Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
więcej »
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Rust for Blockchain Application Development. Learn to build decentralized applications on popular blockchain technologies using Rust
-
The Ultimate Kali Linux Book. Harness Nmap, Metaspolit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Mastering AWS Security. Strengthen your cloud environment using AWS security features coupled with proven strategies - Second Edition
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition
-
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners
-
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation
-
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA
-
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques
-
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition
-
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Mastering Linux Security and Hardening. A practical guide to protecting your Linux system from cyber attacks - Third Edition
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition
-
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition
-
Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection