Publisher: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
4953
Ebook

Introduction to Algorithms. A Comprehensive Guide for Beginners: Unlocking Computational Thinking

Cuantum Technologies LLC

Begin your journey into the fascinating world of algorithms with this comprehensive course. Starting with an introduction to the basics, you will learn about pseudocode and flowcharts, the fundamental tools for representing algorithms. As you progress, you'll delve into the efficiency of algorithms, understanding how to evaluate and optimize them for better performance. The course will also cover various basic algorithm types, providing a solid foundation for further exploration.You will explore specific categories of algorithms, including search and sort algorithms, which are crucial for managing and retrieving data efficiently. You will also learn about graph algorithms, which are essential for solving problems related to networks and relationships. Additionally, the course will introduce you to the data structures commonly used in algorithms.Towards the end, the focus shifts to algorithm design techniques and their real-world applications. You will discover various strategies for creating efficient and effective algorithms and see how these techniques are applied in real-world scenarios. By the end of the course, you will have a thorough understanding of algorithmic principles and be equipped with the skills to apply them in your technical career.

4954
Ebook

Mastering Windows Security and Hardening. Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats

Mark Dunkerley, Matt Tumbarello

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users?Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions.We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations.By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.

4955
Ebook

Learning RSLogix 5000 Programming. Building PLC solutions with Rockwell Automation and RSLogix 5000

Austin Scott, Austin Scott

RSLogix 5000 and Studio 5000's Logix Designer are user-friendly interfaces used for programming the current generation of Rockwell Automation Controllers including ControlLogix, CompactLogix, and SoftLogix. When engineering automation solutions using Logix, it is important to study the changes to the platform introduced with Studio 5000 and the various controllers, modules, and form factors available today. RSLogix 5000 programming packages help you maximize performance, save project development time, and improve productivity.This book provides a detailed overview of the Logix platform including ControlLogix, CompactLogix, and SoftLogix and explains the significant changes introduced in Studio 5000. A clear understanding of the recent Logix platform changes is critical for anyone developing a Rockwell Automation solution. It provides an easy-to-follow, step-by-step approach to learning the essential Logix hardware and software components and provides beginners with a solid foundation in the Logix platform features and terminology. By the end of this book, you will have a clear understanding of the capabilities of the Logix platform and the ability to navigate the Rockwell Automation Literature Library Resources.

4956
Ebook

Automating Security Detection Engineering. A hands-on guide to implementing Detection as Code

Dennis Chow, David Bruskin

Today's global enterprise security programs grapple with constantly evolving threats. Even though the industry has released abundant security tools, most of which are equipped with APIs for integrations, they lack a rapid detection development work stream. This book arms you with the skills you need to automate the development, testing, and monitoring of detection-based use cases.You’ll start with the technical architecture, exploring where automation is conducive throughout the detection use case lifecycle. With the help of hands-on labs, you’ll learn how to utilize threat-informed defense artifacts and then progress to creating advanced AI-powered CI/CD pipelines to bolster your Detection as Code practices. Along the way, you'll develop custom code for EDRs, WAFs, SIEMs, CSPMs, RASPs, and NIDS. The book will also guide you in developing KPIs for program monitoring and cover collaboration mechanisms to operate the team with DevSecOps principles. Finally, you'll be able to customize a Detection as Code program that fits your organization's needs.By the end of the book, you'll have gained the expertise to automate nearly the entire use case development lifecycle for any enterprise.

4957
Ebook

Webflow by Example. Design, build, and publish modern websites without writing code

Ali Rushdan Tariq

Webflow is a modern no-code website-builder that enables you to rapidly design and build production-scale responsive websites. Webflow by Example is a practical, project-based, and beginner-friendly guide to understanding and using Webflow to efficiently build and launch responsive websites from scratch.Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide will take you through modern web development principles and help you to apply them efficiently using Webflow. You’ll also get to grips with modern responsive web development and understand how to take advantage of the power and flexibility of Webflow. The book will guide you through a real-life project where you will build a fully responsive and dynamic website from scratch. You will learn how to add animations and interactions, customize experiences for users, and more. Finally, the book covers important steps and best practices for making your website ready for production, including SEO optimization and how to publish and package the website.By the end of this Webflow book, you will have gained the skills you need to build modern responsive websites from scratch without any code.

4958
Ebook
4959
Ebook

Technical Program Manager's Handbook. Unlock your TPM potential by leading technical projects successfully and elevating your career path - Second Edition

Joshua Alan Teter

The role of the Technical Program Manager (TPM) is crucial in the tech industry, bridging the gap between technical expertise and business acumen. The second edition of the Technical Program Manager’s Handbook offers a comprehensive guide to excelling in this role. Building on the foundational concepts from the first edition, this updated version introduces new chapters that explore the integration of AI and Emotional Intelligence (EI) in program management. These crucial additions complement the broader focus of the book on bridging business and technology but don’t overshadow it. You'll learn how to apply AI-driven tools to enhance project planning, risk management, and stakeholder communication, as well as how to leverage EI to build strong team relationships and improve leadership effectiveness.This book provides practical tools, methodologies, and case studies, offering insights from industry leaders to help both aspiring and practicing TPMs apply advanced concepts and strategies effectively. It also explores the unique aspects of the TPM role in major tech companies, helping you to navigate and thrive in your career.By the end of this book, you'll have a clear understanding of the TPM role, along with a breakdown of the necessary technical and program management skills, to develop a clear roadmap for your career.

4960
Ebook

Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools

Prashant Verma, Akshay Dixit

Mobile attacks are on the rise. We are adapting ourselves to new and improved smartphones, gadgets, and their accessories, and with this network of smart things, come bigger risks. Threat exposure increases and the possibility of data losses increase. Exploitations of mobile devices are significant sources of such attacks.Mobile devices come with different platforms, such as Android and iOS. Each platform has its own feature-set, programming language, and a different set of tools. This means that each platform has different exploitation tricks, different malware, and requires a unique approach in regards to forensics or penetration testing. Device exploitation is a broad subject which is widely discussed, equally explored by both Whitehats and Blackhats.This cookbook recipes take you through a wide variety of exploitation techniques across popular mobile platforms. The journey starts with an introduction to basic exploits on mobile platforms and reverse engineering for Android and iOS platforms. Setup and use Android and iOS SDKs and the Pentesting environment. Understand more about basic malware attacks and learn how the malware are coded. Further, perform security testing of Android and iOS applications and audit mobile applications via static and dynamic analysis.Moving further, you'll get introduced to mobile device forensics. Attack mobile application traffic and overcome SSL, before moving on to penetration testing and exploitation.The book concludes with the basics of platforms and exploit tricks on BlackBerry and Windows Phone. By the end of the book, you will be able to use variety of exploitation techniques across popular mobile platforms with stress on Android and iOS.