Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
-
Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, takes you deeper into one of the major subjects of his international best seller, The DevOps 2.0 Toolkit, and shows you how to successfully integrate Docker Swarm into your DevOps toolset.
- PDF + ePub + Mobi pkt
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.
- PDF + ePub + Mobi pkt
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
This book will walk you through all the concepts and tools that Microsoft Azure has to offer and how these can be used in the DevOps environment. You will be introduced to use and management of Visual Studio Team Services (VSTS), so that you can understand the structure of the application that we will use as a sample throughout the book. You will u
- PDF + ePub + Mobi pkt
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Software architecture or creating a blueprint design for a particular software application is not a walk in the park. The two biggest challenges in software architecture are keeping architecture in sync, first, with the requirements as they are uncovered or evolve and, next, with the implementation as it gets built and evolves.
- PDF + ePub + Mobi pkt
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Microsoft .NET has always been the preferred framework for developing Enterprise applications that target the Windows platform. However, the release of .NET Core empowers senior developers and enterprise architects to think out of the box, and use .NET Core to design and develop robust applications that target multiple platforms.
- PDF + ePub + Mobi pkt
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo
- PDF + ePub + Mobi pkt
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Walmart’s OneOps is an open source DevOps platform that is used for cloud and application lifecycle management. It can manage critical and complex application workload on any multi cloud-based infrastructure and revolutionizes the way administrators, developers, and engineers develop and launch new products.
- PDF + ePub + Mobi pkt
-
In this short book, we take an in-depth look at lambdas in Java and their supporting features. It covers essential topics, such as functional interfaces and type inference, and the key differences between lambdas and closures.
- PDF + ePub + Mobi pkt
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
QGIS is a desktop geographic information system that facilitates data viewing, editing, and analysis. Based on version QGIS 2.18, this book will teach you how to write Python code that works with spatial data to automate geoprocessing tasks in QGIS.
- PDF + ePub + Mobi pkt
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
- PDF + ePub + Mobi pkt
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
- PDF + ePub + Mobi pkt
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights .NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
- PDF + ePub + Mobi pkt
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
- PDF + ePub + Mobi pkt
Penetration Testing: A Survival Guide. A Survival Guide Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran
-
This book gets you up and running with mobile forensics, covering everything from how to effectively deal with digital evidence to mobile acquisition tools and techniques. You’ll also gain insights into the various challenges faced while performing mobile forensics.
- PDF + ePub + Mobi pkt
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.
- PDF + ePub + Mobi pkt
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
- PDF + ePub + Mobi pkt
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
- PDF + ePub + Mobi pkt
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
- PDF + ePub + Mobi pkt
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
- PDF + ePub + Mobi pkt
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
- PDF + ePub + Mobi pkt
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
- PDF + ePub + Mobi pkt
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
- PDF + ePub + Mobi pkt
JavaScript Security. Learn JavaScript security to make your web applications more secure JavaScript Security. Learn JavaScript security to make your web applications more secure
-
- PDF + ePub + Mobi pkt
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan
-
- PDF + ePub + Mobi pkt
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
- PDF + ePub + Mobi pkt
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
- PDF + ePub + Mobi pkt
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
- PDF + ePub + Mobi pkt
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
- PDF + ePub + Mobi pkt
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
CompTIA Advanced Security Practitioner (CASP+) candidates need to stay up to date with the emerging technologies and threats in this fast-changing environment. This audiobook helps you to apply CASP+ concepts, understand processes and methodologies, and discover industry best practices for achieving CASP+ certification.
- PDF + ePub
- Audiobook MP3 pkt
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
As hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.
- PDF + ePub
- Audiobook MP3 pkt
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Cybersecurity is a vast field and getting started can seem overwhelming. This audiobook demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
-
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.
- PDF + ePub
- Audiobook MP3 pkt
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
This audiobook takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.
- PDF + ePub
- Audiobook MP3 pkt
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
This audiobook will take you through some key cybersecurity job roles and teach you the important technical and behavioral questions that will help you pass the interview, land the job, and grow in your cybersecurity career.
- PDF + ePub
- Audiobook MP3 pkt
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
Kenneth Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
-
By taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the
- PDF + ePub
- Audiobook MP3 pkt
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
This audiobook is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.
- Audiobook MP3 pkt
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Cyber Warfare – Truth, Tactics, and Strategies takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools and strategies presented for you to learn how to think about defendin
- Audiobook MP3 pkt
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare