Wydawca: Packt Publishing
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
5329
Ebook

Linux for Networking Professionals. Securely configure and operate Linux network services for the enterprise

Rob VandenBrink

As Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must.This book will guide you in building a strong foundation of Linux networking concepts. The book begins by covering various major distributions, how to pick the right distro, and basic Linux network configurations. You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. You'll discover a wide range of network services, why they're important, and how to configure them in an enterprise environment. Finally, as you work with the example builds in this Linux book, you'll learn to configure various services to defend against common attacks. As you advance to the final chapters, you’ll be well on your way towards building the underpinnings for an all-Linux datacenter.By the end of this book, you'll be able to not only configure common Linux network services confidently, but also use tried-and-tested methodologies for future Linux installations.

5330
Ebook
5331
Ebook
5332
Ebook

Generative AI Art. Unleash Your Creativity with Generative AI Art for Beginners

Oliver Theobald

The course introduces the basic concepts of artificial intelligence and its application in art, making it accessible even to those without a technical background. This foundation paves the way for exploring the nuances of effective prompt crafting, a critical skill for generating bespoke AI artwork.The course focuses on hands-on demonstrations with leading AI art software, including Craiyon and Midjourney, offering step-by-step guides to harness these tools effectively. Through practical examples, learners will understand how to navigate image prompts, masking techniques, framing, and lighting to enhance the visual appeal of their creations. The significance of navigating these elements is underscored, highlighting their role in achieving consistency and originality in AI-generated art.The course wraps up by delving into the remixing of popular art styles, the art of creating compelling text prompts, and the critical aspects of image rights, ethics, privacy, and originality in the digital art space. By concluding with recommended resources, learners are equipped to continue their journey in AI art, fueled by inspiration and a solid understanding of the field's possibilities and responsibilities.

5333
Ebook

Mastering SAS Programming for Data Warehousing. An advanced programming guide to designing and managing Data Warehouses using SAS

Monika Wahi

SAS is used for various functions in the development and maintenance of data warehouses, thanks to its reputation of being able to handle ’big data’.This book will help you learn the pros and cons of storing data in SAS. As you progress, you’ll understand how to document and design extract-transform-load (ETL) protocols for SAS processes. Later, you’ll focus on how the use of SAS arrays and macros can help standardize ETL. The book will also help you examine approaches for serving up data using SAS and explore how connecting SAS to other systems can enhance the data warehouse user’s experience.By the end of this data management book, you will have a fundamental understanding of the roles SAS can play in a warehouse environment, and be able to choose wisely when designing your data warehousing processes involving SAS.

5334
Ebook

Final Cut Pro Efficient Editing. A step-by-step guide to smart video editing with FCP 10.6

Iain Anderson

Final Cut Pro (also known as FCP, previously Final Cut Pro X) is Apple’s efficient and accessible video editing software for everyone, offering powerful features that experienced editors and novices will find useful. FCP is the quickest way to transform your raw clips into a finished piece, so if speed is important, make this a key tool in your editing arsenal.Final Cut Pro Efficient Editing is a comprehensive best practice guide for all editors. You’ll not only learn how to use the features but also find out which ones are the most important and when you should use them. With the help of practical examples, the book will show you how typical footage can be assembled, trimmed, colored, and finessed to produce a finished edit, exploring a variety of techniques. As you progress through the book, you’ll follow a standard editing workflow to get the feel of working on real-world projects and answer self-assessment questions to make sure that you’re on track.By the end of this Final Cut Pro book, you’ll be well versed with the key features of this app and have all the tools you need to create impressive edits.

5335
Ebook

The Kubernetes Bible. The definitive guide to deploying and managing Kubernetes across cloud and on-prem environments - Second Edition

Gineesh Madapparambath, Russ McKendrick, Ed Price

Kubernetes has become the go-to orchestration platform for containerized applications. As a Kubernetes user, you know firsthand how powerful yet complex this tool can be. The Kubernetes Bible cuts through the complexity, offering hands-on examples and expert advice to conquer containerization challengesWith this new edition, you will master cutting edge security practices, deploy seamlessly and scale effortlessly, ensuring unwavering service availability. You will gain the expertise to craft production-grade applications, secure development environments, navigate complex deployments with ease, and become a security maestro. You will be able to optimize network communication and data management across major cloud platforms. Additionally, this book dives deep into these challenges, offering solutions such as multi-container Pods, advanced security techniques, and expert networking guidance. You will also explore persistent storage advancements, cloud-specific cluster management updates, and best practices for traffic routingBy the end of this comprehensive guide, you will possess the skills and knowledge to orchestrate your containerized applications with precision, ensuring their optimal performance and scalability. Stop settling for basic container management. Order your copy today and orchestrate your containers to greatness.

5336
Ebook

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors’ motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker’s and a defender’s perspective.