Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
4617
Ebook

Digital Marketing with Drupal. The ultimate guide to build and deploy a complete digital marketing platform on top of Drupal

José Fernandes, Dries Buytaert

Drupal is an open-source platform for building ambitious digital experiences. With this practical guide to digital marketing, developers working with Drupal will be able to put their knowledge to work and boost the performance of their online marketing campaigns.Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this book will take you through the most popular digital marketing techniques and how to apply them, including content marketing, email marketing, social media marketing, SEO, SEM, CRM, and marketing automation, and the latest developments in website personalization and AI marketing. Once you've learned the fundamentals of digital marketing, you'll see how to apply them to your Drupal website or online store. In addition, you'll discover how Drupal can help you better manage your tasks and automate some of them. The book will help you discover the free modules available, how to use them, and how to integrate Drupal with external marketing-related platforms and services.By the end of this Drupal digital marketing book, you'll be able to build and deploy a complete digital marketing platform on top of Drupal to reach a greater audience and achieve online success.

4618
Ebook

Intelligent Document Capture with Ephesoft. Learn to use open source software to automate the processing of scanned and digital documents to save time, save money, and improve accuracy with this book and

Clifford Laurin, Michael Muller, Ike Kavas, Pat Myers, ...

Ephesoft is an open source document capture solution. Everyone talks about the paperless work place but the reality is that paper still exists and will continue to be part of your business. Capturing the document's content using Ephesoft can minimize the time your company spends reviewing and processing physical documents.Intelligent Document Capture with Ephesoft teaches you about document capture in general and implementation of document capture using Ephesoft. Start by learning about document capture, the history of document capture, and intelligent document capture. Progress to a tour of Ephesoft's key features, including operator and administrator interfaces and then learn to configure Ephesoft to process your business's specific document types and extract content from those documents. Finally, learn advanced customization techniques that make Ephesoft accommodate your unique business needs.Intelligent Document Capture with Ephesoft will teach you to optimize the processing of your physical document, saving your company time and money.

4619
Ebook
4620
Ebook

iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

Gianluca Tiepolo

Professionals working in the mobile forensics industry will be able to put their knowledge to work with this practical guide to learning how to extract and analyze all available data from an iOS device.This book is a comprehensive, how-to guide that leads investigators through the process of collecting mobile devices and preserving, extracting, and analyzing data, as well as building a report. Complete with step-by-step explanations of essential concepts, practical examples, and self-assessment questions, this book starts by covering the fundamentals of mobile forensics and how to overcome challenges in extracting data from iOS devices. Once you've walked through the basics of iOS, you’ll learn how to use commercial tools to extract and process data and manually search for artifacts stored in database files. Next, you'll find out the correct workflows for handling iOS devices and understand how to extract valuable information to track device usage. You’ll also get to grips with analyzing key artifacts, such as browser history, the pattern of life data, location data, and social network forensics.By the end of this book, you'll be able to establish a proper workflow for handling iOS devices, extracting all available data, and analyzing it to gather precious insights that can be reported as prosecutable evidence.

4621
Ebook
4622
Audiobook

Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes

John Paul Mueller, Rod Stephens

Businesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this audiobook will explore these processes in more depth, which will help you in understanding the role security plays in machine learning.As you progress to the second part, you’ll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references.The next part of the audiobook will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary’s reputation. Once you’ve understood hacker goals and detection techniques, you’ll learn about the ramifications of deep fakes, followed by mitigation strategies.This audiobook also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You’ll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks.By the end of this machine learning audiobook, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively.

4623
Ebook

App Inventor 2 Essentials. A step-by-step introductory guide to mobile app development with App Inventor 2

Felicia Kamriani, Krishnendu Roy

App Inventor 2 will take you on a journey of mobile app development. We begin by introducing you to the functionalities of App Inventor and giving you an idea about the types of apps you can develop using it. We walk you through the technical set up so you can take advantage of the interactive development environment (live testing). You will get hands-on, practical experience building three different apps using tutorials. Along the way, you will learn computer science principles as well as tips to help you prepare for the creative process of building an app from scratch. By the end of the journey, you will learn how to package an app and deploy it to app markets. App Inventor 2 Essentials prepares you to amass a resource of skills, knowledge and experience to become a mobile app developer

4624
Ebook

Moodle 3 Administration. An administrator’s guide to configuring, securing, customizing, and extending Moodle - Third Edition

Alex Büchner

Moodle is the de facto standard for open source learning platforms. However, setting up and managing a learning environment can be a complex task since it covers a wide range of technical, organizational, and pedagogical topics. This ranges from basic user and course management, to configuring plugins and design elements, all the way to system settings, performance optimization, events frameworks, and so on.This book concentrates on basic tasks such as how to set up and configure Moodle and how to perform day-to-day administration activities, and progresses on to more advanced topics that show you how to customize and extend Moodle, manage courses, cohorts, and users, and how to work with roles and capabilities. You’ll learn to configure Moodle plugins and ensure your VLE conforms to pedagogical and technical requirements in your organization. You’ll then learn how to integrate the VLE via web services and network it with other sites, including Mahara, and extend your system via plugins and LTI. By the end of this book, you will be able to set up an efficient, fully fledged, and secure Moodle system.