packt publishing PDF: 1 to 10 of 100 results fetched - page 1 [an]

Mastering Proxmox - Third Edition: Build virtualized environments using the Proxmox VE hypervisor
Discover real world scenarios for Proxmox troubleshooting and become an expert cloud builderAbout This Book
  • Formulate Proxmox-based solutions and set up virtual machines of any size while gaining expertise even on the most complex multi-cluster setups
  • Master the skills needed to analyze, monitor, and troubleshoot real-world virtual environments
  • This is the most up-to-date title on mastering Proxmox, with examples based on the new Linux Kernel 4.10.15 and Debian Stretch (9.x)
Who This Book Is ForThis book is for Linux and system administrators and professionals working in IT teams who would like to design and implement an enterprise-quality virtualized environment using Proxmox. Some knowledge of networking and virtualization concepts is assumed.What You Will Learn
  • Install basic Proxmox VE nodes and get to know the Proxmox GUI
  • Get to know Proxmox's internal structure and mechanics
  • Create and manage KVM or LXC-based virtual machines
  • Understand advanced virtual networks
  • Configure high availability Proxmox nodes
  • Integrate Ceph big data storage with the Proxmox hypervisor
  • Plan a large virtual environment for cloud-based services
  • Discover real-world scenarios for Proxmox troubleshooting
In DetailProxmox is an open source server virtualization solution that has enterprise-class features for managing virtual machines, for storage, and to virtualize both Linux and Windows application workloads.You'll begin with a refresher on the advanced installation features and the Proxmox GUI to familiarize yourself with the Proxmox VE hypervisor. Then, you'll move on to explore Proxmox under the hood, focusing on storage systems, such as Ceph, used with Proxmox. Moving on, you'll learn to manage KVM virtual machines, deploy Linux containers fast, and see how networking is handled in Proxmox. You'll also learn how to protect a cluster or a VM with a firewall and explore the new high availability features introduced in Proxmox VE 5.0. Next, you'll dive deeper into the backup/restore strategy and see how to properly update and upgrade a Proxmox node. Later, you'll learn how to monitor a Proxmox cluster and all of its components using Zabbix. Finally, you'll discover how to recover Promox from disaster strikes through some real-world examples.By the end of the book, you'll be an expert at making Proxmox work in production environments with minimal downtime.Style and approachThis book walks you through every aspect of virtualization using Proxmox using a practical, scenario-based approach that features best practices and all the weaponry you need to succeed when building virtual environments with Proxmox 5.0.
Author: Wasim Ahmed
Published by: Packt Publishing | Publication date: 11/16/2017
Kindle book details: Kindle Edition, 494 pages

Kali Linux Wireless Penetration Testing Cookbook: Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposesKey Features
  • Expose wireless security threats through the eyes of an attacker,
  • Recipes to help you proactively identify vulnerabilities and apply intelligent remediation,
  • Acquire and apply key wireless pentesting skills used by industry experts
Book DescriptionMore and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux.This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed.By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats.What you will learn
  • Deploy and configure a wireless cyber lab that resembles an enterprise production environment
  • Install Kali Linux 2017.3 on your laptop and configure the wireless adapter
  • Learn the fundamentals of commonly used wireless penetration testing techniques
  • Scan and enumerate Wireless LANs and access points
  • Use vulnerability scanning techniques to reveal flaws and weaknesses
  • Attack Access Points to gain access to critical networks
Who This Book Is ForIf you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected.Table of Contents
  • Kali Linux and Wireless Networking
  • Attacking Access Controls
  • Integrity of Wireless
  • Impacting Confidentiality
  • Reducing availability
  • Authentication attacks
  • Bluetooth Attacks
  • Published by: Packt Publishing | Publication date: 12/13/2017
    Kindle book details: Kindle Edition, 216 pages

