.Starting with the installation, you will discover the new features in Zabbix 4.0. You will then get to grips with native Zabbix agents and Simple Network Management Protocol (SNMP) devices. You will also explore Zabbix's integrated functionality for monitoring Java application servers and VMware. This book also covers notifications, permission management, system maintenance, and troubleshooting, so you can be confident that every potential challenge and task is under your control. If you're working with larger environments, you'll also be able to find out more about distributed data collection using Zabbix proxies. Once you're confident and ready to put these concepts into practice, you will understand how to optimize and improve performance. Troubleshooting network issues is vital for anyone working with Zabbix, so the book also helps you work through any technical snags and glitches you might face.By the end of this book, you will have learned more advanced techniques to fine-tune your system and make sure it is in a healthy state.

957
E-book

Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition

Patrick Li

Jira Software is an agile project management tool that supports any agile methodology, be it scrum, Kanban, or your own unique flavour. From agile boards to reports, you can plan, track, and manage all your agile software development projects from a single tool. Jira Software brings the power of agile methodology to Atlassian Jira.This second edition of JIRA Agile Essentials, will help you dive straight into the action, exploring critical agile terminologies and concepts in the context of Jira Software. You will learn how to plan, track, and release great software. This book will teach you how to install and run Jira Software and set it up to run with Scrum and Kanban. It will also teach you to use Jira Software your way and run projects beyond the out-of-box Scrum and Kanban way, including a hybrid approach of both the methodologies and other options that come with Jira Software. Later, you will learn how to integrate it with the tools you are already using and enhance Jira with add-ons such as Confluence. You will learn to stay connected with your team from anywhere to ensure great development. Jira Software has numerous deployment options in the cloud, on your own infrastructure, or at a massive scale. You will be introduced to Bitbucket, Atlassian’s distributed version control system, which integrates seamlessly with Jira, allowing your team to work within the two applications as one harmonious environment.With this practical guide, you will develop a great working knowledge of Jira Software and your project management will become much more efficient.

958
E-book

Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition

Himanshu Sharma

Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become more important than ever to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4 / 2019), in addition to covering the core functionalities. The book will get you off to a strong start by introducing you to the installation and configuration of Kali Linux, which will help you to perform your tests. You will also learn how to plan attack strategies and perform web application exploitation using tools such as Burp and JexBoss. As you progress, you will get to grips with performing network exploitation using Metasploit, Sparta, and Wireshark. The book will also help you delve into the technique of carrying out wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Later chapters will draw focus to the wide range of tools that help in forensics investigations and incident response mechanisms. As you wrap up the concluding chapters, you will learn to create an optimum quality pentest report.By the end of this book, you will be equipped with the knowledge you need to conduct advanced penetration testing, thanks to the book’s crisp and task-oriented recipes.

959
E-book

Applied Network Security. Proven tactics to detect and defend against all kinds of network attack

Arthur Salmon, Michael McLafferty, Warun Levesque

Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.The book begins by showing you how to identify malicious network behaviour and improve your wireless security. We will teach you what network sniffing is, the various tools associated with it, and how to scan for vulnerable wireless networks. Then we’ll show you how attackers hide the payloads and bypass the victim’s antivirus. Furthermore, we’ll teach you how to spoof IP / MAC address and perform an SQL injection attack and prevent it on your website. We will create an evil twin and demonstrate how to intercept network traffic. Later, you will get familiar with Shodan and Intrusion Detection and will explore the features and tools associated with it. Toward the end, we cover tools such as Yardstick, Ubertooth, Wifi Pineapple, and Alfa used for wireless penetration testing and auditing. This book will show the tools and platform to ethically hack your own network whether it is for your business or for your personal home Wi-Fi.

960
E-book

Mastering Reverse Engineering. Re-engineer your ethical hacking skills

Reginald Wong

If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code.By the end of this book, you will have the confidence to perform reverse engineering.