Publisher: Packt Publishing
Tabassum Memon
Scaling a platform is a lot different than scaling a product. This is why product managers developing or transitioning to a platform model are often facing completely new challenges – both technical and strategic. But if you want to build the next Amazon, Netflix, Spotify, or a completely new type of platform, then you need to adopt a platform-first approach to change how you invent, develop, and market solutions. This is where Effective Product Platform Management comes in.This book addresses product management as a critical pillar of platform development. It'll help you understand the difference between traditional and modern product management for platforms and even decide whether the platform business model is the way to go for you.As you progress, you’ll be able to build the right platform strategy, define the MVP, and focus on ongoing backlog prioritization for successful platforms. This book will also walk you through the practical steps and guidelines that can ease your organization’s transition from linear products to platforms.By the end of this platform product management book, you’ll have learned the essential aspects of product management for building successful and scalable platforms. You’ll also have a clear understanding of the next steps you need to take to perfect and execute your new platform strategy – and take on the world.
Rejah Rehim
Penetration testing is a practice of testing a computer system, network, or web application to find weaknesses in security that an attacker can exploit. Effective Python Penetration Testing will help you utilize your Python scripting skills to safeguard your networks from cyberattacks. We will begin by providing you with an overview of Python scripting and penetration testing. You will learn to analyze network traffic by writing Scapy scripts and will see how to fingerprint web applications with Python libraries such as ProxMon and Spynner. Moving on, you will find out how to write basic attack scripts, and will develop debugging and reverse engineering skills with Python libraries. Toward the end of the book, you will discover how to utilize cryptography toolkits in Python and how to automate Python tools and libraries.
Luis Sanchez, Enrique Fernandez Perdomo, Anil Mahtani
Building and programming a robot can be cumbersome and time-consuming, but not when you have the right collection of tools, libraries, and more importantly expert collaboration. ROS enables collaborative software development and offers an unmatched simulated environment that simplifies the entire robot building process.This book is packed with hands-on examples that will help you program your robot and give you complete solutions using open source ROS libraries and tools. It also shows you how to use virtual machines and Docker containers to simplify the installation of Ubuntu and the ROS framework, so you can start working in an isolated and control environment without changing your regular computer setup.It starts with the installation and basic concepts, then continues with more complex modules available in ROS such as sensors and actuators integration (drivers), navigation and mapping (so you can create an autonomous mobile robot), manipulation, Computer Vision, perception in 3D with PCL, and more. By the end of the book, you’ll be able to leverage all the ROS Kinetic features to build a fully fledged robot for all your needs.
Mostafa Yahia
Effective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques. It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills.The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. Next, you’ll learn how to detect and investigate attackers' techniques and malicious activities within Windows environments. As you make progress, you’ll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis.By the end of this book, you’ll have learned how to analyze popular systems and security appliance logs that exist in any environment and explore various attackers' techniques to detect and investigate them with ease.
Dr. Nitin Paranjape
Efficiency Best Practices for Microsoft 365 covers the entire range of over 25 desktop and mobile applications on the Microsoft 365 platform. This book will provide simple, immediately usable, and authoritative guidance to help you save at least 20 minutes every day, advance in your career, and achieve business growth.You'll start by covering components and tasks such as creating and storing files and then move on to data management and data analysis. As you progress through the chapters, you'll learn how to manage, monitor, and execute your tasks efficiently, focusing on creating a master task list, linking notes to meetings, and more. The book also guides you through handling projects involving many people and external contractors/agencies; you'll explore effective email communication, meeting management, and open collaboration across the organization. You'll also learn how to automate different repetitive tasks quickly and easily, even if you’re not a programmer, transforming the way you import, clean, and analyze data.By the end of this Microsoft 365 book, you'll have gained the skills you need to improve efficiency with the help of expert tips and techniques for using M365 apps.
Jay Kimelman
Xero empowers business owners to gain insights into their business and performance and collaborate seamlessly with their accountants and tax professionals. This book goes beyond the basics and explores the more advanced Xero features, techniques, and best practices for managing sales taxes, budgeting, and reporting.You’ll begin by diving right into Xero, setting up a bank feed, and exploring its power while experiencing just how easy it is to use. The book will guide you in setting up Xero the right way to ensure that you succeed in each of your transactions. As you progress through the chapters, you’ll learn what spend money and receive money transactions are and be able to easily send invoices and collect receivables or payments, collect and pay bills, and even track your business assets with Xero. Toward the end, you’ll be proficient at producing powerful reports, giving you the keys to running or advising any business.By the end of this Xero book, you’ll have gained the confidence to add a company to Xero, set up the bank feeds, reconcile the transactions, send invoices, and pay bills, ending up with beautiful financial statements.
Efficient Algorithm Design. Unlock the power of algorithms to optimize computer programming
Masoud Makrehchi
Efficient Algorithm Design redefines algorithms, tracing the evolution of computer science as a discipline bridging natural science and mathematics. Author Masoud Makrehchi, PhD, with his extensive experience in delivering publications and presentations, explores the duality of computers as mortal hardware and immortal algorithms. The book guides you through essential aspects of algorithm design and analysis, including proving correctness and the importance of repetition and loops. This groundwork sets the stage for exploring algorithm complexity, with practical exercises in design and analysis using sorting and search as examples. Each chapter delves into critical topics such as recursion and dynamic programming, reinforced with practical examples and exercises that link theory with real-world applications. What sets this book apart is its focus on the practical application of algorithm design and analysis, equipping you to solve real programming challenges effectively.By the end of this book, you’ll have a deep understanding of algorithmic foundations and gain proficiency in designing efficient algorithms, empowering you to develop more robust and optimized software solutions.
Alfonso San Miguel Sánchez, Danny Obando García
In response to the escalating challenges of cloud adoption, where balancing costs and maximizing cloud values is paramount, FinOps practices have emerged as the cornerstone of fi nancial optimization. This book serves as your comprehensive guide to understanding how FinOps is implemented in organizations worldwide through team collaboration and proper cloud governance.Presenting FinOps from a practical point of view, covering the three phases—inform, optimize, and operate—this book demonstrates an end-to-end methodology for optimizing costs and performing financial management in the cloud. You’ll learn how to design KPIs and dashboards for judicious cost allocation, covering key features of cloud services such as reserved instances, rightsizing, scaling, and automation for cost optimization. This book further simplifi es architectural concepts and best practices, enabling you to design superior and more optimized solutions. Finally, you’ll discover potential synergies and future challenges, from the integration of artifi cial intelligence to cloud sustainability considerations, to prepare for the future of cloud FinOps.By the end of this book, you’ll have built the expertise to seamlessly implement FinOps practices across major public clouds, armed with insights and ideas to propel your organization toward business growth.