    Linux Device Drivers Development: Develop customized drivers for embedded Linux
    Key Features
    • Learn to develop customized Linux device drivers
    • Learn the core concepts of device drivers such as memory management, kernel caching, advanced IRQ management, and so on.
    • Practical experience on the embedded side of Linux
    Book DescriptionLinux kernel is a complex, portable, modular and widely used piece of software, running on around 80% of servers and embedded systems in more than half of devices throughout the World. Device drivers play a critical role in how well a Linux system performs. As Linux has turned out to be one of the most popular operating systems used, the interest in developing proprietary device drivers is also increasing steadily.This book will initially help you understand the basics of drivers as well as prepare for the long journey through the Linux Kernel. This book then covers drivers development based on various Linux subsystems such as memory management, PWM, RTC, IIO, IRQ management, and so on. The book also offers a practical approach on direct memory access and network device drivers.By the end of this book, you will be comfortable with the concept of device driver development and will be in a position to write any device driver from scratch using the latest kernel version (v4.13 at the time of writing this book).What you will learn
    • Use kernel facilities to develop powerful drivers
    • Develop drivers for widely used I2C and SPI devices and use the regmap API
    • Write and support devicetree from within your drivers
    • Program advanced drivers for network and frame buffer devices
    • Delve into the Linux irqdomain API and write interrupt controller drivers
    • Enhance your skills with regulator and PWM frameworks
    • Develop measurement system drivers with IIO framework
    • Get the best from memory management and the DMA subsystem
    • Access and manage GPIO subsystems and develop GPIO controller drivers
    About the AuthorJohn Madieu is an embedded Linux and kernel engineer living in France, in Paris. His main activities consist of developing drivers and Board Support Packages (BSP) for companies in domains such as automation, transport, healthcare, energy, and the military. John works at EXPEMB, a French company that is a pioneer in electronical board design based on computer-on-module, and in embedded Linux solutions. He is an open source and embedded systems enthusiast, convinced that it is only by sharing knowledge that one learns more.He is passionate about boxing, which he practised for 6 years professionally, and continues to transmit this passion through sessions of training that he provides voluntarily.Table of Contents
  • Introduction to Kernel Development
  • Device Driver Basis
  • Kernel Facilities and Helper Functions
  • Character Device Drivers
  • Platform Device Drivers
  • The Concept of Device Tree
  • I2C Client Drivers
  • SPI Device Drivers
  • Regmap API - A Register Map Abstraction
  • IIO Framework
  • Kernel Memory Management
  • DMA – Direct Memory Access
  • Linux Device Model
  • Pin Control and GPIO Subsystem
  • GPIO Controller Drivers – gpio_chip
  • Advanced IRQ Management
  • Input Devices Drivers
  • RTC Drivers
  • PWM Drivers
  • Regulator Framework
  • Author: John Madieu
    Published by: Packt Publishing | Publication date: 10/20/2017
    Kindle book details: Kindle Edition, 586 pages

    Azure for Architects: Implementing cloud design, DevOps, IoT, and serverless solutions on your public cloud
    Key Features
    • Get familiar with the different design patterns available in Microsoft Azure
    • Develop Azure cloud architecture and a pipeline management system
    • Get to know the security best practices for your Azure deployment
    Book DescriptionOver the years, Azure cloud services has grown quickly, and the number of organizations adopting Azure for their cloud services is also gradually increasing. Leading industry giants are finding that Azure fulfills their extensive cloud requirements.This book will guide you through all the important and tough decision-making aspects involved in architecturing a Azure public cloud for your organization. The book starts with an extensive introduction to all the categories of designs available with Azure. These design patterns focus on different aspects of cloud such as high availability, data management, and so on.Gradually, we move on to various aspects such as building your cloud structure and architecture. It will also include a brief description about different types of services provided by Azure, such as Azure functions and Azure Analytics, which can prove beneficial for an organization. This book will cover each and every aspect and function required to develop a Azure cloud based on your organizational requirements.By the end of this book, you will be in a position to develop a full-fledged Azure cloud.What you will learn
    • Familiarize yourself with the components of the Azure Cloud platform
    • Understand the cloud design patterns
    • Use enterprise security guidelines for your Azure deployment
    • Design and implement Serverless solutions
    • See Cloud architecture and the deployment pipeline
    • Understand cost management for Azure solutions
    About the AuthorRitesh Modi is a former Microsoft senior technology evangelist currently working as a principal consultant for Infront Consulting Group. He is an architect, a senior evangelist, cloud architect, published author, speaker, and a known leader for his contributions towards datacenter, Azure, bots, blockchain, cognitive services, DevOps, artificial intelligence, and automation. He is the author of multiple books. Developing Bots using Bot Framework and DevOps with Windows Server 2016 are some of his recent books. He has also coauthored another book, titled Introducing Windows Server 2016 Technical Preview, along with the Windows Server team.He has spoken at more than 15 conferences, including TechEd and the PowerShell Asia Conference, and is a published author for MSDN magazine. He has more than a decade of experience in building and deploying enterprise solutions for customers, and more than 25 technical certifications. His interests and hobbies include writing books, playing with his daughter, watching movies, and continuing to learn new technologies. His Twitter handle is @automationnext.Ritesh currently lives in Hyderabad, India.Table of Contents
  • Getting Started
  • Azure Design Patterns
  • Designing High Availability
  • Implementing Scalability
  • Cloud Security
  • Designing IoT Solutions
  • Designing and Implementing Data Solutions
  • Designing and Implementing Serverless Solutions
  • Designing Policies, Locks, and Tags
  • DevOps on Azure
  • Cost Management
  • Monitoring and Auditing
  • Author: Ritesh Modi
    Published by: Packt Publishing | Publication date: 10/20/2017
    Kindle book details: Kindle Edition, 358 pages

    Enterprise Cloud Security and Governance: Efficiently set data protection and privacy principles
    Build a resilient cloud architecture to tackle data disasters with easeKey Features
    • Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform
    • Practical examples to ensure you secure your Cloud environment efficiently
    • A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance
    Book DescriptionModern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data.The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment.Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations.What you will learn
    • Configure your firewall and Network ACL
    • Protect your system against DDOS and application-level attacks
    • Explore cryptography and data security for your cloud
    • Get to grips with configuration management tools to automate your security tasks
    • Perform vulnerability scanning with the help of the standard tools in the industry
    • Learn about central log management
    Who This Book Is ForIf you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial.Table of Contents
  • Fundamentals of Cloud Security
  • Defense-In-Depth Based Approach
  • Designing Defensive Network Infrastructure
  • Server Hardening is vital
  • Cryptography & Data Security
  • Automation is Key to Security
  • Vulnerability Assessment, Pentest & Patch Management
  • Security Logging & Monitoring
  • First Responder
  • Best Practices
  • Author: Zeal Vora
    Published by: Packt Publishing | Publication date: 12/29/2017
    Kindle book details: Kindle Edition, 410 pages

    Learning Einstein Analytics: Unlock critical insights with Salesforce Einstein Analytics
    Learn to confidently setup and create app, lenses, dashboards using Salesforce Einstein Analytics. Key Features
    • Explore Einstein analytics on desktop as well as mobile platforms
    • Turn data into smarter sales with Einstein Analytics for Sales
    • Visualize your data with preloaded as well as customized dashboards
    Book Description Salesforce Einstein analytics aka Wave Analytics is a cloud-based platform which connects data from the multiple sources and explores it to uncover insights. It empowers sales reps, marketers, and analysts with the insights to make customer interactions smarter, without building mathematical models. You will learn to create app, lenses, dashboards and share dashboards with other users. This book starts off with explaining you fundamental concepts like lenses, step, measures and sets you up with Einstein Analytics platform. We then move on to creating an app and here you will learn to create datasets, dashboards and different ways to import data into Analytics. Moving on we look at Einstein for sales, services, and marketing individually. Here you will learn to manage your pipeline, understand important business drivers and visualize trends. You will also learn features related to data monitoring tools and embedding dashboards with lightning, visualforce page and mobile devices. Further, you will learn advanced features pertaining to recent advancements in Einstein which include machine learning constructs and getting predictions for events. By the end of this book, you will become proficient in the Einstein analytics, getting insights faster and understanding your customer in a better way. What you will learn
    • - Create app, lenses, and dashboards using Einstein.
    • - Visualize data utilizing all the widgets available with Einstein.
    • - Understand Einstein for Sales, Service, and Marketing separately.
    • - Use Data monitoring tools to monitor data flow and system jobs.
    • - Abstract machine learning constructs and make predictions on events
    Who this book is for This book is for data scientists, business users, developers who want to explore business data using the Salesforce Einstein Analytics. Knowledge of the Salesforce platform is required.
    Published by: Packt Publishing | Publication date: 01/29/2018
    Kindle book details: Kindle Edition, 242 pages

