Wydawca: Packt Publishing

Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
2393
Ładowanie...
EBOOK

Implementing VMware vCenter Server. This book starts with the basics then leads you by the hand through a complete Vmware vCenter Server implementation course. Designed to help you administer and manage your environment on a day to day basis

Kostantin Kuminsky

This book is a practical, hands-on guide that will help you learn everything you need to know to administer your environment with VMware vCenter Server. Throughout the book, there are best practices and useful tips and tricks which can be used for day-to-day tasks.If you are an administrator or a technician starting with VMware, with little or no knowledge of virtualization products, this book is ideal for you. Even if you are an IT professional looking to expand your existing environment, you will be able to use this book to help you improve the management of these environments. IT managers will find it helpful in terms of improving cost efficiency, ensuring required levels of service and utilising its excellent reporting abilities.

2394
Ładowanie...
EBOOK

Implementing VxRail HCI Solutions. A complete guide to VxRail Appliance administration and configuration

Victor Wu

Hyper-converged infrastructure (HCI) can help you simplify the provisioning and daily operations of computing and storage. With this book, you'll understand how HCI can offload the day 0 deployment and day-to-day operations of a system administrator. You'll explore the VxRail Appliance, which is an HCI solution that provides lifecycle management, automation, and operational simplicity. Starting with an overview of the VxRail Appliance system architecture and components, you'll understand the benefits of the VxRail system and compare it with the environment of traditional servers and storage. As you advance, the book covers topics such as disaster recovery and active-active and active-passive solutions for VxRail.By the end of this book, you'll have gained the confidence to manage the deployment, administration, planning, and design of a VxRail system.

2395
Ładowanie...
EBOOK

Improving CAD Designs with Autodesk Fusion 360. A project-based guide to modelling effective parametric designs

Kevin Michael Land

Autodesk Fusion 360 has become an indispensable tool for designers, tinkerers, and engineers worldwide thanks to its versatility that allows for large-scale assemblies and smaller, quick 3D prints. If you’ve faced challenges with learning Fusion 360, this book will help you overcome them and build the confidence to design your own projects, explaining step-by-step instructions and the purpose of each tool.In this book, you’ll dive into the design workspace and learn sketching fundamentals such as setting up a component, recognizing when a sketch is fully constrained, and parametrically flexing models. Through trial and error, you’ll work on multiple easy-to-build projects to create simple, useful items that can be quickly 3D printed for use around the house and then advance to much bigger projects that require joint connectivity and large assemblies.By the end of this book, you’ll be able to sketch fully parametric designs, translate them into 3D models, and create your own unique designs.

2396
Ładowanie...
EBOOK

Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#

Ovais Mehboob Ahmed Khan, John Callaway, Clayton...

This Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products:• C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan• Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt• The Modern C# Challenge by Rod Stephens

2397
Ładowanie...
EBOOK

Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit

Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira,...

Penetration testing (or ethical hacking) is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats.This Learning Path starts with an in-depth explanation of what hacking and penetration testing are. You’ll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it’s exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to strengthen your defense against online attacks.By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities.This Learning Path includes content from the following Packt books:• Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez• Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al.

2398
Ładowanie...
EBOOK

Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights

James D. Miller , Paul R. Johnson,...

Splunk makes it easy for you to take control of your data and drive your business with the cutting edge of operational intelligence and business analytics. Through this Learning Path, you'll implement new services and utilize them to quickly and efficiently process machine-generated big data.You'll begin with an introduction to the new features, improvements, and offerings of Splunk 7. You'll learn to efficiently use wildcards and modify your search to make it faster. You'll learn how to enhance your applications by using XML dashboards and configuring and extending Splunk. You'll also find step-by-step demonstrations that'll walk you through building an operational intelligence application. As you progress, you'll explore data models and pivots to extend your intelligence capabilities.By the end of this Learning Path, you'll have the skills and confidence to implement various Splunk services in your projects.This Learning Path includes content from the following Packt products:Implementing Splunk 7 - Third Edition by James MillerSplunk Operational Intelligence Cookbook - Third Edition by Paul R Johnson, Josh Diakun, et al

2399
Ładowanie...
EBOOK

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Cybersecurity threats are constantly evolving, posing serious risks to organizations. Incident Response for Windows, by cybersecurity experts Anatoly Tykushin and Svetlana Ostrovskaya, provides a practical hands-on guide to mitigating threats in Windows environments, drawing from their real-world experience in incident response and digital forensics.Designed for cybersecurity professionals, IT administrators, and digital forensics practitioners, the book covers the stages of modern cyberattacks, including reconnaissance, infiltration, network propagation, and data exfiltration. It takes a step-by-step approach to incident response, from preparation and detection to containment, eradication, and recovery. You will also explore Windows endpoint forensic evidence and essential tools for gaining visibility into Windows infrastructure. The final chapters focus on threat hunting and proactive strategies to identify cyber incidents before they escalate.By the end of this book, you will gain expertise in forensic evidence collection, threat hunting, containment, eradication, and recovery, equipping them to detect, analyze, and respond to cyber threats while strengthening your organization's security posture

2400
Ładowanie...
EBOOK

Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents

Dr. Erdal Ozkaya

Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes.In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks.The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting.Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere.By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.