Verleger: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
3921
E-book

GNS3 Network Simulation Guide. From installation through to creating large scale simulations, this is the complete guide to GNS3 that will give you the know-how needed for Cisco certification. For networking professionals, it's a career-advancing tutorial

GNS3, Christopher J Welsh (USD)

GNS3 is an open-source Graphical Network Simulator used extensively by networking professionals to simulate networking devices such as Cisco, Juniper and Vyatta routers, along with Virtual PCs.GNS3 Network Simulation Guide gives you all the information you need to run a successful GNS3 simulation. You will be guided through the tricky installation pre-requisites and procedures involved in developing a simulated topology suitable for studying for Cisco CCIE Certification. We will also cover many useful tips and tricks which will help you make the most of your GNS3 simulator application.You will begin the GNS3 journey by ensuring that you have prepared your computer with any additional files required by GNS3, to set up the simulated environment needed for a successful installation process.Once GNS3 is installed, you will get to work creating a successful simulation including routers, Ethernet switches, Virtual PCs, and capture packets using Wireshark. Next, you will learn how to master GNS3's Graphical User Interface as well as the Command Console. The inner workings of GNS3 are described in depth so that you gain an appreciation of how UDP tunnels are used to tie the many components of GNS3 together.By following the clear examples and exercises in this guide, you will learn everything that you need to know about how to use GNS3 to prepare for certifications, as well as simulate real-world network scenarios.

3922
E-book
3923
E-book

Taking SketchUp Pro to the Next Level. Go beyond the basics and develop custom 3D modeling workflows to become a SketchUp ninja

Aaron Dietzen aka 'The SketchUp Guy'

Anyone who’s worked with it will know that SketchUp is the quickest and easiest way to create 3D models. While its approachable interface makes it super easy to learn, this book will show you how the extremely capable SketchUp software can take you far beyond what you may have initially thought possible. Get ready to level up from a basic user to becoming a SketchUp ninja!Each chapter will take you through the capabilities of SketchUp, challenging you to use tools in innovative ways. This includes organizing your model, modifying native commands, customizing your interface, utilizing inferencing, and much more. Additionally, you’ll learn about the extensions that can be added to SketchUp to supplement the tools you have been using, allowing you to make your 3D modeling process quicker, easier, and more powerful.By the end of this SketchUp book, you’ll have an enhanced understanding of how to use the impressive range of tools and be on your way to customizing SketchUp for your one-of-a-kind workflow.

3924
E-book
3925
E-book

Getting Started with Greenplum for Big Data Analytics. A hands-on guide on how to execute an analytics project from conceptualization to operationalization using Greenplum

Sunila Gollapudi

Organizations are leveraging the use of data and analytics to gain a competitive advantage over their opposition. Therefore, organizations are quickly becoming more and more data driven. With the advent of Big Data, existing Data Warehousing and Business Intelligence solutions are becoming obsolete, and a requisite for new agile platforms consisting of all the aspects of Big Data has become inevitable. From loading/integrating data to presenting analytical visualizations and reports, the new Big Data platforms like Greenplum do it all. It is now the mindset of the user that requires a tuning to put the solutions to work.Getting Started with Greenplum for Big Data Analytics is a practical, hands-on guide to learning and implementing Big Data Analytics using the Greenplum Integrated Analytics Platform. From processing structured and unstructured data to presenting the results/insights to key business stakeholders, this book explains it all.Getting Started with Greenplum for Big Data Analytics discusses the key characteristics of Big Data and its impact on current Data Warehousing platforms. It will take you through the standard Data Science project lifecycle and will lay down the key requirements for an integrated analytics platform. It then explores the various software and appliance components of Greenplum and discusses the relevance of each component at every level in the Data Science lifecycle.You will also learn Big Data architectural patterns and recap some key advanced analytics techniques in detail. The book will also take a look at programming with R and integration with Greenplum for implementing analytics. Additionally, you will explore MADlib and advanced SQL techniques in Greenplum for analytics. This book also elaborates on the physical architecture aspects of Greenplum with guidance on handling high-availability, back-up, and recovery.

3926
E-book

Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices

Joseph MacMillan

Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security.By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.

3927
E-book
3928
E-book