Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
więcej »
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
-
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
-
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition
-
Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition - Third Edition