Publisher: Packt Publishing
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
Tom Piens aka 'reaper', Rutger Truyers
Understand how Palo Alto Networks’ firewall as a service (FWaaS) platform Prisma Access offers secure access to internal and external resources to mobile users and branch offices. Written by Palo Alto Networks expert Tom Piens, a renowned mentor instrumental in fostering a dynamic learning environment within the Palo Alto Networks LIVE community, this guide is your roadmap to harnessing the full potential of this platform and its features.The first set of chapters will introduce you to the concept of cloud-delivered security and the key components of Prisma Access. As you progress, you’ll gain insights into how Prisma Access fits into the larger security landscape and its benefits for organizations seeking a secure and scalable solution for their remote networks and mobile workforce.From setting up secure connections, implementing advanced firewall policies, harnessing threat prevention capabilities, and securing cloud applications and data, each chapter equips you with essential knowledge and practical skills.By the end of this book, you will be armed with the necessary guidance and insights to implement and manage a secure cloud network using Prisma Access successfully.
Implementing Qlik Sense. Design, Develop, and Validate BI solutions for consultants
Ganapati Hegde, Kaushik Solanki
Qlik Sense is a leading platform for business intelligence (BI) solutions. Qlik Sense helps organizations in making informed decisions based on the data they have.This book will teach you how to effectively use Qlik for optimum customer satisfaction. You will undergo a metamorphosis from a developer to a consultant who is capable of building the most suitable BI solutions for your clients. The book will take you through several business cases – this will give you enough insight to understand the needs of the client clearly and build a BI solution that meets or exceeds their expectations. Starting from the pre-project activities, you will go to the actual execution of the project, the implementation, and even maintenance. This book will give you all the information you need - from the strategy to requirement gathering to implementing BI solutions using Qlik Sense. The book will empower you to take the right decisions in tricky and diffi cult situations while developing analytics and dashboards.
James D. Miller
Splunk is the leading platform that fosters an efficient methodology and delivers ways to search, monitor, and analyze growing amounts of big data. This book will allow you to implement new services and utilize them to quickly and efficiently process machine-generated big data. We introduce you to all the new features, improvements, and offerings of Splunk 7. We cover the new modules of Splunk: Splunk Cloud and the Machine Learning Toolkit to ease data usage. Furthermore, you will learn to use search terms effectively with Boolean and grouping operators. You will learn not only how to modify your search to make your searches fast but also how to use wildcards efficiently. Later you will learn how to use stats to aggregate values, a chart to turn data, and a time chart to show values over time; you'll also work with fields and chart enhancements and learn how to create a data model with faster data model acceleration. Once this is done, you will learn about XML Dashboards, working with apps, building advanced dashboards, configuring and extending Splunk, advanced deployments, and more. Finally, we teach you how to use the Machine Learning Toolkit and best practices and tips to help you implement Splunk services effectively and efficiently. By the end of this book, you will have learned about the Splunk software as a whole and implemented Splunk services in your tasks at projects
VINCENT BUMGARNER
Splunk is a data collection, indexing, and visualization engine for operational intelligence. It's a powerful and versatile search and analysis engine that lets you investigate, troubleshoot, monitor, alert, and report on everything that's happening in your entire IT infrastructure from one location in real time. Splunk collects, indexes, and harnesses all the fast moving machine data generated by our applications, servers, and devices - physical, virtual, and in the cloud.Given a mountain of machine data, this book shows you exactly how to learn to use Splunk to make something useful from it. Depending on your needs, you can learn to search, transform, and display data, or learn to administer your Splunk installation, large or small. Implementing Splunk: Big Data Reporting and Development for Operational Intelligence will help you get your job done faster, whether you read from the beginning or jump to what you need to know today. New and experienced users alike will find nuggets of wisdom throughout.This book provides you with valuable examples and step-by-step instructions, showing you how to take advantage of everything Splunk has to offer you, to make the most out of your machine data.Implementing Splunk: Big Data Reporting and Development for Operational Intelligence takes you on a journey right from inception to a fully functioning implementation of Splunk. Using a real-world data walkthrough, you'll be shown how to search effectively, create fields, build dashboards, reports, and package apps, manage your indexes, integrate into the enterprise, and extend Splunk. This practical implementation guide equips you with high-level knowledge for configuring, deploying, extending, and integrating Splunk. Depending on the goal and skills of the reader, enough topics are covered to get you on your way to dashboard guru, app developer, or enterprise administrator. This book uses examples curates reference, and sage advice to help you make the most of this incredibly powerful tool.
VINCENT BUMGARNER, James D. Miller
If you are a data analyst with basic knowledge of Big Data analysis but no knowledge of Splunk, then this book will help you get started with Splunk. The book assumes that you have access to a copy of Splunk, ideally not in production, and many examples also assume you have administrator rights.
Michael Whitehead, Angel Maga?É?íÂ!+-a, Angel Magana, Michael...
SugarCRM is a popular customer relationship management system. It is an ideal way for small-medium business to try out a CRM system without committing large sums of money. Although SugarCRM is carefully designed for ease of use, attaining measurable business gains requires careful planning and research.This book will give you all the information you need to start using this powerful CRM system. It is the definitive guide to implementing SugarCRM. Whether you are wondering exactly what benefits CRM can bring or you have already learned about CRM systems but have yet to implement one or you're working with SugarCRM already, this book will show you how to get maximum benefit from this exciting product. It demonstrates how to install SugarCRM and also how to get the most out of it by customizing it and integrating CRM into your organization as per your needs.Focused on the needs of the enterprise, this book provides a solution-driven approach for both business and IT specialists to get the most from this powerful and popular Open Source application. It begins with a general discussion about CRM. You will then learn the benefits of such systems, and then explore SugarCRM and its unique value. You will then go through the guidelines for installing and making deployment selections that are set out alongside information for identifying, planning, and applying customizations. Training guidelines and ongoing administrative tasks will be discussed as you progress further into the book. A brief overview of SugarCRM 6.0 is provided at the end of the book.
Implementing VMware Horizon 7. Second Edition - Second Edition
Jason Ventresco
VMware Horizon 7 has been a buzz since it was announced. One of the major reasons is the introduction of the new Instant Clones feature. This book will complement the product documentation by providing real-life examples of how it is implemented along with the latest features and components of the platform.We'll explore the latest features of the platform, including those added through product acquisitions such as User Environment Manager and App Volumes. Further on, you will also be introduced to the new capabilities added to the core product such Linked-Clone RDS pools.Upon completion of this book, you will have an understanding of the capabilities and benefits VMware Horizon can provide to your organization, and how each of its components are implemented.
Jason Ventresco
This third edition of Implementing VMware Horizon 7.7 has been updated to get you up to speed with VMware Horizon 7.7 by showing you how to use its key features and deploying an end-user computing infrastructure for your own organization.The book begins by guiding you on how to deploy all the core requirements for a VMware Horizon infrastructure. It then moves on to show you how to provision and administer end-user computing resources using VMware Horizon. You’ll not only be able to deploy the core VMware Horizon features, but you’ll also be able to implement new features, such as the Just-in-Time Management Platform (JMP) and the Horizon Console. You’ll also focus on the latest features and components of the Horizon platform and learn when and how they are used.By the end of the book, you will have developed a solid understanding of how your organization can benefit from the capabilities VMware Horizon offers and how each of its components is implemented.
Jason Ventresco
VMware Horizon View helps you simplify desktop and application management while increasing security and control. This book will introduce you to all of the components of the VMware Horizon View suite, walk you through their deployment, and show how they are used. We will also discuss how to assess your virtual desktop resource requirements, and build an optimized virtual desktop. Implementing VMware Horizon View 5.2 will provide you the information needed to deploy and administer your own end-user computing infrastructure. This includes not only the View components themselves, but key topics such as assessing virtual desktop resource needs, and how to optimize your virtual desktop master image.You will learn how to design and deploy a performant, flexible and powerful desktop virtualization solution using VMware Horizon View. You will implement important components and features, such as VMware View Connection Server, VMware View Composer, VMware View Transfer Server, and VMware View Security Server.Implementing VMware Horizon View 5.2 will take you through application virtualization with VMware ThinApp, the implementation of Persona Management, and creation of Desktop Pools. We then cover View Client options, Desktop maintenance, and Virtual Desktop Master Image. Finally we discuss View SSL certificates management, Group Policies, PowerCLI, and VMware View Design and Maintenance to help you get the most out of VMware View.If you want to learn how to design, implement and administrate a complex, optimized desktop virtualization solution with VMware View, then this book is for you.
Kostantin Kuminsky
This book is a practical, hands-on guide that will help you learn everything you need to know to administer your environment with VMware vCenter Server. Throughout the book, there are best practices and useful tips and tricks which can be used for day-to-day tasks.If you are an administrator or a technician starting with VMware, with little or no knowledge of virtualization products, this book is ideal for you. Even if you are an IT professional looking to expand your existing environment, you will be able to use this book to help you improve the management of these environments. IT managers will find it helpful in terms of improving cost efficiency, ensuring required levels of service and utilising its excellent reporting abilities.
Victor Wu
Hyper-converged infrastructure (HCI) can help you simplify the provisioning and daily operations of computing and storage. With this book, you'll understand how HCI can offload the day 0 deployment and day-to-day operations of a system administrator. You'll explore the VxRail Appliance, which is an HCI solution that provides lifecycle management, automation, and operational simplicity. Starting with an overview of the VxRail Appliance system architecture and components, you'll understand the benefits of the VxRail system and compare it with the environment of traditional servers and storage. As you advance, the book covers topics such as disaster recovery and active-active and active-passive solutions for VxRail.By the end of this book, you'll have gained the confidence to manage the deployment, administration, planning, and design of a VxRail system.
Kevin Michael Land
Autodesk Fusion 360 has become an indispensable tool for designers, tinkerers, and engineers worldwide thanks to its versatility that allows for large-scale assemblies and smaller, quick 3D prints. If you’ve faced challenges with learning Fusion 360, this book will help you overcome them and build the confidence to design your own projects, explaining step-by-step instructions and the purpose of each tool.In this book, you’ll dive into the design workspace and learn sketching fundamentals such as setting up a component, recognizing when a sketch is fully constrained, and parametrically flexing models. Through trial and error, you’ll work on multiple easy-to-build projects to create simple, useful items that can be quickly 3D printed for use around the house and then advance to much bigger projects that require joint connectivity and large assemblies.By the end of this book, you’ll be able to sketch fully parametric designs, translate them into 3D models, and create your own unique designs.
Ovais Mehboob Ahmed Khan, John Callaway, Clayton...
This Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products:• C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan• Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt• The Modern C# Challenge by Rod Stephens
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira,...
Penetration testing (or ethical hacking) is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats.This Learning Path starts with an in-depth explanation of what hacking and penetration testing are. You’ll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it’s exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to strengthen your defense against online attacks.By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities.This Learning Path includes content from the following Packt books:• Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez• Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al.
James D. Miller , Paul R. Johnson,...
Splunk makes it easy for you to take control of your data and drive your business with the cutting edge of operational intelligence and business analytics. Through this Learning Path, you'll implement new services and utilize them to quickly and efficiently process machine-generated big data.You'll begin with an introduction to the new features, improvements, and offerings of Splunk 7. You'll learn to efficiently use wildcards and modify your search to make it faster. You'll learn how to enhance your applications by using XML dashboards and configuring and extending Splunk. You'll also find step-by-step demonstrations that'll walk you through building an operational intelligence application. As you progress, you'll explore data models and pivots to extend your intelligence capabilities.By the end of this Learning Path, you'll have the skills and confidence to implement various Splunk services in your projects.This Learning Path includes content from the following Packt products:Implementing Splunk 7 - Third Edition by James MillerSplunk Operational Intelligence Cookbook - Third Edition by Paul R Johnson, Josh Diakun, et al
Durgesh Kalya, Marco (Marc) Ayala
Incident Management for Industrial Control Systems is a practical guide that highlights the vital role of effective incident response in protecting complex industrial environments.The author distills nearly two decades of experience in this book to explain the foundational role of critical infrastructure (CI), exploring the world of operational technology (OT), emphasizing Industrial Automation and Control Systems (IACS) and their evolving threat landscape. The book simplifies the complexities of incident command systems (ICSs) for CI, addressing emergency operations, specialized frameworks, and compliance standards. With actionable insights, it also guides you through drills, scenario planning, and improving response strategies across varied operational environments.You’ll gain practical experience in ICS-focused training and exercises, grounded in widely adopted industry frameworks. The chapters further discuss FEMA’s ICS, OT fundamentals, and the nuances of incident management standards.By the end of this book, you'll have a solid grasp of CI operations, core cybersecurity principles, and the dynamics of incident response across industrial control systems and broader OT environments.*Email sign-up and proof of purchase required
Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov
Cybersecurity threats are constantly evolving, posing serious risks to organizations. Incident Response for Windows, by cybersecurity experts Anatoly Tykushin and Svetlana Ostrovskaya, provides a practical hands-on guide to mitigating threats in Windows environments, drawing from their real-world experience in incident response and digital forensics.Designed for cybersecurity professionals, IT administrators, and digital forensics practitioners, the book covers the stages of modern cyberattacks, including reconnaissance, infiltration, network propagation, and data exfiltration. It takes a step-by-step approach to incident response, from preparation and detection to containment, eradication, and recovery. You will also explore Windows endpoint forensic evidence and essential tools for gaining visibility into Windows infrastructure. The final chapters focus on threat hunting and proactive strategies to identify cyber incidents before they escalate.By the end of this book, you will gain expertise in forensic evidence collection, threat hunting, containment, eradication, and recovery, equipping them to detect, analyze, and respond to cyber threats while strengthening your organization's security posture
Dr. Erdal Ozkaya
Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes.In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks.The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting.Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere.By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.
Oleg Skulkin
Ransomware attacks have become the strongest and most persistent threat for many companies around the globe. Building an effective incident response plan to prevent a ransomware attack is crucial and may help you avoid heavy losses. Incident Response Techniques for Ransomware Attacks is designed to help you do just that.This book starts by discussing the history of ransomware, showing you how the threat landscape has changed over the years, while also covering the process of incident response in detail. You’ll then learn how to collect and produce ransomware-related cyber threat intelligence and look at threat actor tactics, techniques, and procedures. Next, the book focuses on various forensic artifacts in order to reconstruct each stage of a human-operated ransomware attack life cycle. In the concluding chapters, you’ll get to grips with various kill chains and discover a new one: the Unified Ransomware Kill Chain.By the end of this ransomware book, you’ll be equipped with the skills you need to build an incident response strategy for all ransomware attacks.
Roberto Martinez
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization.Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules.By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
Dale Cruse, Denis Boudreau, Glenda Sims
Despite our growing reliance on digital technology, millions of users are still excluded from fully engaging with websites, apps, and digital services because nobody thought to design for them. Inclusive Design for Accessibility challenges you to rethink how you build digital experiences, offering the tools and guidance needed to move beyond compliance and create experiences that work for everyone.With contributions from twelve accessibility leaders—Dale Cruse, Denis Boudreau, Dr. Angela Young, Maya Sellon, Julianna Rowsell, Nandita Gupta, Jennifer Chadwick, Crystal Scott, Chris McMeeking, Dr. Keith Newton, Charlie Triplett, and Kai Wong—this book lays out the fundamentals of inclusive design and its application in advanced and emerging technologies. You'll discover practical strategies and real-world examples that show you how to embed accessibility into projects, from user research and testing to creating accessible websites and mobile apps. You’ll also focus on how AI can enhance accessibility and learn to tackle the challenges posed by VR and AR.For designers, developers, product managers, and business leaders, this book will reshape how you approach inclusive design, helping you move beyond ticking boxes toward building digital products that don't leave anyone behind.*Email sign-up and proof of purchase required
Fabio Roberti, Decio Ferreira
Increasing Autodesk Revit Productivity for BIM Projects takes a hands-on approach to implementing Revit effectively for everyone curious about this new and exciting methodology.Complete with step-by-step explanations of essential concepts and practical examples, this Revit book begins by explaining the principles of productivity in Revit and data management for BIM projects. You'll get to grips with the primary BIM documentation to start a BIM project, including the contract, Exchange Information Requirements (EIR), and BIM Execution Plan (BEP/BXP). Later, you'll create a Revit template, start a Revit project, and explore the core functionalities of Revit to increase productivity. Once you've built the foundation, you'll learn about Revit plugins and use Dynamo for visual programming and Power BI for analyzing BIM information.By the end of this book, you'll have a solid understanding of Revit as construction and design software, how to increase productivity in Revit, and how to apply multiple workflows in your project to manage BIM.
Olushola Akande
Industrial automation has become a popular solution for various industries looking to reduce manual labor inputs and costs by automating processes. This book helps you discover the abilities necessary for excelling in this field.The book starts with the basics of industrial automation before progressing to the application of switches, sensors, actuators, and motors, and a direct on-line (DOL) starter and its components, such as circuit breakers, contactors, and overload relay. Next, you'll explore VFDs, their parameter settings, and how they can be wired and programmed for induction motor control. As you advance, you'll learn the wiring and programming of major industrial automation tools – PLCs, HMIs, and SCADA. You’ll also get to grips with process control and measurements (temperature, pressure, level, and flow), along with analog signal processing with hands-on experience in connecting a 4–20 mA transmitter to a PLC. The concluding chapters will help you grasp various industrial network protocols such as FOUNDATION Fieldbus, Modbus, PROFIBUS, PROFINET, and HART, as well as emerging trends in manufacturing (Industry 4.0) and its empowering technologies (such as IoT, AI, and robotics).By the end of this book, you’ll have gained a practical understanding of industrial automation concepts for machine automation and control.