Wydawca: K-i-s-publishing

97
Ładowanie...
EBOOK

Advanced Node.js Development. Master Node.js by building real-world applications

Andrew Mead

Advanced Node.js Development is a practical, project-based book that provides you with all you need to progress as a Node.js developer. Node is a ubiquitous technology on the modern web, and an essential part of any web developer’s toolkit. If you're looking to create real-world Node applications, or you want to switch careers or launch a side-project to generate some extra income, then you're in the right place. This book was written around a single goal: turning you into a professional Node developer capable of developing, testing, and deploying real-world production applications.There's no better time to dive in. According to the 2018 Stack Overflow Survey, Node is in the top ten for back-end popularity and back-end salary. This book is built from the ground up around the latest version of Node.js (version 9.x.x). You'll be learning all the cutting-edge features available only in the latest software versions.This book delivers advanced skills that you need to become a professional Node developer. Along this journey you'll create your own API, you'll build a full real-time web app and create projects that apply the latest Async and Await technologies. Andrew Mead maps everything out for you in this book so that you can learn how to build powerful Node.js projects in a comprehensive, easy-to-follow package designed to get you up and running quickly.

98
Ładowanie...
EBOOK

Advanced Oracle PL/SQL Developer's Guide (Second Edition). Master the advanced concepts of PL/SQL for professional-level certification and learn the new capabilities of Oracle Database 12c - Second Edition

Saurabh K. Gupta

Oracle Database is one of the most popular databases and allows users to make efficient use of their resources and to enhance service levels while reducing the IT costs incurred. Oracle Database is sometimes compared with Microsoft SQL Server, however, Oracle Database clearly supersedes SQL server in terms of high availability and addressing planned and unplanned downtime. Oracle PL/SQL provides a rich platform for application developers to code and build scalable database applications and introduces multiple new features and enhancements to improve development experience. Advanced Oracle PL/SQL Developer's Guide, Second Edition is a handy technical reference for seasoned professionals in the database development space. This book starts with a refresher of fundamental concepts of PL/SQL, such as anonymous block, subprograms, and exceptions, and prepares you for the upcoming advanced concepts. The next chapter introduces you to the new features of Oracle Database 12c, not limited to PL/SQL. In this chapter, you will understand some of the most talked about features such as Multitenant and Database In-Memory. Moving forward, each chapter introduces advanced concepts with the help of demonstrations, and provides you with the latest update from Oracle Database 12c context. This helps you to visualize the pre- and post-applications of a feature over the database releases. By the end of this book, you will have become an expert in PL/SQL programming and will be able to implement advanced concepts of PL/SQL for efficient management of Oracle Database.

99
Ładowanie...
EBOOK

Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition

Lee Allen, Kevin Cardwell

The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes.The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected!The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get!

100
Ładowanie...
EBOOK

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and

Lee Allen

The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business's true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration Testing for Highly-Secured Environments will teach you how to efficiently and effectively ensure the security posture of environments that have been secured using IDS/IPS, firewalls, network segmentation, hardened system configurations and more. The stages of a penetration test are clearly defined and addressed using step-by-step instructions that you can follow on your own virtual lab.The book follows the standard penetration testing stages from start to finish with step-by-step examples. The book thoroughly covers penetration test expectations, proper scoping and planning, as well as enumeration and footprinting. You'll learn how to clean up and compile proof of concept, exploit code from the web, advanced web application testing techniques, client side attacks, post exploitation strategies, detection avoidance methods, generation of well defined reports and metrics, and setting up a penetration testing virtual lab that mimics a secured environment. The book closes by issuing a challenge to your skills and ability to perform a full penetration test against a fictional corporation; followed by a detailed walk through of the solution.Advanced Penetration Testing for Highly-Secured Environments is packed with detailed examples that reinforce enumeration, exploitation, post-exploitation, reporting skills and more.

