Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
5249
Ebook

Mastering Active Directory. Deploy and secure infrastructures with Active Directory, Windows Server 2016, and PowerShell - Second Edition

Dishan Francis

Active Directory (AD) is a centralized and standardized system that automates networked management of user data, security, and distributed resources and enables inter-operation with other directories. This book will first help you brush up on the AD architecture and fundamentals, before guiding you through core components, such as sites, trust relationships, objects, and attributes. You will then explore AD schemas, LDAP, RMS, and security best practices to understand objects and components and how they can be used effectively. Next, the book will provide extensive coverage of AD Domain Services and Federation Services for Windows Server 2016, and help you explore their new features. Furthermore, you will learn to manage your identity infrastructure for a hybrid cloud setup. All this will help you design, plan, deploy, manage operations, and troubleshoot your enterprise identity infrastructure in a secure and effective manner. You’ll later discover Azure AD Module, and learn to automate administrative tasks using PowerShell cmdlets. All along, this updated second edition will cover content based on the latest version of Active Directory, PowerShell 5.1 and LDAP. By the end of this book, you’ll be well versed with best practices and troubleshooting techniques for improving security and performance in identity infrastructures.

5250
Ebook

Scalable Application Development with NestJS. Leverage REST, GraphQL, microservices, testing, and deployment for seamless growth

Pacifique Linjanja

In this book, Pacifique Linjanja, a globally recognized software engineer and open-source contributor, shares his deep technical expertise and practical insights from his extensive experience delivering enterprise-level applications to unpack the full potential of NestJS, the cutting-edge Node.js framework.This book covers the core concepts, design patterns, and best practices for building scalable, high-performance applications with NestJS. You’ll learn REST API and GraphQL implementations, harness the power of microservices, and explore real-world case studies, including e-commerce, social networking, and ERP systems. The chapters provide step-by-step guidance for setting up your development environment with TypeScript and npm, structuring projects effectively, and using the Apollo Federation architecture to create efficient GraphQL APIs. This book offers hands-on guidance for testing and debugging APIs, handling exceptions, and validating data using pipes and guards, all while helping you build a complete NestJS application from scratch.By the end, you'll be ready to apply DevOps principles for continuous integration and deployment, as well as secure your NestJS applications using advanced techniques.

5251
Ebook

Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs

Maurício Harley

Understanding API security is crucial as APIs form the backbone of modern interconnected applications, making them prime targets for cyberattacks. Drawing on nearly 30 years of cybersecurity experience and an extensive background in network security and forensic analysis, this book provides the knowledge and tools to strengthen your API security practices and protect against cyber threats comprehensively.This book begins by establishing a foundational understanding of APIs, particularly focusing on REST and GraphQL, emphasizing their critical role and potential security vulnerabilities. It guides you through setting up a penetration testing environment to ensure the practical application of concepts. You’ll learn reconnaissance techniques, information-gathering strategies, and the discovery of API vulnerabilities. Authentication and authorization testing are thoroughly explored, covering mechanisms, weaknesses, and methods to bypass security controls. By comprehensively addressing these aspects, the book equips you to understand, identify, and mitigate risks, strengthening API security and effectively minimizing potential attack surfaces.By the end of this book, you’ll have developed practical skills to identify, exploit, and secure APIs against various vulnerabilities and attacks.

5252
Ebook

Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition

Denis Rothman

AI has the potential to replicate humans in every field. Artificial Intelligence By Example, Second Edition serves as a starting point for you to understand how AI is built, with the help of intriguing and exciting examples.This book will make you an adaptive thinker and help you apply concepts to real-world scenarios. Using some of the most interesting AI examples, right from computer programs such as a simple chess engine to cognitive chatbots, you will learn how to tackle the machine you are competing with. You will study some of the most advanced machine learning models, understand how to apply AI to blockchain and Internet of Things (IoT), and develop emotional quotient in chatbots using neural networks such as recurrent neural networks (RNNs) and convolutional neural networks (CNNs).This edition also has new examples for hybrid neural networks, combining reinforcement learning (RL) and deep learning (DL), chained algorithms, combining unsupervised learning with decision trees, random forests, combining DL and genetic algorithms, conversational user interfaces (CUI) for chatbots, neuromorphic computing, and quantum computing.By the end of this book, you will understand the fundamentals of AI and have worked through a number of examples that will help you develop your AI solutions.

5253
Ebook

Engineering Manager's Handbook. An insider’s guide to managing software development and engineering teams

Morgan Evans

Delightful and customer-centric digital products have become an expectation in the world of business. Engineering managers are uniquely positioned to impact the success of these products and the software systems that power them. Skillful managers guide their teams and companies to develop functional and maintainable systems.This book helps you find your footing as an engineering manager, develop your leadership style, balance your time between engineering and managing, build successful engineering teams in different settings, and work within constraints without sacrificing technical standards or team empathy. You’ll learn practical techniques for establishing trust, developing beneficial habits, and creating a cohesive and high-performing engineering team. You’ll discover effective strategies to guide and contribute to your team’s efforts, facilitating productivity and collaboration.By the end of this book, you’ll have the tools and knowledge necessary to thrive as an engineering manager. Whether you’re just starting out in your role or seeking to enhance your leadership capabilities, this handbook will empower you to make a lasting impact and drive success in your organization.

5254
Ebook

Microsoft Power Apps Cookbook. Become a pro Power Apps maker by applying practical use cases to solve ever-evolving business challenges

Eickhel Mendoza

Microsoft Power Apps Cookbook is a complete resource filled with meticulously crafted recipes to help you build customized business apps that meet ever-changing enterprise demands. You will learn how to design modern apps with the low-code approach in a rapid application development environment by achieving enterprise-wide business agility.

5255
Ebook

The Ultimate Linux Shell Scripting Guide. Automate, Optimize, and Empower tasks with Linux Shell Scripting

Donald A. Tevault

Dive into the world of Linux shell scripting with this hands-on guide. If you’re comfortable using the command line on Unix or Linux but haven’t fully explored Bash, this book is for you. It’s designed for programmers familiar with languages like Python, JavaScript, or PHP who want to make the most of shell scripting.This isn’t just another theory-heavy book—you’ll learn by doing. Each chapter builds on the last, taking you from shell basics to writing practical scripts that solve real-world problems. With nearly a hundred interactive labs, you’ll gain hands-on experience in automation, system administration, and troubleshooting.While Bash is the primary focus, you'll also get a look at Z Shell and PowerShell, expanding your skills and adaptability. From mastering command redirection and pipelines to writing scripts that work across different Unix-like systems, this book equips you for real-world Linux challenges.By the end, you'll be equipped to write efficient shell scripts that streamline your workflow and improve system automation.

5256
Ebook

Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage

Johann Rehberger

It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security.The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems.By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills.