Wydawca: K-i-s-publishing

6097
Ładowanie...
EBOOK

The TensorFlow Workshop. A hands-on guide to building deep learning models from scratch using real-world datasets

Matthew Moocarme, Anthony So, Anthony Maddalone

Getting to grips with tensors, deep learning, and neural networks can be intimidating and confusing for anyone, no matter their experience level. The breadth of information out there, often written at a very high level and aimed at advanced practitioners, can make getting started even more challenging.If this sounds familiar to you, The TensorFlow Workshop is here to help. Combining clear explanations, realistic examples, and plenty of hands-on practice, it’ll quickly get you up and running.You’ll start off with the basics – learning how to load data into TensorFlow, perform tensor operations, and utilize common optimizers and activation functions. As you progress, you’ll experiment with different TensorFlow development tools, including TensorBoard, TensorFlow Hub, and Google Colab, before moving on to solve regression and classification problems with sequential models.Building on this solid foundation, you’ll learn how to tune models and work with different types of neural network, getting hands-on with real-world deep learning applications such as text encoding, temperature forecasting, image augmentation, and audio processing.By the end of this deep learning book, you’ll have the skills, knowledge, and confidence to tackle your own ambitious deep learning projects with TensorFlow.

6098
Ładowanie...
EBOOK

The TypeScript Workshop. A practical guide to confident, effective TypeScript programming

Ben Grynhaus, Jordan Hudgens, Rayon Hunte, Matt...

By learning TypeScript, you can start writing cleaner, more readable code that’s easier to understand and less likely to contain bugs. What’s not to like?It’s certainly an appealing prospect, but learning a new language can be challenging, and it’s not always easy to know where to begin. This book is the perfect place to start. It provides the ideal platform for JavaScript programmers to practice writing eloquent, productive TypeScript code.Unlike many theory-heavy books, The TypeScript Workshop balances clear explanations with opportunities for hands-on practice. You’ll quickly be up and running building functional websites, without having to wade through pages and pages of history and dull, dry fluff. Guided exercises clearly demonstrate how key concepts are used in the real world, and each chapter is rounded off with an activity that challenges you to apply your new knowledge in the context of a realistic scenario.Whether you’re a hobbyist eager to get cracking on your next project, or a professional developer looking to unlock your next promotion, pick up a copy and make a start! Whatever your motivation, by the end of this book, you’ll have the confidence and understanding to make it happen with TypeScript.

6099
Ładowanie...
EBOOK

The Ultimate Docker Container Book. Build, ship, deploy, and scale containerized applications with Docker, Kubernetes, and the cloud - Fourth Edition

Dr. Gabriel N. Schenker

Containers have become the foundation of modern software platforms, transforming how applications are built, shipped, secured, and operated. However, as systems grow more distributed and regulated, using containers effectively requires more than basic commands, it requires architectural understanding, security awareness, and operational discipline.The Ultimate Docker Container Book, 4th edition takes you from container fundamentals to running production-grade platforms. Starting from first principles, the book explains how containers reduce friction in the software supply chain and progressively introduces images, networking, state management, testing, and debugging. You will learn how to design and operate distributed applications, manage multi-service systems, and apply orchestration using Kubernetes. This 4th edition places a stronger emphasis on security, governance, and compliance, reflecting real-world enterprise requirements. It also explores AI and automation in DevOps, showing how modern teams can enhance delivery and operations responsibly.Whether you are a developer, DevOps or platform engineer, or software architect, this book equips you with the skills and understanding needed to build secure, scalable, and future-ready container platforms.

6100
Ładowanie...
EBOOK

The Ultimate Docker Container Book. Build, test, ship, and run containers with Docker and Kubernetes - Third Edition

Dr. Gabriel N. Schenker

The Ultimate Docker Container Book, 3rd edition enables you to leverage Docker containers for streamlined software development. You’ll uncover Docker fundamentals and how containers improve software supply chain efficiency and enhance security.You’ll start by learning practical skills such as setting up Docker environments, handling stateful components, running and testing code within containers, and managing Docker images. You’ll also explore how to adapt legacy applications for containerization and understand distributed application architecture. Next, you’ll delve into Docker's networking model, software-defined networks for secure applications, and Docker compose for managing multi-service applications along with tools for log analysis and metrics. You’ll further deepen your understanding of popular orchestrators like Kubernetes and Docker swarmkit, exploring their key concepts, and deployment strategies for resilient applications. In the final sections, you’ll gain insights into deploying containerized applications on major cloud platforms, including Azure, AWS, and GCE and discover techniques for production monitoring and troubleshooting.By the end of this book, you’ll be well-equipped to manage and scale containerized applications effectively.

6101
Ładowanie...
EBOOK

The Ultimate Guide to Building a Google Cloud Foundation. A one-on-one tutorial with one of Google’s top trainers

Patrick Haggerty

From data ingestion and storage, through data processing and data analytics, to application hosting and even machine learning, whatever your IT infrastructural need, there's a good chance that Google Cloud has a service that can help. But instant, self-serve access to a virtually limitless pool of IT resources has its drawbacks. More and more organizations are running into cost overruns, security problems, and simple why is this not working? headaches.This book has been written by one of Google’s top trainers as a tutorial on how to create your infrastructural foundation in Google Cloud the right way. By following Google’s ten-step checklist and Google’s security blueprint, you will learn how to set up your initial identity provider and create an organization. Further on, you will configure your users and groups, enable administrative access, and set up billing. Next, you will create a resource hierarchy, configure and control access, and enable a cloud network. Later chapters will guide you through configuring monitoring and logging, adding additional security measures, and enabling a support plan with Google.By the end of this book, you will have an understanding of what it takes to leverage Terraform for properly building a Google Cloud foundational layer that engenders security, flexibility, and extensibility from the ground up.

6102
Ładowanie...
EBOOK

The Ultimate Guide to Informed Wearable Technology. A hands-on approach for creating wearables from prototype to purpose using Arduino systems

Christine Farion

Wearable circuits add interaction and purpose to clothing and other wearable devices that are currently widely used in medical, social, safety, entertainment, and sports fields. To develop useful and impressive prototypes and wearables, you’ll need to be skilled in designing electronic circuits and working with wearable technologies.This book takes you on an interesting journey through wearable technology, starting from electronic circuits, materials, and e-textile toolkits to using Arduino, which includes a variety of sensors, outputs, actuators, and microcontrollers such as Gemma M0 and ESP32. As you progress, you’ll be carefully guided through creating an advanced IoT project. You’ll learn by doing and create wearables with the help of practical examples and exercises. Later chapters will show you how to develop a hyper-body wearable and solder and sew circuits. Finally, you’ll discover how to build a culture-driven wearable to track data and provide feedback using a Design Innovation approach.After reading this book, you’ll be able to design interactive prototypes and sew, solder, and program your own Arduino-based wearable devices with a purpose.

6103
Ładowanie...
EBOOK

The Ultimate Guide to Snowpark. Design and deploy Snowflake Snowpark with Python for efficient data workloads

Shankar Narayanan SGS, Vivekanandan SS, Jeff Hollan

Snowpark is a powerful framework that helps you unlock numerous possibilities within the Snowflake Data Cloud. However, without proper guidance, leveraging the full potential of Snowpark with Python can be challenging. Packed with practical examples and code snippets, this book will be your go-to guide to using Snowpark with Python successfully.The Ultimate Guide to Snowpark helps you develop an understanding of Snowflake Snowpark and how it enables you to implement workloads in data engineering, data science, and data applications within the Data Cloud. From configuration and coding styles to workloads such as data manipulation, collection, preparation, transformation, aggregation, and analysis, this guide will equip you with the right knowledge to make the most of this framework. You'll discover how to build, test, and deploy data pipelines and data science models. As you progress, you’ll deploy data applications natively in Snowflake and operate large language models (LLMs) using Snowpark container services.By the end of this book, you'll be able to leverage Snowpark's capabilities and propel your career as a Snowflake developer to new heights.

6104
Ładowanie...
EBOOK

The Ultimate iOS Interview Playbook. Conquer Swift, frameworks, design patterns, and app architecture for your dream job

Avi Tsadok

As an iOS developer, you must possess a diverse skill set encompassing Swift coding, design knowledge, and mastery of development tools. And while the demand for iOS developers remains high, the competition for landing your dream job has intensified in recent years. Being a skilled iOS developer is no longer enough — acing interviews is now just as essential as having technical expertise.In The Ultimate iOS Interview Playbook, you'll discover innovative ways to stand out as an iOS developer and pass every job interview. It will guide you to build your developer brand and present your skills to potential employers. This comprehensive guide covers over 100 interview questions, from Swift fundamentals and frameworks to complex design patterns and app architecture. You'll learn how to approach coding assessments like a pro and avoid red flags that could hinder your chances of success.Drawing from the author’s experience of interviewing hundreds of iOS developers and having been a candidate themself, this book addresses the challenges of showcasing your skills and knowledge within a limited timeframe.By the end of this book, you'll be ready to excel in any iOS interview, demonstrating your strengths and confidently tackling even the most challenging questions, ultimately paving the way to secure the job you've always wanted.

6105
Ładowanie...
EBOOK

The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition

Glen D. Singh

Journey into the world of Kali Linux – the central hub for advanced penetration testing, with this ultimate guide to exposing security vulnerabilities in websites and both wired and wireless enterprise networks.With real-world scenarios, practical steps and coverage of popular tools, this third edition of the bestselling Ultimate Kali Linux Book is your fast track to learning penetration testing with Kali Linux 2024.x. As you work through the book, from preliminary penetration testing activities through performing network and website penetration testing, to exploring Active Directory and social engineering attacks, you’ll discover the range of vulnerability assessment tools in Kali Linux, building your confidence and proficiency as a penetration tester or ethical hacker.This new edition of the book features a brand new chapter on Open Source Intelligence (OSINT), as well as new labs on web applications and social engineering. Procedures for building virtual labs have also been improved, making these easier to understand and follow.Think of this book as your stepping stone into the modern world of penetration testing and ethical hacking – with the practical guidance and industry best practices the book provides, you’ll be ready to tackle real-world cybersecurity challenges head-on.*Email sign-up and proof of purchase required

6106
Ładowanie...
AUDIOBOOK

The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire

Glen D. Singh

Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.This audiobook is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you’ll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You’ll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you’ll be able to compromise Active Directory and exploit enterprise networks. Finally, this audiobook covers best practices for performing complex web penetration testing techniques in a highly secured environment.By the end of this Kali Linux audiobook, you’ll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.

6107
Ładowanie...
EBOOK

The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition

Glen D. Singh

Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks. This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you’ll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You’ll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you’ll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment. By the end of this Kali Linux book, you’ll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.

6108
Ładowanie...
EBOOK

The Ultimate Linux Shell Scripting Guide. Automate, Optimize, and Empower tasks with Linux Shell Scripting

Donald A. Tevault

Dive into the world of Linux shell scripting with this hands-on guide. If you’re comfortable using the command line on Unix or Linux but haven’t fully explored Bash, this book is for you. It’s designed for programmers familiar with languages like Python, JavaScript, or PHP who want to make the most of shell scripting.This isn’t just another theory-heavy book—you’ll learn by doing. Each chapter builds on the last, taking you from shell basics to writing practical scripts that solve real-world problems. With nearly a hundred interactive labs, you’ll gain hands-on experience in automation, system administration, and troubleshooting.While Bash is the primary focus, you'll also get a look at Z Shell and PowerShell, expanding your skills and adaptability. From mastering command redirection and pipelines to writing scripts that work across different Unix-like systems, this book equips you for real-world Linux challenges.By the end, you'll be equipped to write efficient shell scripts that streamline your workflow and improve system automation.

6109
Ładowanie...
EBOOK

The Ultimate Roblox Game Building Cookbook. Design immersive experiences with easy-to-follow recipes for world and game development

Taylor Field-Draper, Natasha West

Roblox is a massively popular online gaming platform, but it can be challenging to maneuver for beginners who don’t know where to start, as well as seasoned developers who tend to struggle with limited scripting tools that make transitioning from other platforms such as Unity more difficult.The Ultimate Roblox Game Building Cookbook is an invaluable asset for any Roblox developer looking to take their skills to the next level. With a wide range of recipes, this Roblox book covers everything from the basics of game development on the platform to advanced techniques for creating immersive experiences.As you progress through the chapters, you'll gain a deep understanding of the proper workflow and building methods that will enable you to create extraordinary virtual worlds. You'll gain insights into creating complex game mechanics, such as multiplayer games, working with textures, and special effects in games. This cookbook will also provide you with tips from top Roblox developers, as well as valuable guidance on how to monetize your games and stay up to date with the latest trends in the Roblox development community.By the end of this book, you’ll have gained a comprehensive understanding of Roblox game development and design.

6110
Ładowanie...
EBOOK

The Ultimate Studio One Pro 7 Book. A step-by-step guide to recording, editing, mixing, and mastering professional-quality music - Second Edition

Doruk Somunkiran

Written by a seasoned composer, music producer, and instructor with over 20 years of experience in the music industry, this comprehensive guide transforms Studio One’s powerful digital audio workstation (DAW) into your creative canvas. Designed for both musicians looking to start producing their own music and audio professionals integrating Studio One into their workflow, this hands-on manual takes you step-by-step through every stage of the production process.You’ll learn how to set up Studio One for peak performance, create projects, record high-quality audio, and build MIDI arrangements with virtual instruments. The book covers advanced editing techniques, including Melodyne, Audio Bend, and MIDI modifiers, to refine your songs with precision. You’ll master mixing with Studio One’s built-in effects and plugins, apply professional audio mastering in the Project window, and explore immersive audio tools that bring your music to life in multichannel environments for films, gaming, and beyond.You’ll not only develop technical proficiency but also a personalized, efficient music production workflow that serves your creative vision. By the final page, you'll have everything you need to turn musical ideas into polished, release-ready songs using only the Studio One software.*Email sign-up and proof of purchase required

6111
Ładowanie...
EBOOK

The Ultimate Studio One Pro Book. A step-by-step guide to recording, editing, mixing, and mastering professional-quality music

Doruk Somunkiran

The Ultimate Studio One Pro Book is a detailed, step-by-step guide to creating music with Studio One’s extensive set of production tools. This practical, goal-oriented resource will help musicians start producing their own music with Studio One and teach audio professionals how to include Studio One in their production workflow.The book begins by showing you how to set up Studio One to work smoothly on your system. The following chapters will walk you through the process of creating a project, along with recording audio and using virtual instruments to construct a MIDI arrangement. As you advance, you’ll find out how to edit your songs to perfection using Melodyne, Audio Bend, and an extensive collection of MIDI modifiers. You’ll also discover how to mix in Studio One with the effects plugins included in it, along with applying audio mastering in the Project window. Throughout this book, you’ll gain the skills needed to leverage Studio One confidently and effectively, as well as build your own unique music production workflow.By the end of this book, you’ll be able to effortlessly translate your musical ideas into complete songs using Studio One’s powerful tools.

6112
Ładowanie...
EBOOK

The Ultimate Ubuntu Handbook. A complete guide to Ubuntu 24.04, from installation to advanced security and development

Ken VanDine, Alan Pope

Ubuntu 24.04 brings powerful new features, but most users barely scratch the surface of its potential. This book transforms you from a basic user into an Ubuntu power user by guiding you through setup, security, and development workflows step by step. Ken VanDine reveals insider knowledge and proven strategies that turn Ubuntu into a stable, secure, and productive development platform.Starting with Ubuntu’s mission, release lifecycles, and what’s new in 24.04, you’ll learn how to install the system, customize your desktop, and use the command line to work more efficiently. The book shows you how to apply updates, activate Ubuntu Pro, configure firewalls, and secure data with full disk encryption before covering topics often overlooked by desktop users. Moving into advanced territory, this book covers container-based development using LXD, working with virtual machines through Multipass, and setting up Kubernetes with MicroK8s. Whether you’re building cloud-native apps or data science projects, you’ll benefit from reliable and repeatable Ubuntu workflows. Beyond the technical skills, you'll discover how to tap into Ubuntu's global community for ongoing support and opportunities to contribute. This book is ideal for both newcomers eager to accelerate their Linux journey and seasoned professionals seeking to maximize their Ubuntu expertise.

6113
Ładowanie...
EBOOK

The Ultimate Zoom Cookbook. Over 100 recipes to enhance and engage communication with Zoom

Patrick Kelley

The last few years have completely changed the way we collaborate and communicate. Whether it’s internally with coworkers at a large enterprise or externally with prospective clients and customers, Zoom has created a new way to interact with people in real-time as well as asynchronously.This cookbook delves into all aspects of Zoom, moving beyond just meetings. You’ll get started by exploring key areas such as audio, video, chat, webinars, advanced reporting, and analytics. Next, you’ll progress from discovering simple Zoom video and audio calls to understanding features such as whiteboards, hardware integration, and phone capabilities. Gradually, you'll discover advanced techniques for effective content presentation, while configuring users and features from the admin portal. The last set of chapters cover advanced features on security and privacy as well as how to make the most of AI Companion to reach out to your audience with better content, clarity, and expertise.By the end of this Zoom book, you’ll be well-versed with the entire Zoom app and all the modalities available.

6114
Ładowanie...
EBOOK

The Universal Service Desk (USD). Implementing, controlling, and improving service delivery

IT Governance Publishing, Brian Johnson, Léon-Paul de...

This book is your go-to guide to mastering the Universal Service Desk (USD) for improving service management. The reader will understand USD's role in enterprises, delve into its design process, and learn how to use it for effective customer service and business operations. With practical examples and industry case studies, this book offers deep insights into the application of the USD for organizational success.The book begins by introducing the USD concept, highlighting its importance in streamlining service delivery and enhancing customer satisfaction. It outlines how a demand-oriented approach can be implemented across various business environments, optimizing workflows from front-office interactions to back-office coordination. Through the chapters, readers will learn to adapt USD to meet the evolving needs of enterprises.The final chapters focus on advanced practices such as improving service quality, managing virtual USD platforms, and aligning service desk operations with business goals. By following the structured approach outlined, you’ll gain the tools to create a USD that delivers measurable value, fosters seamless communication, and aligns with organizational priorities.

6115
Ładowanie...
EBOOK

The Unsupervised Learning Workshop. Get started with unsupervised learning algorithms and simplify your unorganized data to help make future predictions

Aaron Jones, Christopher Kruger, Benjamin Johnston

Do you find it difficult to understand how popular companies like WhatsApp and Amazon find valuable insights from large amounts of unorganized data? The Unsupervised Learning Workshop will give you the confidence to deal with cluttered and unlabeled datasets, using unsupervised algorithms in an easy and interactive manner.The book starts by introducing the most popular clustering algorithms of unsupervised learning. You'll find out how hierarchical clustering differs from k-means, along with understanding how to apply DBSCAN to highly complex and noisy data. Moving ahead, you'll use autoencoders for efficient data encoding.As you progress, you’ll use t-SNE models to extract high-dimensional information into a lower dimension for better visualization, in addition to working with topic modeling for implementing natural language processing (NLP). In later chapters, you’ll find key relationships between customers and businesses using Market Basket Analysis, before going on to use Hotspot Analysis for estimating the population density of an area.By the end of this book, you’ll be equipped with the skills you need to apply unsupervised algorithms on cluttered datasets to find useful patterns and insights.

6116
Ładowanie...
EBOOK

The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

Benjamin Strout

Vulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with the adoption and use of technology. To begin your journey of becoming a security researcher, you need more than just the technical skills to find vulnerabilities; you’ll need to learn how to adopt research strategies and navigate the complex and frustrating process of sharing your findings. This book provides an easy-to-follow approach that will help you understand the process of discovering, disclosing, and publishing your first zero-day vulnerability through a collection of examples and an in-depth review of the process.You’ll begin by learning the fundamentals of vulnerabilities, exploits, and what makes something a zero-day vulnerability. Then, you'll take a deep dive into the details of planning winning research strategies, navigating the complexities of vulnerability disclosure, and publishing your research with sometimes-less-than-receptive vendors.By the end of the book, you'll be well versed in how researchers discover, disclose, and publish vulnerabilities, navigate complex vendor relationships, receive credit for their work, and ultimately protect users from exploitation. With this knowledge, you’ll be prepared to conduct your own research and publish vulnerabilities.

6117
Ładowanie...
EBOOK

Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response

Andrew Pease

Threat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network.You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations.You’ll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. After you’ve mastered the basics, you’ll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities.By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network.

6118
Ładowanie...
EBOOK

Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems

Derek Fisher

Threat modeling has become a cornerstone of modern cybersecurity, yet it is often overlooked, leaving security gaps that attackers can exploit. With the rise in system complexity, cloud adoption, AI-driven threats, and stricter compliance requirements, security teams need a structured approach to proactively spot and stop risks before attackers do. This book delivers exactly that, offering actionable insights for applying industry best practices and emerging technologies to secure systems. It breaks down the fundamentals of threat modeling and walks you through key frameworks and tools such as STRIDE, MITRE ATT&CK, PyTM, and Attack Paths, helping you choose the right model and create a roadmap tailored to your business. You'll learn how to use leading threat modeling tools, identify and prioritize potential threats, and integrate these practices into the software development life cycle to detect risks early. The book also examines how AI can enhance analysis and streamline security decision-making for faster, stronger defenses.By the end, you'll have everything you need to build systems that anticipate and withstand evolving threats, keeping your organization secure in an ever-changing digital landscape.*Email sign-up and proof of purchase required

6119
Ładowanie...
EBOOK

Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture

Brett Crawley, Adam Shostack

Are you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay.Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You’ll explore the methodology for threat modeling—Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you’ll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems.By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks.