Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
-
The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This book will take you through the latest version of Kali Linux to help you efficiently deal with crucial security aspects such as confidentiality, integrity, availability, and access control.
- PDF + ePub pkt
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition
-
This book will guide you in improving your security posture and building robust and predictable security operations. You'll learn to design processes for the changing landscape of security operations, from designing defensive architectures to passive defense, blue and purple teaming, threat intelligence agility, measuring business values, and more.
- PDF + ePub pkt
Agile Security Operations. Engineering for agility in cyber defense, detection, and response Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Veeam provides data protection for modern-day technical organizations. This book takes you through installation best practices, optimizations, and the 3-2-1-1-0 rule, before going on to examine repository and proxy-related topics and advanced concepts such as CDP, extended object storage support, Veeam ONE enhancement, and Orchestrator.
- PDF + ePub pkt
Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition
-
A good security posture is essential for an organization's Microsoft 365 tenant. This book will help you to understand how you can design and implement Information Protection within Microsoft 365 to protect your digital estate, on-premises as well as on SaaS platforms.
- PDF + ePub pkt
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Use Microsoft’s own intelligent security service that brings together cloud security and AI to protect your organization. Microsoft Sentinel in Action will help you to gain enough understanding to make the most of Azure services and secure your environment against modern cybersecurity threats.
- PDF + ePub pkt
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
This book is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.
- PDF + ePub pkt
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!
- PDF + ePub pkt
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.
- PDF + ePub pkt
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
CISM is a globally recognized and much sought-after certification in the field of IT security. CISM Certification Guide is aligned with the latest edition of the CISM Review Manual and offers you complete, up-to-date coverage of CISM exam content so you can take the exam with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Penetration Testing Azure for Ethical Hackers provides in-depth explanations of common security issues in Azure environments and tutorials on how to set up a pentesting lab and execute attacks on Azure assets. It will help you gain a deeper understanding of how Azure environments are configured, and more importantly, how they can be misconfigured.
- PDF + ePub + Mobi pkt
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps penetration testers set up persistence and facilitates lateral movement. This book is a one-of-a-kind resource that covers both the theoretical foundations and a range of privilege escalation techniques and tools for both Windows and Lin
- PDF + ePub + Mobi pkt
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Hands-On Dynamic Story Scripting with the ink Scripting Language shows you how to quickly move from learning the fundamentals of ink, the must-have narrative scripting language for games, to leveraging it to create everything from simple interactive stories to complex narrative-driven projects in Unity.
- PDF + ePub + Mobi pkt
Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects
-
Security is a core component of any well-architected cloud environment and Azure is no different in this regard. With this book, you will learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environments and prepare to take the AZ-500 exam to validate your Azure security knowledge.
- PDF + ePub + Mobi pkt
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
This second edition of Industrial Cybersecurity is a practical guide to implementing a comprehensive and solid security program for the ICS environment. This book shows anyone new to industrial security or professionals looking to extend their industrial security posture how to effectively monitor their ICS environment.
- PDF + ePub + Mobi pkt
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Mastering Microsoft Endpoint Manager will teach you how to manage your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing a new and simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.
- PDF + ePub + Mobi pkt
Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
With over 1000 practice questions, explanations of all 8 domains, and 2 full exams, this book is a fantastic exam prep solution. Take the CISSP exam (version May 2021) confidently with the help of mock questions and detailed solutions and validate your skills with the CISSP (ISC)2 certification.
- PDF + ePub + Mobi pkt
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Cybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
-
This book explores how Nmap is one of the most robust tools for network discovery and security auditing. You’ll focus on how you can use it to perform hundreds of different tasks, from OS detection and port scanning to advanced fingerprinting and vulnerability exploitation.
- PDF + ePub + Mobi pkt
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Elastic security offers enhanced threat hunting capabilities to build active defense strategies. Complete with practical examples and tips, this easy-to-follow guide will help you enhance your security skills by leveraging the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting.
- PDF + ePub + Mobi pkt
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Antivirus Bypass Techniques follows a unique approach that will help you explore the security landscape, understand the fundamentals of antivirus software, and put antivirus bypass techniques to use. This book will enable you to bypass antivirus software solutions in order to develop efficient antivirus software.
- PDF + ePub + Mobi pkt
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
This book focuses largely on different methodologies for connecting remote users, highlighting the benefits and drawbacks as well as step-by-step instructions. You’ll understand phishing prevention and log forwarding, and find a comprehensive section on troubleshooting common issues with the help of examples.
- PDF + ePub + Mobi pkt
Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls
-
Get hands-on with practical ethical hacking from scratch using Python. With the help of step-by-step instructions and practical exercises, you'll develop tools that provide detailed insights into the ethical hacking thought process. This book also covers aspects of network and system hacking along with defense techniques.
- PDF + ePub + Mobi pkt
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
If you’re a designer working with Revit, this Autodesk Revit book will guide you through improving productivity and efficiency in your day-to-day tasks. With the help of this book, you'll be able to set up your Revit projects, explore Revit's core functionalities, use Dynamo for visual programming, and leverage Power BI to analyze BIM inform
- PDF + ePub + Mobi pkt
Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects
-
Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.
- PDF + ePub + Mobi pkt
Malware Analysis Techniques. Tricks for the triage of adversarial software Malware Analysis Techniques. Tricks for the triage of adversarial software
-
By taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the
- PDF + ePub
- Audiobook MP3 pkt
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Every minute of the day, there are petabytes of data exchanged between our homes, cars, businesses, and IoT devices. But just what exactly is involved when using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals will help you to understand common cryptographic techniques and terms used today to secure our data.
- PDF + ePub + Mobi pkt
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
Zscaler Cloud Security Essentials will show you how to leverage the power of Zscaler by jumping right into the design, deployment, and support of a customized Zscaler solution. You'll discover the capabilities of Zscaler through real-world deployment and explore Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) in detail.
- PDF + ePub + Mobi pkt
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
The Cisco Certified CyberOps Associate 200-201 certification exam helps you gain the skills and knowledge needed to prevent, detect, analyze, and respond to cybersecurity incidents. This book offers complete up-to-date coverage of the 200-201 exam so you can confidently pass first time while getting hands-on cybersecurity experience.
- PDF + ePub + Mobi pkt
Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
-
Information security strategies and best practices help in filling the gap that exists between theory and reality. The book starts by showing you how to implement risk management and governance structures into your organization and goes on to cover the best methods for operationalizing your information security strategy.
- PDF + ePub + Mobi pkt
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
This book covers the finer details of microcontrollers and low-powered embedded device programming with TinyGo. You’ll work through a range of interactive and real-world embedded projects that will help you to build creative thinking and understand a variety of TinyGo features and capabilities for programming hardware and multiple input devi
- PDF + ePub + Mobi pkt
Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation
-
Whether you are a tester or a developer working with APIs, you'll be able to put your knowledge to work with this practical guide to using Postman. The book provides a hands-on approach to implementing and learning the associated methodologies that will have you up-and-running and productive in no time.
- PDF + ePub + Mobi pkt
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing
-
Hardware security has become a major concern in recent times making it crucial for companies and end users to focus on protecting hardware. If you’re a security practitioner who is more familiar with software and binary hacking or someone looking to repurpose devices, this book will demonstrate how to approach hardware hacking of embedded de
- PDF + ePub + Mobi pkt
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
This book is a comprehensive guide for organizations on how to prepare for cyber-attacks and control cyber threats and network security breaches in a way that decreases damage, recovery time, and costs, facilitating the adaptation of existing strategies to cloud-based environments.
- PDF + ePub + Mobi pkt
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Veeam is an infrastructure backup solution for VMware vSphere or Hyper-V to enable VM and server backup. This book takes you through installation best practices, optimizations, and the 3-2-1 rule, before going on to examine repository and proxy-related topics and finally advanced topics such as DataLabs, Instant VM Recovery, and Veeam ONE.
- PDF + ePub + Mobi pkt
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Threat hunting is the act of proactively tracking and eliminating adversaries from your network as early as possible. Practical Threat Intelligence and Data-Driven Threat Hunting covers both threat intelligence and the act of threat hunting from the first steps to advanced practices.
- PDF + ePub + Mobi pkt
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Explore the capabilities of the Roblox platform to create real-world games with this book. You’ll follow a hands-on approach to learning the implementation and associated methodologies and get up and running with Roblox Lua in no time.
- PDF + ePub + Mobi pkt
Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming
-
Ghidra is the NSA’s state-of-the-art reverse engineering framework. It is open source, allowing the community to extend it with impressive range of features. This book offers a comprehensive introduction to anyone new to the Ghidra reverse engineering framework and malware reverse engineering.
- PDF + ePub + Mobi pkt
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Python’s latest updates feature numerous packages that can be used to perform critical missions. This Python networking and security book will help you to use Python packages to detect vulnerabilities in web apps and tackle networking challenges. You’ll explore a variety of techniques and tools for networking and security in Python.
- PDF + ePub + Mobi pkt
Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition
-
The CompTIA Security+: SY0-601 Certification Guide makes the most complex Security+ concepts easy to understand even for those who have no prior knowledge. Complete with exam tips, practical exercises, mock exams, and exam objective mappings, this is the perfect study guide to help you obtain Security+ certification.
- PDF + ePub + Mobi pkt
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
AWS is a very popular cloud service that many organizations are implementing into their infrastructure. AWS Penetration Testing is a comprehensive introduction for those who are new to AWS and Ethical hacking, that will have you up-to-speed in no time.
- PDF + ePub + Mobi pkt
AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
-
This book provides a comprehensive view of blockchain business models, governance structure, technology landscape, and architecture considerations. It will speed up your understanding and concept development for distributed ledgers.
- PDF + ePub + Mobi pkt
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
Nitin Gaur, Anthony O'Dowd, Petr Novotny, Luc Desrosiers, Venkatraman Ramakrishna, Salman A. Baset
-
After prominent market leaders have been impacted by advanced cyber threats, network security has become a top priority in terms of successfully keeping attackers from breaching networks. This book will help you design a robust network security ecosystem that helps prevent traditional and new and evolving attacks.
- PDF + ePub + Mobi pkt
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Biometric technology provides a robust and convenient method for authenticating an individual’s identity using fingerprint, iris, voice, palm print, or facial recognition. Identity Management with Biometrics will help you identify and address the challenges that you will need to consider as you move into the next iteration of identity protec
- PDF + ePub + Mobi pkt
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Mastering Blockchain, Third Edition is the blockchain bible to equip you with extensive knowledge of distributed ledgers, cryptocurrencies, smart contracts, consensus algorithms, cryptography and blockchain platforms such as Ethereum, Bitcoin, and many more.
- PDF + ePub + Mobi pkt
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
AI and blockchain are catalyzing the pace of enterprise innovation. This book is a guide to learn the basic concepts, analyze use-cases and implement these technologies across various industries such as healthcare, finance, trade, and supply chain. The book also guides you to build applications using Ethereum, machine learning and MóiBit.
- PDF + ePub + Mobi pkt
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Kubernetes is a widely used opensource orchestration platform for managing container applications. Developers are not yet aware of the pitfalls of a containerized environment. This book takes you through core security principles, best practices, and real-world use cases to learn mitigation or prevention strategies from known attacks and CVEs.
- PDF + ePub + Mobi pkt
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
MS-500: Microsoft 365 Security Administration offers complete, up-to-date coverage of the MS-500 exam so you can take it with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.
- PDF + ePub + Mobi pkt
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.
- PDF + ePub + Mobi pkt
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator.
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.
- PDF + ePub + Mobi pkt
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10.
- PDF + ePub + Mobi pkt
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
-
Azure Sentinel is an intelligent security service from Azure where Microsoft's main focus on developing sentinel is to integrate and bring together cloud security and artificial intelligence into effect. Here readers will gain enough understanding to make the most of Azure services to secure their environment from modern cybersecurity threats.
- PDF + ePub + Mobi pkt
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Cybersecurity Attacks: Red Team Strategies is a guide to building and maturing an internal red team program. It highlights the core strategies to measure and improve security awareness, breach detection, and response capabilities. In addition, we will dive into the technical details of tactics and techniques for red teamers of all skill levels.
- PDF + ePub + Mobi pkt
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
A first-hand look into how quantum computing and Blockchain together are redefining industries, including fintech, healthcare, and research. Through a series of interviews with domain experts, Arun also explores the potential of these technologies to transform national and global governance and policies.
- PDF + ePub + Mobi pkt
Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain
-
Artificial Intelligence (AI) gets your system to think smart and learn intelligently. This book is packed with some of the smartest trending examples with which you will learn the fundamentals of AI. By the end, you will have acquired the basics of AI by practically applying the examples in this book.
- PDF + ePub + Mobi pkt
Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition
-
Hands-On Restful Web Services with Go will help you in understanding the fundamentals of REST and enable you to quickly develop graceful API with the help of Golang's open-source tools and libraries. It can be a developer guide in general that covers all key aspects of API development and standard architecture patterns in application development.
- PDF + ePub + Mobi pkt
Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition
-
Taking an engaging and practical approach, The Supervised Learning Workshop teaches you how to predict the output of new data, based on the relationship and behavior of?existing datasets. You’ll learn at your own pace and use Python libraries and Jupyter to build intelligent predictive models.?
- PDF + ePub + Mobi pkt
The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition
Blaine Bateman, Ashish Ranjan Jha, Benjamin Johnston, Ishita Mathur
-
AWS Security Cookbook lists all the practical solutions to the common problems faced by individuals or organizations in securing their instances. Here readers will learn to troubleshoot security concerns and understand additional patterns and services for securing AWS infrastructure.
- PDF + ePub + Mobi pkt
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
A new edition of the bestselling Pandas cookbook updated to pandas 1.x with new chapters on creating and testing, and exploratory data analysis. Recipes are written with modern pandas constructs. This book also covers EDA, tidying data, pivoting data, time-series calculations, visualizations, and more.
- PDF + ePub + Mobi pkt
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Cyber Warfare – Truth, Tactics, and Strategies takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools and strategies presented for you to learn how to think about defendin
- PDF + ePub + Mobi pkt
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Blockchain technology will play a disruptive role in the banking and finance sector in the future. Experts estimate that it will save up to 20 billion dollars annually. You will build full-fledged financial applications using blockchain. It will aid you in building more secure and transparent workflows and re-engineering your business processes.
- PDF + ePub + Mobi pkt
Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar
-
With six new chapters, Deep Reinforcement Learning Hands-On Second edition is completely updated and expanded with the very latest reinforcement learning (RL) tools and techniques, providing you with an introduction to RL, as well as the hands-on ability to code intelligent learning agents to perform a range of practical tasks.
- PDF + ePub + Mobi pkt
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety.
- PDF + ePub + Mobi pkt
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book that covers the very latest security threats and defense strategies, updated for 2020.
- PDF + ePub + Mobi pkt
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Electron is one of the most popular JavaScript frameworks for building cross-platform desktop applications. This project-based guide will help you explore the components of the Electron framework and its integration with other JS libraries to build real-world desktop apps with an increasing level of complexity.
- PDF + ePub + Mobi pkt
Electron Projects. Build over 9 cross-platform desktop applications from scratch Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
The MS-101 exam is part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path in which users learn to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This book offers complete, up-to-date coverage of the MS-101 exam so you can take them with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365 Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
This book helps data scientists and cybersecurity experts on implementing the latest AI techniques in cybersecurity. Concrete and clear steps for implementing ML security systems are provided, saving you months in research and development. By the end of this book, you will be able to build defensive systems to curb cybersecurity threats.
- PDF + ePub + Mobi pkt
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication.
- PDF + ePub + Mobi pkt
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Get ready to pass your CompTIA Security+ certification exam with the elaborate and complete practice that Security+? Practice Tests will provide you. From detailed explanations of the six domains to full-length practice tests, you’ll gain complete knowledge of what this test contains and how to ace it.
- PDF + ePub pkt
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
This book will cover use-cases on how blockchain is currently being used in the industry - catering to key decision-makers within an organization. It also addresses the real problems and technical difficulties in implementing blockchain, and the various blockchain strategies being adopted by popular organizations all over the world.
- PDF + ePub + Mobi pkt
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.
- PDF + ePub + Mobi pkt
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Blockchain empowers enterprises to scale out in a unique way, allowing them to build and manage blockchain business networks. This book offers an exploration of distributed ledger technology, blockchain, and Hyperledger fabric along with blockchain-as-a-service (BaaS).
- PDF + ePub + Mobi pkt
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
This Learning Path is your comprehensive guide to making machine data accessible across your organization using advanced dashboards. With over 80 realistic examples, you'll get several recipes to use Splunk and transform your data into business-critical insights.
- PDF + ePub + Mobi pkt
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
This book will cover all the new features that have been introduced in TensorFlow 2.0 especially the major highlight, including eager execution and more. You will learn how to make the best use of these features to migrate your codes from TensorFlow 1.x to TensorFlow 2.0 in a seamless way.
- PDF + ePub + Mobi pkt
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Web Components are the set of APIs that helps you build standard UI functions that work across any browser, with any JavaScript framework. This practical guide will help you fulfill this promise through examples and best practices. It will help you implement the web components in your existing frontend application to let you fully realize the capab
- PDF + ePub + Mobi pkt
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.
- PDF + ePub + Mobi pkt
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
With this book, you will learn to write production-ready smart contracts for the Ethereum blockchain. Finally, with the help of comprehensive examples, you will learn how to add security to smart contracts and then delve into the various security considerations that must be paid attention to.
- PDF + ePub + Mobi pkt
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
This Learning Path is your easy reference to know all about penetration testing or ethical hacking. With more than 100 recipes, you'll become a master of the most widely used penetration testing framework and easily tackle command injection flaws, crypto implementation layers, and web application security holes.
- PDF + ePub + Mobi pkt
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
-
Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.
- PDF + ePub + Mobi pkt
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure your i
- PDF + ePub + Mobi pkt
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
With Red Hat Enterprise Essentials you will run and operate Red Hat Linux 8 learn to securely administer a server or a system using Linux commands.
- ePub pkt
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world.
- PDF + ePub + Mobi pkt
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). This book teaches you various penetration testing techniques in order to become
- PDF + ePub + Mobi pkt
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
ABAP is an established and complex programming language in the IT industry. This book will give you confidence in using the latest ABAP programming techniques and applying legacy constructions with the help of practical examples.
- PDF + ePub + Mobi pkt
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.
- PDF + ePub + Mobi pkt
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Starting with the technical foundations of blockchain, this Learning Path takes you deep into the theoretical and technical foundations of the technology to transform you into an expert of decentralized applications and blockchain.
- PDF + ePub + Mobi pkt
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
This essential guide will help any blockchain practitioner gain expertise in developing complete STO and stablecoins DApps. This book provides a quick introduction to basic ICO and STO concepts, and their differences. It will also help readers compile, test, and deploy their own contracts by altering the code provided in the book.
- PDF + ePub + Mobi pkt
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
This Learning Path focuses on showing you how to leverage the benefits of the cloud and create applications that are high in performance and availability. It teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud.
- PDF + ePub + Mobi pkt
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
In the era of network attacks and malware threat, it becomes important to have skills to investigate the attack evidence and vulnerabilities prevailing in the network. This book focuses on how to acquire and analyze the evidence, write a report and use the common tools in network forensics.
- PDF + ePub + Mobi pkt
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
C# and .NET Core makes network programming the enjoyable experience it should be. This book will get you started with the basics of network programming as they relate to C#. We will then dig into the core topics of the network layer. You'll also learn to make sockets connections as well and develop practical client-side applications in this book.
- PDF + ePub + Mobi pkt
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
This Learning Path is your easy reference to explore and build blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Starting with the basics of blockchain, this Learning Path teaches you all that you need to know to develop your own private and public blockchain networks.
- PDF + ePub + Mobi pkt
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
Salman A. Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
-
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.
- PDF + ePub + Mobi pkt
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7 Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get started with executing an application penetration test and be sure of the results.
- PDF + ePub + Mobi pkt
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Data structures and algorithms help you to understand computational complexity and write efficient code. Kotlin data structures and algorithms enable you to write code that runs faster which is important in the web and mobile world. This book takes you through the techniques that you can use in your regular production environment.
- PDF + ePub + Mobi pkt
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Mastering Distributed Tracing provides comprehensive coverage of the tracing field. Solve problems through code instrumentation with open standards, and learn how to profile complex systems. The book will also prepare you to operate and enhance your own tracing infrastructure.
- PDF + ePub + Mobi pkt
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Unreal Engine VR Quick Start Guide introduces designers to the guidelines and design processes necessary to build interactive VR experiences. Learn to use User Experience design techniques and Blueprint programming to create virtual reality gameplay for HTC Vive, Oculus Rift, PSVR, and Windows Mixed Reality headsets.
- PDF + ePub + Mobi pkt
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4 Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
With this Learning Path, you will be able to easily solve complex programming challenges using advanced features of C#. You'll structure and build scalable, optimized, and robust applications in C#7 and .NET, and with the newly-acquired TDD skills, you'll be ready to enter the market not only as a C# pro, but also as a TDD expert.
- PDF + ePub + Mobi pkt
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C# Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
-
This book is for Python developers to implement various components of end-to-end decentralized applications such as cryptocurrencies, smart contracts, wallet and more. You will use the example-based approach using various libraries from Python ecosystem to build efficient and powerful blockchain applications at work or projects.