    Learning Internet of Things
    Explore and learn about Internet of Things with the help of engaging and enlightening tutorials designed for Raspberry PiAbout This Book
    • Design and implement state-of-the-art solutions for Internet of Things using different communication protocols, patterns, C# and Raspberry Pi
    • Learn the capabilities and differences between popular protocols and communication patterns and how they can be used, and should not be used, to create secure and interoperable services and things
    • A step-by-step hands-on tutorial with complete source code, that provides interoperable solutions for sensors, actuators, controllers, cameras, and protocol brides
    Who This Book Is ForIf you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.What You Will Learn
    • Know the capabilities and limitations of the HTTP, UPnP, CoAP, MQTT, and XMPP protocols
    • Use important communication patterns, such as the request/respond, publish/subscribe, event subscription, asynchronous messaging, and multicasting patterns
    • Secure the life cycle of Things on the Internet by using Thing registries and delegation of trust
    • Decrease complexity and development time by using Internet of Things service platforms
    • Understand basic threats on the Internet and implement effective counter measures
    • Combine interoperability and security to create open yet secure solutions
    • Implement secure, scalable, decentralized, and interoperable architectures and solutions for Internet of Things
    In DetailThis book starts by exploring the popular HTTP, UPnP, CoAP, MQTT, and XMPP protocols. You will learn how protocols and patterns can put limitations on network topology and how they affect the direction of communication and the use of firewalls. Thing registries and delegation of trust are introduced as important tools to secure the life cycle of Things on the Internet. Once the fundamentals have been mastered, your focus will move to the Internet of Things architecture. A secure architecture is proposed that will take full advantage of the power of Internet of Things and at the same time protect end user integrity and private personal data without losing flexibility and interoperability.This book provides you with a practical overview of the existing protocols, communication patterns, architectures, and security issues important to Internet of Things.
    Author: Peter Waher
    Published by: Packt Publishing | Publication date: 01/27/2015
    Kindle book details: Kindle Edition, 244 pages

    Python Penetration Testing Cookbook: Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
    Over 50 hands-on recipes to help you pen test networks using Python, discover vulnerabilities, and find a recovery pathAbout This Book
    • Learn to detect and avoid various types of attack that put system privacy at risk
    • Enhance your knowledge of wireless application concepts and information gathering through practical recipes
    • Learn a pragmatic way to penetration-test using Python, build efficient code, and save time
    Who This Book Is ForIf you are a developer with prior knowledge of using Python for penetration testing and if you want an overview of scripting tasks to consider while penetration testing, this book will give you a lot of useful code for your toolkit.What You Will Learn
    • Learn to configure Python in different environment setups.
    • Find an IP address from a web page using BeautifulSoup and Scrapy
    • Discover different types of packet sniffing script to sniff network packets
    • Master layer-2 and TCP/ IP attacks
    • Master techniques for exploit development for Windows and Linux
    • Incorporate various network- and packet-sniffing techniques using Raw sockets and Scrapy
    In DetailPenetration testing is the use of tools and code to attack a system in order to assess its vulnerabilities to external threats. Python allows pen testers to create their own tools. Since Python is a highly valued pen-testing language, there are many native libraries and Python bindings available specifically for pen-testing tasks.Python Penetration Testing Cookbook begins by teaching you how to extract information from web pages. You will learn how to build an intrusion detection system using network sniffing techniques. Next, you will find out how to scan your networks to ensure performance and quality, and how to carry out wireless pen testing on your network to avoid cyber attacks. After that, we’ll discuss the different kinds of network attack. Next, you’ll get to grips with designing your own torrent detection program. We’ll take you through common vulnerability scenarios and then cover buffer overflow exploitation so you can detect insecure coding. Finally, you’ll master PE code injection methods to safeguard your network.Style and approachThis book takes a recipe-based approach to solving real-world problems in pen testing. It is structured in stages from the initial assessment of a system through exploitation to post-exploitation tests, and provides scripts that can be used or modified for in-depth penetration testing.
    Author: Rejah Rehim
    Published by: Packt Publishing | Publication date: 11/28/2017
    Kindle book details: Kindle Edition, 226 pages

    Artificial Intelligence with Python: A Comprehensive Guide to Building Intelligent Apps for Python Beginners and Developers
    Build real-world Artificial Intelligence applications with Python to intelligently interact with the world around youAbout This Book
    • Step into the amazing world of intelligent apps using this comprehensive guide
    • Enter the world of Artificial Intelligence, explore it, and create your own applications
    • Work through simple yet insightful examples that will get you up and running with Artificial Intelligence in no time
    Who This Book Is ForThis book is for Python developers who want to build real-world Artificial Intelligence applications. This book is friendly to Python beginners, but being familiar with Python would be useful to play around with the code. It will also be useful for experienced Python programmers who are looking to use Artificial Intelligence techniques in their existing technology stacks.What You Will Learn
    • Realize different classification and regression techniques
    • Understand the concept of clustering and how to use it to automatically segment data
    • See how to build an intelligent recommender system
    • Understand logic programming and how to use it
    • Build automatic speech recognition systems
    • Understand the basics of heuristic search and genetic programming
    • Develop games using Artificial Intelligence
    • Learn how reinforcement learning works
    • Discover how to build intelligent applications centered on images, text, and time series data
    • See how to use deep learning algorithms and build applications based on it
    In DetailArtificial Intelligence is becoming increasingly relevant in the modern world. By harnessing the power of algorithms, you can create apps which intelligently interact with the world around you, building intelligent recommender systems, automatic speech recognition systems and more.Starting with AI basics you'll move on to learn how to develop building blocks using data mining techniques. Discover how to make informed decisions about which algorithms to use, and how to apply them to real-world scenarios. This practical book covers a range of topics including predictive analytics and deep learning.Table of Contents
  • Introduction to Artificial Intelligence
  • Classification and Regression Using Supervised Learning
  • Predictive Analytics with Ensemble Learning
  • Detecting Patterns with Unsupervised Learning
  • Building Recommender Systems
  • Logic Programming
  • Heuristic Search Techniques
  • Genetic Algorithms
  • Building Games with Artificial Intelligence
  • Natural Language Processing
  • Probabilistic Reasoning for Sequential Data
  • Building A Speech Recognizer
  • Object Detection and Tracking
  • Artificial Neural Networks
  • Reinforcement Learning
  • Deep Learning with Convolutional Neural Networks
  • Published by: Packt Publishing | Publication date: 01/27/2017
    Kindle book details: Kindle Edition, 446 pages

    Learning Linux Shell Scripting
    Unleash the power of shell scripts to solve real-world problems by breaking through the practice of writing tedious code About This Book
    • Learn how to efficiently and effectively build shell scripts and develop advanced applications with this handy book
    • Develop high quality and efficient solutions by writing professional and real-world scripts, and debug scripts by checking and shell tracing
    • A step-by-step tutorial to automate routine tasks by developing scripts from a basic level to very advanced functionality
    Who This Book Is ForThis book is ideal for those who are proficient at working with Linux and who want to learn about shell scripting to improve their efficiency and practical skills. By the end of this book, you will be able to confidently use your own Shell scripts in the real world.What You Will Learn
    • Familiarize yourself with the various text filtering tools available in Linux
    • Combine the fundamental text and file processing commands to process data and automate repetitive tasks
    • Understand expressions and variables and how to use them practically
    • Automate decision-making and save a lot of time and effort spent revisiting code
    • Get to grips with advanced functionality, such as using traps and signals, and using dialogs to develop screens
    • Start up a system and customize a Linux system
    • Take an in-depth look at regular expressions and pattern matching to understand the capabilities of scripting
    In DetailShell scripting is used to automate day-to-day administration and for testing or product development tasks.This book covers Bash (GNU Bourne-again shell) preparing you for the exciting world of Linux Shell scripting.Firstly, we introduce you to the shell environment and explain its basic commands. Next we move on to checking, killing, and controlling the execution of processes in Linux OS. After this, we teach you about the filter tools available in Linux and explain standard output and standard error devices. Next, you'll get to grips with some real-world essentials, such as debugging and performing shell arithmetic fluently. Then you'll take the next step and learn advanced topics in Shell scripting, such as starting up a system and customizing a Linux system.Finally, you'll get to know the capabilities of scripting and learn about Grep, stream editor, and Awk.Style and approachThis practical book will go from the very basics of shell scripting to complex, customized automation. The idea behind this book is to be as practical as possible and give you the look and feel of what real-world scripting is like.
    Published by: Packt Publishing | Publication date: 12/31/2015
    Kindle book details: Kindle Edition, 308 pages
    [1] 2345Next