Publisher: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
4417
Ebook
4418
Ebook
4419
Ebook

CiviCRM Cookbook. Improve your CiviCRM capabilities with this clever cookbook. Packed with recipes and screenshots, it's the natural way to dig deeper into the software and achieve more for your nonprofit or civic sector organization

ANTHONY HORROCKS, Dave Greenberg

CiviCRM is a web-based, open source, Constituent Relationship Management (CRM) software geared toward meeting the needs of non-profit and other civic-sector organizations.Organizations realize their mission via CiviCRM through contact management, fundraising, event management, member management, mass e-mail marketing, peer-to-peer campaigns, case management, and much more.CiviCRM is localized in over 20 languages including: Chinese (Taiwan, China), Dutch, English (Australia, Canada, U.S., UK), French (France, Canada), German, Italian, Japanese, Russian, and Swedish.CiviCRM Cookbook will enhance your CiviCRM skills. It has recipes to help you use CiviCRM more efficiently, integrate it with CMSs, and also develop CiviCRM.This book begins with recipes that help save time and effort with CiviCRM. This is followed by recipes for organizing data more efficiently and managing profiles.Then you will learn authentication and authorization and managing communication with contacts.Then you will be guided on using the searching feature and preparing reports. We will then talk about integrating Drupal and CiviCRM. You will also be taught to manage events effectively. Finally, learn about CiviCampaign, Civimember, and developing CiviCRM.

4420
Ebook

Building E-Commerce Solutions with WooCommerce. Transform your WordPress website into a fully-featured e-commerce store with the power of WooCommerce - Second Edition

Robbert Ravensbergen

Building an online store is often considered to be a difficult, complex task. Using the combination of WordPress and the WooCommerce plugin, this is no longer the case. WooCommerce is the most popular e-commerce platform for WordPress and is being rapidly developed by WooThemes. It provides a strong e-commerce solution to set up your own online store in just a couple of hours.This easy and practical book will help you make the most of WooCommerce to be able to set up and run your online store yourself. Installing WooCommerce is an easy task, but this book will explain in detail all the possible settings. After that you'll be adding products, different payment methods, and shipping solutions to your store. You will then customize your store by adding themes to change the look and feel. Once your store is running, you'll learn how to use discount coupons, process your orders, look at reports, and even expand the functionality further with additional plugins.By the end of the book, you will learn everything you need to add a fully functional online store to you WordPress website and start running an online business.

4421
Ebook

Cloning Internet Applications with Ruby. Make clones of some of the best applications on the Web using the dynamic and object-oriented features of Ruby

Chang Sau Sheong

Most users on the Internet have a few favorite Internet web applications that they use often and cannot do without. These popular applications often provide essential services that we need even while we don’t fully understand its features or how they work. Ruby empowers you to develop your own clones of such applications without much ordeal. Learning how these sites work and describing how they can be implemented enables you to move to the next step of customizing them and enabling your own version of these services.This book shows the reader how to clone some of the Internet's most popular applications in Ruby by first identifying their main features, and then showing example Ruby code to replicate this functionality.While we understand that it connects us to our friends and people we want to meet up with, what is the common feature of a social network that makes it a social network? And how do these features work? This book is the answer to all these questions. It will provide a step-by-step explanation on how the application is designed and coded, and then how it is deployed to the Heroku cloud platform. This book’s main purpose is to break up popular Internet services such as TinyURL, Twitter, Flickr, and Facebook to understand what makes it tick. Then using Ruby, the book describes how a minimal set of features for these sites can be modeled, built, and deployed on the Internet.

4422
Ebook

Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes

John Paul Mueller, Rod Stephens

Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning.As you progress to the second part, you’ll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references.The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary’s reputation. Once you’ve understood hacker goals and detection techniques, you’ll learn about the ramifications of deep fakes, followed by mitigation strategies.This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You’ll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.

4423
Ebook
4424
Ebook

Edge Computing with Amazon Web Services. A practical guide to architecting secure edge cloud infrastructure with AWS

Sean Howard

The surge in connected edge devices has driven organizations to capitalize on the opportunities presented by the massive amounts of data generated by these devices. However, adapting to this landscape demands significant changes in application architectures.This book serves as your guide to edge computing fundamentals, shedding light on the constraints and risks inherent in selecting solutions within this domain. You’ll explore an extensive suite of edge computing services from AWS, gaining insights into when and how to use AWS Outposts, AWS Wavelength, AWS Local Zones, AWS Snow Family, and AWS IoT Greengrass. With detailed use cases, technical requirements, and architectural patterns, you’ll master the practical implementation of these services and see how they work in real life through step-by-step examples, using the AWS CLI and AWS Management Console. To conclude, you’ll delve into essential security and operational considerations to maximize the value delivered by AWS services.By the end of this book, you'll be ready to design powerful edge computing architectures and handle complex edge computing use cases across multiple AWS services.