- PDF + ePub + Mobi pkt
Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python
-
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.
- PDF + ePub + Mobi pkt
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoints and create robust defense strategies.
- PDF + ePub + Mobi pkt
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
This is a comprehensive guide to help you understand the current threats faced by the financial cyberspace and how to go about it and secure your financial landscape. The book will take you on a journey from identifying the attackers to securing your financial transactions and assets. The book then take you through the updates needed for procedures
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concepts that will come in handy when making robust cybersecurity tools and custom exploits.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Microsoft Azure has numerous effective solutions but the biggest challenge that architects and administrators face is implementing these solutions appropriately. This Learning Path focuses on various scenarios that will help overcome the challenge of implementing Azure solutions while helping you prepare for the Microsoft Architect exam.
- PDF + ePub + Mobi pkt
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, Namit Tanasseri, Rahul Rai
-
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python is the major programming language for network programming. This Learning Path shows you how to use the power and beauty of Python to complete numerous real-world tasks related to programming, monitoring, and administering networks.
- PDF + ePub + Mobi pkt
Python Network Programming. Conquer all your networking challenges with the powerful Python language Python Network Programming. Conquer all your networking challenges with the powerful Python language
Abhishek Ratan, Eric Chou, Pradeeban Kathiravelu, Dr. M. O. Faruque Sarker
-
The serverless architecture allows you to build and run applications and services without having to manage the infrastructure which saves cost and improves scalability. In this book, you will learn to harness serverless technology to reduce production time, minimize cost and have the freedom to customize your code, without hindering functionality.
- PDF + ePub + Mobi pkt
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
Functional programming is a very powerful programming paradigm that can help us to write better code. This book presents essential functional and reactive programming concepts in a simplified manner using Typescript.
- PDF + ePub + Mobi pkt
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Mastering Kali Linux for Advanced Penetration Testing, Third Edition will guide you through proven techniques to test your infrastructure security using Kali Linux. From selecting the most effective tools to carrying out advanced pentesting in highly secure environments, this book will help you gain the expertise you need to advance in your career.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain has the potential to change the world and has become the hottest field in the tech sector now. Blockchain for Business is a comprehensive guide that enables you to fully understand the far-reaching applications beyond Bitcoin and empowers you to make fully-informed decisions.
- PDF + ePub + Mobi pkt
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. Learn blockchain from first concepts to algorithms explained in Python.
- PDF + ePub + Mobi pkt
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
IoT and Blockchain are not limited to certain industries or use cases. Almost any business with a network and IoT device can reduce costs, improve business efficiency, and remove single points of failure in networks by implementing Blockchain. This book will help you implement an end-to-end Blockchain and IoT solution using best practices.
- PDF + ePub + Mobi pkt
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
The book will allow readers to implement smart solutions to their existing cybersecurity products and effectively build intelligent solutions which cater to the needs of the future. By the end of this book, you will be able to build, apply, and evaluate machine learning algorithms to identify various cybersecurity potential threats.
- PDF + ePub + Mobi pkt
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Hands-On Enterprise Application Development with Python explains how Python has matured to become a suitable programming language to build robust applications that scale easily to manage the requirements of the enterprise. The book will explore features of Python 3.7, tested frameworks and tools and best programming practices for developing scalabl
- PDF + ePub + Mobi pkt
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3 Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
This book will introduce you to Android forensics helping you to set up a forensic environment, handle mobile evidence, analyze how and where common applications store their data. You will also learn to identify malware on a device, and how to analyze it.
- PDF + ePub + Mobi pkt
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions.
- PDF + ePub + Mobi pkt
CentOS Quick Start Guide. Get up and running with CentOS server administration CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Understanding the history of the Deep Web, its current state, and its possible evolution, can help you, the reader; better understand the dangers and risks that exist out there. This book helps you access the Deep Web and the Dark Net and also protect yourself while browsing the Deep Web.
- PDF + ePub + Mobi pkt
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
C++ is a general-purpose programming language with a bias towards systems programming. This book provides a detailed walkthrough of the C, C++ and POSIX standards and enables a firm understanding of various system calls for UNIX systems. Topics include console and file IO, memory management, sockets, time interface, process and thread management
- PDF + ePub + Mobi pkt
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17 Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17