Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Packt Publishing - ebooki
więcej »
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
Hacking Android. Click here to enter text
-
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Practical Windows Forensics. Leverage the power of digital forensics for Windows systems
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
-
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Practical Linux Security Cookbook. Click here to enter text
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense