Wydawca: Packt Publishing

Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
2433
Ładowanie...
EBOOK

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.

2434
Ładowanie...
EBOOK

Industrial Cybersecurity. Efficiently secure critical infrastructure systems

Pascal Ackerman

With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.

2435
Ładowanie...
EBOOK

Industrial Digital Transformation. Accelerate digital transformation with business optimization, AI, and Industry 4.0

Shyam Varan Nath, Ann Dunkin, Mahesh Chowdhary,...

Digital transformation requires the ability to identify opportunities across industries and apply the right technologies and tools to achieve results. This book is divided into two parts with the first covering what digital transformation is and why it is important. The second part focuses on how digital transformation works.After an introduction to digital transformation, you will explore the transformation journey in logical steps and understand how to build business cases and create productivity benefit statements. Next, you’ll delve into advanced topics relating to overcoming various challenges. Later, the book will take you through case studies in both private and public sector organizations. You’ll explore private sector organizations such as industrial and hi-tech manufacturing in detail and get to grips with public sector organizations by learning how transformation can be achieved on a global scale and how the resident experience can be improved. In addition to this, you will understand the role of artificial intelligence, machine learning and deep learning in digital transformation. Finally, you’ll discover how to create a playbook that can ensure success in digital transformation.By the end of this book, you’ll be well-versed with industrial digital transformation and be able to apply your skills in the real world.

2436
Ładowanie...
AUDIOBOOK

Industrial Digital Transformation. Accelerate digital transformation with business optimization, AI, and Industry 4.0

Shyam Varan Nath, Ann Dunkin, Mahesh Chowdhary,...

Digital transformation requires the ability to identify opportunities across industries and apply the right technologies and tools to achieve results. This audiobook is divided into two parts with the first covering what digital transformation is and why it is important. The second part focuses on how digital transformation works.After an introduction to digital transformation, you will explore the transformation journey in logical steps and understand how to build business cases and create productivity benefit statements. Next, you’ll delve into advanced topics relating to overcoming various challenges. Later, the audiobook will take you through case studies in both private and public sector organizations. You’ll explore private sector organizations such as industrial and hi-tech manufacturing in detail and get to grips with public sector organizations by learning how transformation can be achieved on a global scale and how the resident experience can be improved. In addition to this, you will understand the role of artificial intelligence, machine learning and deep learning in digital transformation. Finally, you’ll discover how to create a playbook that can ensure success in digital transformation.By the end of this audiobook, you’ll be well-versed with industrial digital transformation and be able to apply your skills in the real world.

2437
Ładowanie...
EBOOK

Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services

Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera...

The Industrial Internet refers to the integration of complex physical machines with networked sensors and software. The growth in the number of sensors used in industrial machinery has led to an exponential increase in data being captured for predictive analytics.Industrial Internet Application Development is a practical guide for developers who want to create applications that leverage the full capabilities of IIoT. You will get started by learning how to develop your first IIoT application and understanding its deployment and security. Once you’re familiar with what IIoT is, you will move on to exploring Edge Development along with the analytics aspect of the IIoT stack. In later chapters, you’ll get to grips with the deployment of IIoT applications on the Predix platform. As you cover these concepts, you’ll be able to identify key elements of the development framework and understand their importance while considering architecture and design for IIoT applications.By the end of this book, you will have the skills you need to deploy IIoT applications on the Predix platform and incorporate best practices for developing fault-tolerant and reliable IIoT systems.

2438
Ładowanie...
EBOOK

Industrial IoT for Architects and Engineers. Architecting secure, robust, and scalable industrial IoT solutions with AWS

Joey Bernal, Bharath Sridhar

When it comes to using the core and managed services available on AWS for making decisions about architectural environments for an enterprise, there are as many challenges as there are advantages. This Industrial IoT book follows the journey of data from the shop floor to the boardroom, identifying goals and aiding in strong architectural decision-making.You’ll begin from the ground up, analyzing environment needs and understanding what is required from the captured data, applying industry standards and conventions throughout the process. This will help you realize why digital integration is crucial and how to approach an Industrial IoT project from a holistic perspective. As you advance, you’ll delve into the operational technology realm and consider integration patterns with common industrial protocols for data gathering and analysis with direct connectivity to data through sensors or systems. The book will equip you with the essentials for designing industrial IoT architectures while also covering intelligence at the edge and creating a greater awareness of the role of machine learning and artificial intelligence in overcoming architectural challenges.By the end of this book, you’ll be ready to apply IoT directly to the industry while adapting the concepts covered to implement AWS IoT technologies.

2439
Ładowanie...
EBOOK

Industrializing Financial Services with DevOps. Proven 360° DevOps operating model practices for enabling a multi-speed bank

Spyridon Maniotis

In recent years, large financial services institutions have been embracing the concept of DevOps in the core of their digital transformation strategies. This book is inspired by real enterprise DevOps adoptions in the financial services industry and provides a comprehensive proven practice guide on how large corporate organizations can evolve their DevOps operating model.The book starts by outlining the fundamentals comprising a complete DevOps operating model. It continues with a zoom in on those fundamentals, combining adoption frameworks with real-life examples. You’ll cover the three main themes underpinning the book’s approach that include the concepts of 360°, at relevance, and speeds. You’ll explore how a bank’s corporate and technology strategy links to its enterprise DevOps evolution. The book also provides a rich array of proven practices on how to design and create a harmonious 360° DevOps operating model which should be enabled and adopted at relevance in a multi-speed context. It comes packed with real case studies and examples from the financial services industry that you can adopt in your organization and context.By the end of this book, you will have plenty of inspiration that you can take back to your organization and be able to apply the learning from pitfalls and success stories covered in the book.

2440
Ładowanie...
AUDIOBOOK

Industrializing Financial Services with DevOps. Proven 360° DevOps operating model practices for enabling a multi-speed bank

Spyridon Maniotis

In recent years, large financial services institutions have been embracing the concept of DevOps in the core of their digital transformation strategies. This audiobook is inspired by real enterprise DevOps adoptions in the financial services industry and provides a comprehensive proven practice guide on how large corporate organizations can evolve their DevOps operating model.The audiobook starts by outlining the fundamentals comprising a complete DevOps operating model. It continues with a zoom in on those fundamentals, combining adoption frameworks with real-life examples. You’ll cover the three main themes underpinning the audiobook’s approach that include the concepts of 360°, at relevance, and speeds. You’ll explore how a bank’s corporate and technology strategy links to its enterprise DevOps evolution. The audiobook also provides a rich array of proven practices on how to design and create a harmonious 360° DevOps operating model which should be enabled and adopted at relevance in a multi-speed context. It comes packed with real case studies and examples from the financial services industry that you can adopt in your organization and context.By the end of this audiobook, you will have plenty of inspiration that you can take back to your organization and be able to apply the learning from pitfalls and success stories covered in the audiobook.

2441
Ładowanie...
EBOOK

Infinispan data grid platform definitive guide. Master Infinispan to create scalable and high-performance applications

This practical guide is intended for those who want to learn how to build extremely scalable applications. This book is easy to read and is aimed at Java enterprise developers with a solid knowledge of Java. However, no previous coding experience with Infinispan is required.

2442
Ładowanie...
EBOOK

Information Security Handbook. Develop a threat model and incident response strategy to build a strong information security framework

Darren Death

Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it’s important.It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you’ll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization’s requirements.

2443
Ładowanie...
EBOOK

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.

2444
Ładowanie...
EBOOK

Information Theory. A Tutorial Introduction to the Principles and Applications of Information Theory

James V Stone

This book offers a comprehensive journey through the fascinating world of information theory, beginning with the fundamental question: what is information? Early chapters introduce key concepts like entropy, binary representation, and data compression, providing a clear and accessible foundation. Readers explore Shannon's source coding theorem and practical tools like Huffman coding to understand how information is quantified and optimized.Building on these basics, the book delves into advanced topics such as the noisy channel coding theorem, mutual information, and error correction techniques. It examines entropy in continuous systems, channel capacity, and rate-distortion theory, making complex ideas accessible through real-world examples. Connections between information and thermodynamics are also explored, including Maxwell’s Demon, the Landauer Limit, and the second law of thermodynamics.The final chapters tie information theory to biology and artificial intelligence, investigating its role in evolution, the human genome, and brain computation. With practical examples throughout, this book balances theoretical depth with hands-on learning, making it an essential resource for mastering information theory. A basic mathematical foundation will be beneficial but is not required to engage with the material.

2445
Ładowanie...
EBOOK

Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices

Joseph MacMillan

Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.The book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals. As you make progress, you'll get to grips with design principles that can be utilized along with methods to assess and mitigate architectural vulnerabilities. The book will also help you to discover best practices for designing secure network architectures and controlling and managing third-party identity services. Finally, you will learn about designing and managing security testing processes, along with ways in which you can improve software security.By the end of this infosec book, you'll have learned how to make your organization less vulnerable to threats and reduce the likelihood and impact of exploitation. As a result, you will be able to make an impactful change in your organization toward a higher level of information security.

2446
Ładowanie...
EBOOK

Infrastructure as Code for Beginners. Deploy and manage your cloud-based services with Terraform and Ansible

Russ McKendrick

The Infrastructure as Code (IaC) approach ensures consistent and repeatable deployment of cloud-based IaaS/PaaS services, saving you time while delivering impeccable results. Infrastructure as Code for Beginners is a practical implementation guide that helps you gain a clear understanding of the foundations of Infrastructure as Code and make informed decisions when implementing it.With this book, you’ll uncover essential IaC concepts, including planning, selecting, and implementing the right tools for your project. With step-by-step explanations and real-world examples, you'll gain a solid understanding of the benefits of IaC and the scope of application in your projects. You'll learn about the pros, cons, and best practices of different IaC tools such as Terraform and Ansible, and their use at different stages of the deployment process along with GitHub Actions. Using these tools, you'll be able to design, deploy, and secure your infrastructure on two major cloud platforms, Microsoft Azure and Amazon Web Services. In addition, you'll explore other IaC tools such as Pulumi, AWS CloudFormation, and Azure Bicep.By the end of this book, you’ll be well equipped to approach your IaC projects confidently.

2447
Ładowanie...
EBOOK

Infrastructure as Code (IAC) Cookbook. Automate complex infrastructures

Stephane Jourdan, Pierre Pomes

Para 1: Infrastructure as code is transforming the way we solve infrastructural challenges. This book will show you how to make managing servers in the cloud faster, easier and more effective than ever before. With over 90 practical recipes for success, make the very most out of IAC.

2448
Ładowanie...
EBOOK

Infrastructure as Code with Azure Bicep. Streamline Azure resource deployment by bypassing ARM complexities

Yaser Adel Mehraban

It’s no secret that developers don’t like using JSON files to declare their resources in Azure because of issues such as parameter duplication and not being able to use comments in templates. Azure Bicep helps resolve these issues, and this book will guide you, as a developer or DevOps engineer, to get the most out of the Bicep language.The book takes you on a journey from understanding Azure Resource Manager (ARM) templates and what their drawbacks are to how you can use Bicep to overcome them. You will get familiar with tools such as Visual Studio Code, the Bicep extension, the Azure CLI, PowerShell, Azure DevOps, and GitHub for writing reusable, maintainable templates. After that, you’ll test the templates and deploy them to an Azure environment either from your own system or via a continuous integration and continuous delivery (CI/CD) pipeline. The book features a detailed overview of all the Bicep features, when to use what, and how to write great templates that fit well into your existing pipelines or in a new one. The chapters progress from easy to advanced topics and every effort has been put into making them easy to follow with examples, all of which are accessible via GitHub.By the end of this book, you’ll have developed a solid understanding of Azure Bicep and will be able to create, test, and deploy your resources locally or in your CI/CD pipelines.