Verleger: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
3705
E-book

Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python

Preston Miller, Chapin Bryce

This book will illustrate how and why you should learn Python to strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials. The tutorials use an interactive design, giving you experience of the development process so you gain a better understanding of what it means to be a forensic developer.Each chapter walks you through a forensic artifact and one or more methods to analyze the evidence. It also provides reasons why one method may be advantageous over another. We cover common digital forensics and incident response scenarios, with scripts that can be used to tackle case work in the field. Using built-in and community-sourced libraries, you will improve your problem solving skills with the addition of the Python scripting language. In addition, we provide resources for further exploration of each script so you can understand what further purposes Python can serve. With this knowledge, you can rapidly develop and deploy solutions to identify critical information and fine-tune your skill set as an examiner.

3706
E-book

User Training for Busy Programmers. Develop effective software training classes quickly and easily

William Rice, William Rice

If you need to write a successful software training course and are unsure of how to start, then this book gets right to the point with clear, concise directions for developing an end-user software course. This step-by-step job aid walks you through the process of developing a successful, instructor-led software class. There are many good books on training theory. This book takes a more practical, condensed approach for when you don't have time to learn training theory. It is based on fifteen years of technical writing and training experience. In under 100 pages, the book guides you through the process of developing an end-user software course using a method that is tested, proven, and based upon sound instructional theory.

3707
E-book

Event-Driven Architecture in Golang. Building complex systems with asynchronicity and eventual consistency

Michael Stack

Event-driven architecture in Golang is an approach used to develop applications that shares state changes asynchronously, internally, and externally using messages. EDA applications are better suited at handling situations that need to scale up quickly and the chances of individual component failures are less likely to bring your system crashing down. This is why EDA is a great thing to learn and this book is designed to get you started with the help of step-by-step explanations of essential concepts, practical examples, and more.You’ll begin building event-driven microservices, including patterns to handle data consistency and resiliency. Not only will you learn the patterns behind event-driven microservices but also how to communicate using asynchronous messaging with event streams. You’ll then build an application made of several microservices that communicates using both choreographed and orchestrated messaging.By the end of this book, you’ll be able to build and deploy your own event-driven microservices using asynchronous communication.

3708
E-book

Oracle SOA Suite 11g R1 Developer's Guide. Service-Oriented Architecture (SOA) is made easily accessible thanks to this comprehensive guide. With a logically structured approach, it gives you the expertise to start using the Oracle SOA suite in real-world applications

Antony Reynolds, Matt Wright, Matthew Wright

We are moving towards a standards-based Service-Oriented Architecture (SOA), where IT infrastructure is continuously adapted to keep up with the pace of business change. Oracle is at the forefront of this vision, with the Oracle SOA Suite providing the most comprehensive, proven, and integrated tool kit for building SOA-based applications.Developers and Architects using the Oracle SOA Suite, whether working on integration projects, building composite applications, or specializing in implementations of Oracle Applications, need a hands-on guide on how best to harness and apply this technology. This book will guide you on using and applying the Oracle SOA Suite to solve real-world problems, enabling you to quickly learn and master the technology and its applications.This book is a major update to Oracle SOA Suite Developer's Guide, which covered 10gR3. It is completely updated for Oracle SOA Suite 11gR1, with 40% new material, including detailed coverage of newer components, such as: the Mediator, the new Rules Editor, the Event Delivery Network, Service Data Objects, and the Meta Data Repository. There is also a complete additional chapter on advanced SOA Architecture including message delivery, transaction handling and clustering considerations.The initial section of the book provides you with a detailed hands-on tutorial to each of the core components that make up the Oracle SOA Suite. Once you are familiar with the various pieces of the SOA Suite and what they do, the next question will typically be:What is the best way to use and combine all of these different components to implement a real-world SOA solution?Answering this question is the goal of the next section. Using a working example of an online auction site (oBay), it leads you through key SOA design considerations in implementing a robust solution that is designed for change.The final section addresses non-functional considerations and covers the packaging, deployment, and testing of SOA applications. It then details how to secure and administer SOA applications.

3709
E-book

PHP and Algorithmic Thinking for the Complete Beginner. Learn to think like a programmer by mastering PHP and algorithmic thinking

Aristides Bouras

Begin your journey into PHP programming and algorithmic thinking with a structured, detailed course that takes you from understanding the basic components of a computer to mastering complex decision control and loop structures. Each chapter builds on the previous one, starting with an introduction to how computers work and gradually progressing to more complex topics like decision control structures, loop structures, arrays, and subprograms.You'll start with foundational concepts such as variables, constants, and operators, before diving into more advanced topics like manipulating strings, handling input and output, and developing complex mathematical expressions. The course emphasizes practical application, guiding you through the use of Visual Studio Code, integrated development environments, and essential software packages.By the end of this book, you will have a solid understanding of PHP programming and algorithmic thinking, enabling you to write efficient code, develop your own subprograms, and utilize various control structures and arrays effectively. This course is tailored for beginners, ensuring a smooth learning curve with tips, tricks, and exercises to reinforce your knowledge, and prepare you with the necessary skills needed to be a programmer.

3710
E-book
3711
E-book

Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit, Joseph Opacki

We’re living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that’s where this book helps.In Operationalizing Threat Intelligence, you’ll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You’ll start by finding out what threat intelligence is and where it can be applied. Next, you’ll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you’ll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you’ll examine detailed mechanisms for the production of intelligence.By the end of this book, you’ll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production.

3712
E-book

Yocto for Raspberry Pi. Create unique and amazing projects by using the powerful combination of Yocto and Raspberry Pi

TEXIER Pierre-Jean, Petter Mabäcker

The Yocto Project is a Linux Foundation workgroup, which produces tools (SDK) and processes (configuration, compilation, installation) that will enable the creation of Linux distributions for embedded software, independent of the architecture of embedded software (Raspberry Pi, i.MX6, and so on). It is a powerful build system that allows you to master your personal or professional development.This book presents you with the configuration of the Yocto Framework for the Raspberry Pi, allowing you to create amazing and innovative projects using the Yocto/OpenEmbedded eco-system. It starts with the basic introduction of Yocto's build system, and takes you through the setup and deployment steps for Yocto. It then helps you to develop an understanding of Bitbake (the task scheduler), and learn how to create a basic recipe through a GPIO application example. You can then explore the different types of Yocto recipe elements (LICENSE, FILES, SRC_URI, and so on). Next, you will learn how to customize existing recipes in Yocto/OE layers and add layers to your custom environment (qt5 for example).