Видавець: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
3809
Eлектронна книга

Microsoft Identity Manager 2016 Handbook. A complete handbook on Microsoft Identity Manager 2016 – from design considerations to operational best practices

David Steadman, Jeff Ingalls

Microsoft Identity Manager 2016 is Microsoft’s solution to identity management. When fully installed, the product utilizes SQL, SharePoint, IIS, web services, the .NET Framework, and SCSM to name a few, allowing it to be customized to meet nearly every business requirement. The book is divided into 15 chapters and begins with an overview of the product, what it does, and what it does not do. To better understand the concepts in MIM, we introduce a fictitious company and their problems and goals, then build an identity solutions to fit those goals. Over the course of this book, we cover topics such as MIM installation and configuration, user and group management options, self-service solutions, role-based access control, reducing security threats, and finally operational troubleshooting and best practices.By the end of this book, you will have gained the necessary skills to deploy, manage and operate Microsoft Identity Manager 2016 to meet your business requirements and solve real-world customer problems.

3810
Eлектронна книга

JBoss AS 7 Development. Learn from an expert and master JBoss Application Server through this brilliantly accessible book. It irons out the difficulties and covers creating, debugging, and securing Java EE applications. The only manual you need. - Second Edition

Francesco Marchioni

JBoss Application Server meets high standards of reliability, efficiency, and robustness, and is used to build powerful and secure Java EE applications. It supports the most important areas of Java Enterprise programming including EJB 3.1, Contexts and Dependency Injection, JAX-WS and JAX-RS web services, the security framework, and more. Getting started with JBoss application server development can be challenging; however, with the right approach and guidance, you can easily master it and this book promises that.Written in an easy-to-read style, this book will take you from the basics of JBoss AS—such as installing core components and plugins—to the skills that will make you a JBoss developer to be reckoned with, covering advanced topics such as developing applications with the JBoss messaging service, JBoss web services, clustered applications, and more.You will learn the necessary steps to install a suitable environment for developing enterprise applications on JBoss AS. You will also learn how to design Enterprise applications using Eclipse, JBoss plugins, and Maven to build and deploy your applications. Readers will learn how to enable distributed communication using JMS. Storing and retrieving objects will be made easier using the Java Persistence API. The core section of the book will take you into the programming arena with tested, real-world examples. The example programs have been carefully crafted to be easy to understand and useful as starting points for your applications.This practical guide will show you how to gain hands-on experience rapidly on Java EE development using JBoss AS with easy-to-understand and practical programming examples.

3811
Eлектронна книга

Jumpstart Logic Pro 10.6. Create professional music with Apple’s flagship digital audio workstation app

Jay Asher

Logic Pro is Apple’s flagship application for music creation, found in many professional music studios across the globe. It is a powerful digital audio workstation that comes with all the software tools that you need to create music that sounds great. In the previous version, Logic Pro 10.5, Apple had added impressive features to what was already a full package of tools, loops, FX plug-ins, and software instruments.Providing a comprehensive introduction if you’re new to Mac computer music creation, this practical guide will show you how to use Logic Pro and have you up to speed in no time.You’ll not only understand what Apple’s Logic Pro software can do but also get hands-on with using it to accomplish various musical tasks. The book starts by getting you up and running with the basic terminologies. As you progress, you’ll explore how to create audio and MIDI musical parts. To build on your knowledge further, the book will guide you through developing an automated mix. In addition to this, you’ll learn how to bounce mixes and audio files for distribution.By the end of this book, you’ll be well-versed with Logic Pro and have the skills you need to create professional-quality music.

3812
Eлектронна книга

SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features

Sven Vermeulen

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security measure.SELinux System Administration covers the majority of SELinux features through a mix of real-life scenarios, descriptions, and examples. Everything an administrator needs to further tune SELinux to suit their needs are present in this book.This book touches on various SELinux topics, guiding you through the configuration of SELinux contexts, definitions, and the assignment of SELinux roles, and finishes up with policy enhancements. All of SELinux's configuration handles, be they conditional policies, constraints, policy types, or audit capabilities, are covered in this book with genuine examples that administrators might come across.By the end, SELinux System Administration will have taught you how to configure your Linux system to be more secure, powered by a formidable mandatory access control.

3813
Eлектронна книга
3814
Eлектронна книга

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips you with the skills to secure AI technologies, moving beyond research hype or business-as-usual activities. Learn how to defend AI and LLM systems against manipulation and intrusion through adversarial attacks such as poisoning, trojan horses, and model extraction, leveraging DevSecOps, MLOps, and other methods to secure systems.This strategy-based book is a comprehensive guide to AI security, combining structured frameworks with practical examples to help you identify and counter adversarial attacks. Part 1 introduces the foundations of AI and adversarial attacks. Parts 2, 3, and 4 cover key attack types, showing how each is performed and how to defend against them. Part 5 presents secure-by-design AI strategies, including threat modeling, MLSecOps, and guidance aligned with OWASP and NIST. The book concludes with a blueprint for maturing enterprise AI security based on NIST pillars, addressing ethics and safety under Trustworthy AI.By the end of this book, you’ll be able to develop, deploy, and secure AI systems against the threat of adversarial attacks effectively.

3815
Eлектронна книга

ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification

Shobhit Mehta, Vikas Yadav

For beginners and experienced IT risk professionals alike, acing the ISACA CRISC exam is no mean feat, and the application of this advanced skillset in your daily work poses a challenge. The ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is a comprehensive guide to CRISC certification and beyond that’ll help you to approach these daunting challenges with its step-by-step coverage of all aspects of the exam content and develop a highly sought-after skillset in the process.This book is divided into six sections, with each section equipped with everything you need to get to grips with the domains covered in the exam. There’ll be no surprises on exam day – from GRC to ethical risk management, third-party security concerns to the ins and outs of control design, and IDS/IPS to the SDLC, no stone is left unturned in this book’s systematic design covering all the topics so that you can sit for the exam with confidence. What’s more, there are chapter-end self-assessment questions for you to test all that you’ve learned, as well as two book-end practice quizzes to really give you a leg up.By the end of this CRISC exam study guide, you’ll not just have what it takes to breeze through the certification process, but will also be equipped with an invaluable resource to accompany you on your career path.

3816
Eлектронна книга

SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM

Joe Dissmeyer, Joseph Dissmeyer

Orion Network Performance Monitor is a scalable, easy-to-use, cost-effective network monitoring system that provides a complete overview of network environments by monitoring performance and availability. Orion NPM enables you to be proactive in detecting, diagnosing, and resolving network issues and outages and has the benefit of supporting hundreds of types of server, OS, and network vendors including Cisco, HP, Microsoft, Linux, Motorola, Brocade, Foundry, and more.Orion NPM is a well-known product and is used by thousands of public and private companies, educational institutions, and government entities for network monitoring. In SolarWinds Orion Network Performance Monitor you will learn how to install, implement, and manage Orion NPM to ensure you maintain an efficient, healthy, and performant network.In this book you will start with an overview of the constituent features of Orion NPM. Leading you through installation and configuration this book will help you set up a flexible and dynamic monitoring solution.With Orion NPM in place the book will then take you on a journey through essential Orion NPM and network monitoring concepts and practices. You will cover device management, learning how to use the Network Sonar Wizard, as well as adding devices manually.Turning from novice to pro, you will then be introduced to the core of network monitoring with Orion NPM. You will learn about monitoring Windows and Linux solutions as well as Virtual Servers. You will then master wireless networks and virtual networks. You will then learn how to set up and edit alerts to make network monitoring more efficient and less time-consuming. You will also learn how to develop reports and network maps as well as essential administrative techniques.