101
Ładowanie...
EBOOK

Advanced Python Programming. Accelerate your Python programs using proven techniques and design patterns - Second Edition

Quan Nguyen

Python's powerful capabilities for implementing robust and efficient programs make it one of the most sought-after programming languages.In this book, you'll explore the tools that allow you to improve performance and take your Python programs to the next level.This book starts by examining the built-in as well as external libraries that streamline tasks in the development cycle, such as benchmarking, profiling, and optimizing. You'll then get to grips with using specialized tools such as dedicated libraries and compilers to increase your performance at number-crunching tasks, including training machine learning models.The book covers concurrency, a major solution to making programs more efficient and scalable, and various concurrent programming techniques such as multithreading, multiprocessing, and asynchronous programming.You'll also understand the common problems that cause undesirable behavior in concurrent programs.Finally, you'll work with a wide range of design patterns, including creational, structural, and behavioral patterns that enable you to tackle complex design and architecture challenges, making your programs more robust and maintainable.By the end of the book, you'll be exposed to a wide range of advanced functionalities in Python and be equipped with the practical knowledge needed to apply them to your use cases.

102
Ładowanie...
EBOOK

Advanced Python Programming. Build high performance, concurrent, and multi-threaded apps with Python using proven design patterns

Dr. Gabriele Lanaro, Quan Nguyen , Sakis...

This Learning Path shows you how to leverage the power of both native and third-party Python libraries for building robust and responsive applications. You will learn about profilers and reactive programming, concurrency and parallelism, as well as tools for making your apps quick and efficient. You will discover how to write code for parallel architectures using TensorFlow and Theano, and use a cluster of computers for large-scale computations using technologies such as Dask and PySpark. With the knowledge of how Python design patterns work, you will be able to clone objects, secure interfaces, dynamically choose algorithms, and accomplish much more in high performance computing.By the end of this Learning Path, you will have the skills and confidence to build engaging models that quickly offer efficient solutions to your problems.This Learning Path includes content from the following Packt products:• Python High Performance - Second Edition by Gabriele Lanaro• Mastering Concurrency in Python by Quan Nguyen• Mastering Python Design Patterns by Sakis Kasampalis

103
Ładowanie...
EBOOK

Advanced Serverless Architectures with Microsoft Azure. Design complex serverless systems quickly with the scalability and benefits of Azure

Daniel Bass

Advanced Serverless Architectures with Microsoft Azure redefines your experience of designing serverless systems. It shows you how to tackle challenges of varying levels, not just the straightforward ones. You'll be learning how to deliver features quickly by building systems, which retain the scalability and benefits of serverless.You'll begin your journey by learning how to build a simple, completely serverless application. Then, you'll build a highly scalable solution using a queue, load messages onto the queue, and read them asynchronously. To boost your knowledge further, the book also features durable functions and ways to use them to solve errors in a complex system. You'll then learn about security by building a security solution from serverless components. Next, you’ll gain an understanding of observability and ways to leverage application insights to bring you performance benefits. As you approach the concluding chapters, you’ll explore chaos engineering and the benefits of resilience, by actively switching off a few of the functions within a complex system, submitting a request, and observing the resulting behavior. By the end of this book, you will have developed the skills you need to build and maintain increasingly complex systems that match evolving platform requirements.

104
Ładowanie...
EBOOK

Advanced Splunk. Master the art of getting the maximum out of your machine data using Splunk

Ashish Kumar Tulsiram Yadav

Master the power of Splunk and learn the advanced strategies to get the most out of your machine data with this practical advanced guide. Make sense of the hidden data of your organization – the insight of your servers, devices, logs, traffic and clouds. Advanced Splunk shows you how.Dive deep into Splunk to find the most efficient solution to your data problems. Create the robust Splunk solutions you need to make informed decisions in big data machine analytics. From visualizations to enterprise integration, this well-organized high level guide has everything you need for Splunk mastery.Start with a complete overview of all the new features and advantages of the latest version of Splunk and the Splunk Environment. Go hands on with uploading data, search commands for basic and advanced analytics, advanced visualization techniques, and dashboard customizing. Discover how to tweak Splunk to your needs, and get a complete on Enterprise Integration of Splunk with various analytics and visualization tools. Finally, discover how to set up and use all the new features of the latest version of Splunk.

