Wydawca: K-i-s-publishing
Kevin Michael Land
Autodesk Fusion 360 has become an indispensable tool for designers, tinkerers, and engineers worldwide thanks to its versatility that allows for large-scale assemblies and smaller, quick 3D prints. If you’ve faced challenges with learning Fusion 360, this book will help you overcome them and build the confidence to design your own projects, explaining step-by-step instructions and the purpose of each tool.In this book, you’ll dive into the design workspace and learn sketching fundamentals such as setting up a component, recognizing when a sketch is fully constrained, and parametrically flexing models. Through trial and error, you’ll work on multiple easy-to-build projects to create simple, useful items that can be quickly 3D printed for use around the house and then advance to much bigger projects that require joint connectivity and large assemblies.By the end of this book, you’ll be able to sketch fully parametric designs, translate them into 3D models, and create your own unique designs.
Ovais Mehboob Ahmed Khan, John Callaway, Clayton...
This Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products:• C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan• Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt• The Modern C# Challenge by Rod Stephens
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira,...
Penetration testing (or ethical hacking) is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats.This Learning Path starts with an in-depth explanation of what hacking and penetration testing are. You’ll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it’s exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to strengthen your defense against online attacks.By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities.This Learning Path includes content from the following Packt books:• Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez• Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al.
James D. Miller , Paul R. Johnson,...
Splunk makes it easy for you to take control of your data and drive your business with the cutting edge of operational intelligence and business analytics. Through this Learning Path, you'll implement new services and utilize them to quickly and efficiently process machine-generated big data.You'll begin with an introduction to the new features, improvements, and offerings of Splunk 7. You'll learn to efficiently use wildcards and modify your search to make it faster. You'll learn how to enhance your applications by using XML dashboards and configuring and extending Splunk. You'll also find step-by-step demonstrations that'll walk you through building an operational intelligence application. As you progress, you'll explore data models and pivots to extend your intelligence capabilities.By the end of this Learning Path, you'll have the skills and confidence to implement various Splunk services in your projects.This Learning Path includes content from the following Packt products:Implementing Splunk 7 - Third Edition by James MillerSplunk Operational Intelligence Cookbook - Third Edition by Paul R Johnson, Josh Diakun, et al
Durgesh Kalya, Marco (Marc) Ayala
Incident Management for Industrial Control Systems is a practical guide that highlights the vital role of effective incident response in protecting complex industrial environments.The author distills nearly two decades of experience in this book to explain the foundational role of critical infrastructure (CI), exploring the world of operational technology (OT), emphasizing Industrial Automation and Control Systems (IACS) and their evolving threat landscape. The book simplifies the complexities of incident command systems (ICSs) for CI, addressing emergency operations, specialized frameworks, and compliance standards. With actionable insights, it also guides you through drills, scenario planning, and improving response strategies across varied operational environments.You’ll gain practical experience in ICS-focused training and exercises, grounded in widely adopted industry frameworks. The chapters further discuss FEMA’s ICS, OT fundamentals, and the nuances of incident management standards.By the end of this book, you'll have a solid grasp of CI operations, core cybersecurity principles, and the dynamics of incident response across industrial control systems and broader OT environments.*Email sign-up and proof of purchase required
Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov
Cybersecurity threats are constantly evolving, posing serious risks to organizations. Incident Response for Windows, by cybersecurity experts Anatoly Tykushin and Svetlana Ostrovskaya, provides a practical hands-on guide to mitigating threats in Windows environments, drawing from their real-world experience in incident response and digital forensics.Designed for cybersecurity professionals, IT administrators, and digital forensics practitioners, the book covers the stages of modern cyberattacks, including reconnaissance, infiltration, network propagation, and data exfiltration. It takes a step-by-step approach to incident response, from preparation and detection to containment, eradication, and recovery. You will also explore Windows endpoint forensic evidence and essential tools for gaining visibility into Windows infrastructure. The final chapters focus on threat hunting and proactive strategies to identify cyber incidents before they escalate.By the end of this book, you will gain expertise in forensic evidence collection, threat hunting, containment, eradication, and recovery, equipping them to detect, analyze, and respond to cyber threats while strengthening your organization's security posture
Dr. Erdal Ozkaya
Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes.In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks.The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting.Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere.By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.
Oleg Skulkin
Ransomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. Incident Response Techniques for Ransomware Attacks is designed to help you do just that.This book starts by discussing the history of ransomware, showing you how the threat landscape has changed over the years, while also covering the process of incident response in detail. You’ll then learn how to collect and produce ransomware-related cyber threat intelligence and look at threat actor tactics, techniques, and procedures. Next, the book focuses on various forensic artifacts in order to reconstruct each stage of a human-operated ransomware attack life cycle. In the concluding chapters, you’ll get to grips with various kill chains and discover a new one: the Unified Ransomware Kill Chain.By the end of this ransomware book, you’ll be equipped with the skills you need to build an incident response strategy for all ransomware attacks.
Roberto Martinez
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization.Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules.By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
Dale Cruse, Denis Boudreau, Glenda Sims
Despite our growing reliance on digital technology, millions of users are still excluded from fully engaging with websites, apps, and digital services because nobody thought to design for them. Inclusive Design for Accessibility challenges you to rethink how you build digital experiences, offering the tools and guidance needed to move beyond compliance and create experiences that work for everyone.With contributions from twelve accessibility leaders—Dale Cruse, Denis Boudreau, Dr. Angela Young, Maya Sellon, Julianna Rowsell, Nandita Gupta, Jennifer Chadwick, Crystal Scott, Chris McMeeking, Dr. Keith Newton, Charlie Triplett, and Kai Wong—this book lays out the fundamentals of inclusive design and its application in advanced and emerging technologies. You'll discover practical strategies and real-world examples that show you how to embed accessibility into projects, from user research and testing to creating accessible websites and mobile apps. You’ll also focus on how AI can enhance accessibility and learn to tackle the challenges posed by VR and AR.For designers, developers, product managers, and business leaders, this book will reshape how you approach inclusive design, helping you move beyond ticking boxes toward building digital products that don't leave anyone behind.*Email sign-up and proof of purchase required
Fabio Roberti, Decio Ferreira
Increasing Autodesk Revit Productivity for BIM Projects takes a hands-on approach to implementing Revit effectively for everyone curious about this new and exciting methodology.Complete with step-by-step explanations of essential concepts and practical examples, this Revit book begins by explaining the principles of productivity in Revit and data management for BIM projects. You'll get to grips with the primary BIM documentation to start a BIM project, including the contract, Exchange Information Requirements (EIR), and BIM Execution Plan (BEP/BXP). Later, you'll create a Revit template, start a Revit project, and explore the core functionalities of Revit to increase productivity. Once you've built the foundation, you'll learn about Revit plugins and use Dynamo for visual programming and Power BI for analyzing BIM information.By the end of this book, you'll have a solid understanding of Revit as construction and design software, how to increase productivity in Revit, and how to apply multiple workflows in your project to manage BIM.
Olushola Akande
Industrial automation has become a popular solution for various industries looking to reduce manual labor inputs and costs by automating processes. This book helps you discover the abilities necessary for excelling in this field.The book starts with the basics of industrial automation before progressing to the application of switches, sensors, actuators, and motors, and a direct on-line (DOL) starter and its components, such as circuit breakers, contactors, and overload relay. Next, you'll explore VFDs, their parameter settings, and how they can be wired and programmed for induction motor control. As you advance, you'll learn the wiring and programming of major industrial automation tools – PLCs, HMIs, and SCADA. You’ll also get to grips with process control and measurements (temperature, pressure, level, and flow), along with analog signal processing with hands-on experience in connecting a 4–20 mA transmitter to a PLC. The concluding chapters will help you grasp various industrial network protocols such as FOUNDATION Fieldbus, Modbus, PROFIBUS, PROFINET, and HART, as well as emerging trends in manufacturing (Industry 4.0) and its empowering technologies (such as IoT, AI, and robotics).By the end of this book, you’ll have gained a practical understanding of industrial automation concepts for machine automation and control.
Pascal Ackerman
With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
Pascal Ackerman
With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.
Shyam Varan Nath, Ann Dunkin, Mahesh Chowdhary,...
Digital transformation requires the ability to identify opportunities across industries and apply the right technologies and tools to achieve results. This book is divided into two parts with the first covering what digital transformation is and why it is important. The second part focuses on how digital transformation works.After an introduction to digital transformation, you will explore the transformation journey in logical steps and understand how to build business cases and create productivity benefit statements. Next, you’ll delve into advanced topics relating to overcoming various challenges. Later, the book will take you through case studies in both private and public sector organizations. You’ll explore private sector organizations such as industrial and hi-tech manufacturing in detail and get to grips with public sector organizations by learning how transformation can be achieved on a global scale and how the resident experience can be improved. In addition to this, you will understand the role of artificial intelligence, machine learning and deep learning in digital transformation. Finally, you’ll discover how to create a playbook that can ensure success in digital transformation.By the end of this book, you’ll be well-versed with industrial digital transformation and be able to apply your skills in the real world.
Shyam Varan Nath, Ann Dunkin, Mahesh Chowdhary,...
Digital transformation requires the ability to identify opportunities across industries and apply the right technologies and tools to achieve results. This audiobook is divided into two parts with the first covering what digital transformation is and why it is important. The second part focuses on how digital transformation works.After an introduction to digital transformation, you will explore the transformation journey in logical steps and understand how to build business cases and create productivity benefit statements. Next, you’ll delve into advanced topics relating to overcoming various challenges. Later, the audiobook will take you through case studies in both private and public sector organizations. You’ll explore private sector organizations such as industrial and hi-tech manufacturing in detail and get to grips with public sector organizations by learning how transformation can be achieved on a global scale and how the resident experience can be improved. In addition to this, you will understand the role of artificial intelligence, machine learning and deep learning in digital transformation. Finally, you’ll discover how to create a playbook that can ensure success in digital transformation.By the end of this audiobook, you’ll be well-versed with industrial digital transformation and be able to apply your skills in the real world.
Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera...
The Industrial Internet refers to the integration of complex physical machines with networked sensors and software. The growth in the number of sensors used in industrial machinery has led to an exponential increase in data being captured for predictive analytics.Industrial Internet Application Development is a practical guide for developers who want to create applications that leverage the full capabilities of IIoT. You will get started by learning how to develop your first IIoT application and understanding its deployment and security. Once you’re familiar with what IIoT is, you will move on to exploring Edge Development along with the analytics aspect of the IIoT stack. In later chapters, you’ll get to grips with the deployment of IIoT applications on the Predix platform. As you cover these concepts, you’ll be able to identify key elements of the development framework and understand their importance while considering architecture and design for IIoT applications.By the end of this book, you will have the skills you need to deploy IIoT applications on the Predix platform and incorporate best practices for developing fault-tolerant and reliable IIoT systems.
Joey Bernal, Bharath Sridhar
When it comes to using the core and managed services available on AWS for making decisions about architectural environments for an enterprise, there are as many challenges as there are advantages. This Industrial IoT book follows the journey of data from the shop floor to the boardroom, identifying goals and aiding in strong architectural decision-making.You’ll begin from the ground up, analyzing environment needs and understanding what is required from the captured data, applying industry standards and conventions throughout the process. This will help you realize why digital integration is crucial and how to approach an Industrial IoT project from a holistic perspective. As you advance, you’ll delve into the operational technology realm and consider integration patterns with common industrial protocols for data gathering and analysis with direct connectivity to data through sensors or systems. The book will equip you with the essentials for designing industrial IoT architectures while also covering intelligence at the edge and creating a greater awareness of the role of machine learning and artificial intelligence in overcoming architectural challenges.By the end of this book, you’ll be ready to apply IoT directly to the industry while adapting the concepts covered to implement AWS IoT technologies.
Spyridon Maniotis
In recent years, large financial services institutions have been embracing the concept of DevOps in the core of their digital transformation strategies. This book is inspired by real enterprise DevOps adoptions in the financial services industry and provides a comprehensive proven practice guide on how large corporate organizations can evolve their DevOps operating model.The book starts by outlining the fundamentals comprising a complete DevOps operating model. It continues with a zoom in on those fundamentals, combining adoption frameworks with real-life examples. You’ll cover the three main themes underpinning the book’s approach that include the concepts of 360°, at relevance, and speeds. You’ll explore how a bank’s corporate and technology strategy links to its enterprise DevOps evolution. The book also provides a rich array of proven practices on how to design and create a harmonious 360° DevOps operating model which should be enabled and adopted at relevance in a multi-speed context. It comes packed with real case studies and examples from the financial services industry that you can adopt in your organization and context.By the end of this book, you will have plenty of inspiration that you can take back to your organization and be able to apply the learning from pitfalls and success stories covered in the book.
Spyridon Maniotis
In recent years, large financial services institutions have been embracing the concept of DevOps in the core of their digital transformation strategies. This audiobook is inspired by real enterprise DevOps adoptions in the financial services industry and provides a comprehensive proven practice guide on how large corporate organizations can evolve their DevOps operating model.The audiobook starts by outlining the fundamentals comprising a complete DevOps operating model. It continues with a zoom in on those fundamentals, combining adoption frameworks with real-life examples. You’ll cover the three main themes underpinning the audiobook’s approach that include the concepts of 360°, at relevance, and speeds. You’ll explore how a bank’s corporate and technology strategy links to its enterprise DevOps evolution. The audiobook also provides a rich array of proven practices on how to design and create a harmonious 360° DevOps operating model which should be enabled and adopted at relevance in a multi-speed context. It comes packed with real case studies and examples from the financial services industry that you can adopt in your organization and context.By the end of this audiobook, you will have plenty of inspiration that you can take back to your organization and be able to apply the learning from pitfalls and success stories covered in the audiobook.
This practical guide is intended for those who want to learn how to build extremely scalable applications. This book is easy to read and is aimed at Java enterprise developers with a solid knowledge of Java. However, no previous coding experience with Infinispan is required.
Darren Death
Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it’s important.It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you’ll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization’s requirements.
Darren Death
Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.
IT Governance Publishing, Alan Calder, Steve G...
This guide navigates through the essential processes of risk management within an ISO 27001/27002 framework. Beginning with foundational principles and methodologies, it systematically details every stage from assessment and analysis to treatment and review. Readers will learn how to apply both qualitative and quantitative techniques to measure impact, likelihood, and risk levels accurately.The book provides clarity on roles, policies, asset classification, and control selection, reinforced by practical tools like gap analysis and risk assessment software. Real-world scenarios and methodologies are contextualized for effective decision-making aligned with international compliance standards.By the end, readers will possess a comprehensive understanding of implementing and sustaining a risk management system that meets ISO 27001/27002 requirements, enabling them to better safeguard information assets and demonstrate regulatory accountability.