105
Ładowanie...
EBOOK

Advanced TypeScript Programming Projects. Build 9 different apps with TypeScript 3 and JavaScript frameworks such as Angular, React, and Vue

Peter O'Hanlon

With the demand for ever more complex websites, the need to write robust, standard-compliant JavaScript has never been greater. TypeScript is modern JavaScript with the support of a first-class type system, which makes it simpler to write complex web systems. With this book, you’ll explore core concepts and learn by building a series of websites and TypeScript apps.You’ll start with an introduction to TypeScript features that are often overlooked in other books, before moving on to creating a simple markdown parser. You’ll then explore React and get up to speed with creating a client-side contacts manager. Next, the book will help you discover the Angular framework and use the MEAN stack to create a photo gallery. Later sections will assist you in creating a GraphQL Angular Todo app and then writing a Socket.IO chatroom. The book will also lead you through developing your final Angular project which is a mapping app. As you progress, you’ll gain insights into React with Docker and microservices. You’ll even focus on how to build an image classification program with machine learning using TensorFlow. Finally, you’ll learn to combine TypeScript and C# to create an ASP.NET Core-based music library app.By the end of this book, you’ll be able to confidently use TypeScript 3.0 and different JavaScript frameworks to build high-quality apps.

106
Ładowanie...
EBOOK

Advanced UFT 12 for Test Engineers Cookbook. Over 60 practical recipes to help you accomplish automation tasks using UFT 12 and VBScript

This advanced cookbook is designed for software testers and engineers with previous automation experience and teaches UFT (QTP) developers advanced programming approaches. Knowledge of software testing and basic coding (with VBScript in particular) and familiarity with programming concepts are prerequisites.

107
Ładowanie...
EBOOK

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial attacks trick AI systems with malicious data, creating new security risks by exploiting how AI learns. This challenges cybersecurity as it forces us to defend against a whole new kind of threat. This book demystifies adversarial attacks and equips you with the skills to secure AI technologies. Learn how to defend AI and LLM systems against manipulation and intrusion through adversarial attacks such as poisoning, trojan horses, and model extraction, leveraging DevSecOps, MLOps, and other methods to secure systems.This is a comprehensive guide to AI security, combining structured frameworks with practical examples to help you identify and counter adversarial attacks. Part 1 introduces the foundations of AI and adversarial attacks. Parts 2, 3, and 4 cover key attack types, showing how each is performed and how to defend against them. Part 5 presents secure-by-design AI strategies, including threat modeling, MLSecOps, and guidance aligned with OWASP and NIST. The book concludes with a blueprint for maturing enterprise AI security based on NIST pillars, addressing ethics and safety under Trustworthy AI.By the end of this book, you’ll be able to develop, deploy, and secure AI systems against the threat of adversarial attacks effectively.*Email sign-up and proof of purchase required

108
Ładowanie...
AUDIOBOOK

Adversarial Tradecraft in Cybersecurity Audiobook. Offense versus defense in real-time computer conflict

Dan Borges

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.This audiobook contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.Throughout this audiobook, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors’ motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.By the end of this audiobook, you will have achieved a solid understanding of cyberattacks from both an attacker’s and a defender’s perspective.

109
Ładowanie...
EBOOK

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Little has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.Throughout this book, you will learn how to gain an advantage over opponents by disappearing from what they can detect. You will further understand how to blend in, uncover other actors’ motivations and means, and learn to tamper with them to hinder their ability to detect your presence. Finally, you will learn how to gain an advantage through advanced research and thoughtfully concluding an operation.By the end of this book, you will have achieved a solid understanding of cyberattacks from both an attacker’s and a defender’s perspective.

110
Ładowanie...
EBOOK

Advertising on Google: The High Performance Cookbook. Cracking pay-per-click on Google can increase your visitor numbers and profits. Here are over 120 practical recipes to help you set up, optimize and manage your Adwords campaign with step-by-step instructions

Kristina Cutura

This book contains practical recipes on everything from creating an Adwords account, reporting, analyzing, bidding effectively to remarketing. The book is a guide to getting hands-on experience in Adwords strategies. It is extensively focussed on helping you build an Adwords account, which appeals to the visitors and attracts more clicks!This book is great for the users, who are ready to start using Adwords, as well as for experienced advertisers, who are looking to take their accounts to the next level. Just create an Adwords account and run ad campaigns to take advantage of the hands-on recipes.

111
Ładowanie...
EBOOK

Agentic AI for Offensive Cybersecurity. Build and automate smarter penetration testing workflows using AI-driven agents

Orhan Yildirim

AI agents have moved from demos to practical tooling, especially for offensive security work where repeatability and context matter. This book shows you how to apply agentic AI to real penetration testing automation, keeping a human in the loop while speeding up reconnaissance, validation, and reporting.You’ll build end-to-end workflows with n8n for reconnaissance automation, attack surface management, and repeatable testing tasks such as port scanning and PCI segmentation testing. You’ll also create browser-based security testing tools using the Model Context Protocol (MCP), enabling LLM-powered agents to coordinate tooling, manage context, and assist with vulnerability analysis and documentation. The focus is hands-on practice, as you’ll assemble practical offensive workflows for web application testing, exploitation support, and professional pentest reporting, then extend your pipeline with threat intelligence automation, including agents that monitor CVE feeds and keep your testing aligned with emerging risk.If you’re a penetration tester, red teamer, or security engineer looking to make assessments faster, more consistent, and easier to scale across engagements, this book gives you patterns that you can adapt to your environment.

112
Ładowanie...
EBOOK

Agentic AI with Microsoft Foundry. Design and develop intelligent AI solutions and autonomous agents with Microsoft's Agent Framework

Balamurugan Balakreshnan, Sina Fakhraee, Jay Padhya, Minsoo...

Agentic AI with Microsoft Foundry is your complete guide to creating intelligent, enterprise-ready AI copilots and agents using Microsoft’s unified AI development platform. Whether you’re building with GPT models, integrating private data, or orchestrating multi-agent workflows, this book equips you with the technical foundation and practical skills to succeed.You’ll begin by mastering Microsoft Foundry essentials, including setting up your workspace, exploring the Model Catalog, and applying prompt engineering techniques for high-quality LLM outputs. You’ll then fine-tune large language models, implement retrieval-augmented generation (RAG), and integrate cognitive search capabilities to give your AI real-world context.The second half of the book dives deep into building and extending AI agents using the Agent Framework, covering everything from configuring tools and connectors to orchestrating multi-agent systems capable of reasoning, retrieving, and acting autonomously. You’ll also learn how to evaluate and govern your AI responsibly, monitor deployments effectively, and scale solutions for enterprise use.By the end, you’ll have built a production-ready AI copilot that leverages Microsoft Foundry, OpenAI models, and Microsoft’s Agent Framework, bringing together intelligence, automation, and ethical AI design.

113
Ładowanie...
EBOOK

Agentic Architectural Patterns for Building Multi-Agent Systems. Proven design patterns and practices for GenAI, agents, RAG, LLMOps, and enterprise-scale AI systems

Dr. Ali Arsanjani, Juan Pablo Bustos, Thomas...

Generative AI has moved beyond the hype, and enterprises now face the challenge of turning prototypes into scalable solutions. This book is your guide to building intelligent agents powered by LLMs.Starting with a GenAI maturity model, you’ll learn how to assess your organization’s readiness and create a roadmap toward agentic AI adoption. You’ll master foundational topics such as model selection and LLM deployment, progressing to advanced methods such as RAG, fine-tuning, in-context learning, and LLMOps, especially in the context of agentic AI. You'll explore a rich library of agentic AI design patterns to address coordination, explainability, fault tolerance, and human-agent interaction. This book introduces a concrete, hierarchical multi-agent architecture where high-level orchestrator agents manage complex business workflows by delegating entire sub-processes to specialized agents. You’ll see how these agents collaborate and communicate using the Agent-to-Agent (A2A) protocol.To ensure your systems are production-ready, we provide a practical framework for observability using life cycle callbacks, giving you the granular traceability needed for debugging, compliance, and cost management. Each pattern is backed by real-world scenarios and code examples using the open source Agent Development Kit (ADK).*Email sign-up and proof of purchase required

114
Ładowanie...
EBOOK

Agentic Coding with Claude Code. The everyday developer's guide to agentic coding with Claude Code

Eden Marco

Most developers encounter Claude Code through chat-style prompting, but that approach breaks down as projects grow and automation must be safe, repeatable, and controlled. Agentic Coding with Claude Code shows how to move beyond ad hoc prompts and use Claude Code as an extensible, agent-driven development platform.This book focuses on building context-aware AI workflows directly in your terminal and IDE. You will learn how to control Claude Code using slash commands, manage long-term context with persistent memory files, and automate development tasks using hooks that trigger actions across Claude Code's lifecycle.The book also covers the Model Context Protocol (MCP) as an important part of the modern agentic ecosystem. You will understand why MCP exists, explore its core architecture, and configure MCP servers inside Claude Code to improve context sharing across tools, agents, and workflows. The trade-offs between MCP, skills, and subagents are discussed to help you choose the right approach.You will design and orchestrate multi-agent systems using subagents, parallel sessions, and hierarchical delegation. By the end of the book, you will be able to integrate Claude Code into real-world development workflows with confidence and control.

115
Ładowanie...
EBOOK

Agile Machine Learning with DataRobot. Automate each step of the machine learning life cycle, from understanding problems to delivering value

Bipin Chadha, Sylvester Juwe

DataRobot enables data science teams to become more efficient and productive. This book helps you to address machine learning (ML) challenges with DataRobot's enterprise platform, enabling you to extract business value from data and rapidly create commercial impact for your organization.You'll begin by learning how to use DataRobot's features to perform data prep and cleansing tasks automatically. The book then covers best practices for building and deploying ML models, along with challenges faced while scaling them to handle complex business problems. Moving on, you'll perform exploratory data analysis (EDA) tasks to prepare your data to build ML models and ways to interpret results. You'll also discover how to analyze the model's predictions and turn them into actionable insights for business users. Next, you'll create model documentation for internal as well as compliance purposes and learn how the model gets deployed as an API. In addition, you'll find out how to operationalize and monitor the model's performance. Finally, you'll work with examples on time series forecasting, NLP, image processing, MLOps, and more using advanced DataRobot capabilities.By the end of this book, you'll have learned to use DataRobot's AutoML and MLOps features to scale ML model building by avoiding repetitive tasks and common errors.

116
Ładowanie...
EBOOK

Agile Model-Based Systems Engineering Cookbook. Improve system development by applying proven recipes for effective agile systems engineering

Dr. Bruce Powel Douglass

Agile MBSE can help organizations manage constant change and uncertainty while continuously ensuring system correctness and meeting customers’ needs. But deploying it isn’t easy.Agile Model-Based Systems Engineering Cookbook is a little different from other MBSE books out there. This book focuses on workflows – or recipes, as the author calls them – that will help MBSE practitioners and team leaders address practical situations that are part of deploying MBSE as part of an agile development process across the enterprise.Written by Dr. Bruce Powel Douglass, a world-renowned expert in MBSE, this book will take you through important systems engineering workflows and show you how they can be performed effectively with an agile and model-based approach. You’ll start with the key concepts of agile methods for systems engineering, but we won’t linger on the theory for too long. Each of the recipes will take you through initiating a project, defining stakeholder needs, defining and analyzing system requirements, designing system architecture, performing model-based engineering trade studies, all the way to handling systems specifications off to downstream engineering.By the end of this MBSE book, you’ll have learned how to implement critical systems engineering workflows and create verifiably correct systems engineering models.

117
Ładowanie...
EBOOK

Agile Model-Based Systems Engineering Cookbook. Improve system development by applying proven recipes for effective agile systems engineering - Second Edition

Dr. Bruce Powel Douglass, Dr. Christian von...

Agile MBSE can help organizations manage change while ensuring system correctness and meeting customers’ needs. But deployment challenges have changed since our first edition.The Agile Model-Based Systems Engineering Cookbook’s second edition focuses on workflows – or recipes – that will help MBSE practitioners and team leaders address practical situations that are part of deploying MBSE as part of an agile development process across the enterprise. In this 2nd edition, the Cameo MagicDraw Systems Modeler tool – the most popular tool for MBSE – is used in examples (models are downloadable by readers).Written by a world-renowned expert in MBSE, this book will take you through systems engineering workflows in the Cameo Systems Modeler SysML modeling tool and show you how they can be used with an agile and model-based approach. You’ll start with the key concepts of agile methods for systems engineering. Next, each recipe will take you through initiating a project, outlining stakeholder needs, defining and analyzing system requirements, specifying system architecture, performing model-based engineering trade studies, all the way to handling systems specifications off to downstream engineering.By the end of this MBSE book, you’ll learn how to implement systems engineering workflows and create systems engineering models.

118
Ładowanie...
EBOOK

Agile Project Management with GreenHopper 6 Blueprints. Written by an Agile enthusiast, this comprehensive guide to GreenHopper will help you track and manage your projects in a way that achieves the best value for your team. Excellent reading for everybody from stakeholders to scrum masters

Jaibeer Malik

Agile methodologies like Scrum focus on customer values in an incremental way. Regular planning, tracking, reporting, and improving can become equally challenging from a project management perspective. GreenHopper is a tooling support for JIRA that offers easy adoption of agile practices through rich interfaces for effective team collaboration and project management.Agile Project Management with GreenHopper 6 Blueprints is a step-by-step guide that teaches you how to manage agile projects using the GreenHopper tooling system. With easy adoption using pre-sets for Scrum & Kanban, the rich interface focuses on the work at hand, increasing team productivity. Executing sprints, tracking sprints, and reporting on agile projects has never been so easy. The integration with different development environments helps teams to focus on collaboration, communication, and continuous improvement. This book covers agile project management concepts using GreenHopper.You will learn about backlog management for your agile team, how to create projects and boards for your agile team, and how to create new backlog items, prioritize items, estimate backlog items, create sprints, and update technical task status and report on the same.You will learn everything you need to know about managing an agile project using GreenHopper and how to achieve the best value for your team.

119
Ładowanie...
EBOOK

Agile Security Operations. Engineering for agility in cyber defense, detection, and response

Hinne Hettema

Agile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best.Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you’ll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding.By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference.

120
Ładowanie...
EBOOK

Agile Technical Practices Distilled. A learning journey in technical practices and principles of software design

Pedro M. Santos, Marco Consolaro, Alessandro Di...

The number of popular technical practices has grown exponentially in the last few years. Learning the common fundamental software development practices can help you become a better programmer. This book uses the term Agile as a wide umbrella and covers Agile principles and practices, as well as most methodologies associated with it. You’ll begin by discovering how driver-navigator, chess clock, and other techniques used in the pair programming approach introduce discipline while writing code. You’ll then learn to safely change the design of your code using refactoring. While learning these techniques, you’ll also explore various best practices to write efficient tests. The concluding chapters of the book delve deep into the SOLID principles - the five design principles that you can use to make your software more understandable, flexible and maintainable. By the end of the book, you will have discovered new ideas for improving your software design skills, the relationship within your team, and the way your business works.