packt publishing PDF: 1 to 10 of 100 results fetched - page 1 [an]

Azure for Architects: Implementing cloud design, DevOps, IoT, and serverless solutions on your public cloud

https://www.amazon.com/Azure-Architects-Implementing-serverl...
Key Features
  • Get familiar with the different design patterns available in Microsoft Azure
  • Develop Azure cloud architecture and a pipeline management system
  • Get to know the security best practices for your Azure deployment
Book DescriptionOver the years, Azure cloud services has grown quickly, and the number of organizations adopting Azure for their cloud services is also gradually increasing. Leading industry giants are finding that Azure fulfills their extensive cloud requirements.This book will guide you through all the important and tough decision-making aspects involved in architecturing a Azure public cloud for your organization. The book starts with an extensive introduction to all the categories of designs available with Azure. These design patterns focus on different aspects of cloud such as high availability, data management, and so on.Gradually, we move on to various aspects such as building your cloud structure and architecture. It will also include a brief description about different types of services provided by Azure, such as Azure functions and Azure Analytics, which can prove beneficial for an organization. This book will cover each and every aspect and function required to develop a Azure cloud based on your organizational requirements.By the end of this book, you will be in a position to develop a full-fledged Azure cloud.What you will learn
  • Familiarize yourself with the components of the Azure Cloud platform
  • Understand the cloud design patterns
  • Use enterprise security guidelines for your Azure deployment
  • Design and implement Serverless solutions
  • See Cloud architecture and the deployment pipeline
  • Understand cost management for Azure solutions
About the AuthorRitesh Modi is a former Microsoft senior technology evangelist currently working as a principal consultant for Infront Consulting Group. He is an architect, a senior evangelist, cloud architect, published author, speaker, and a known leader for his contributions towards datacenter, Azure, bots, blockchain, cognitive services, DevOps, artificial intelligence, and automation. He is the author of multiple books. Developing Bots using Bot Framework and DevOps with Windows Server 2016 are some of his recent books. He has also coauthored another book, titled Introducing Windows Server 2016 Technical Preview, along with the Windows Server team.He has spoken at more than 15 conferences, including TechEd and the PowerShell Asia Conference, and is a published author for MSDN magazine. He has more than a decade of experience in building and deploying enterprise solutions for customers, and more than 25 technical certifications. His interests and hobbies include writing books, playing with his daughter, watching movies, and continuing to learn new technologies. His Twitter handle is @automationnext.Ritesh currently lives in Hyderabad, India.Table of Contents
  • Getting Started
  • Azure Design Patterns
  • Designing High Availability
  • Implementing Scalability
  • Cloud Security
  • Designing IoT Solutions
  • Designing and Implementing Data Solutions
  • Designing and Implementing Serverless Solutions
  • Designing Policies, Locks, and Tags
  • DevOps on Azure
  • Cost Management
  • Monitoring and Auditing
  • Author: Ritesh Modi
    Published by: Packt Publishing | Publication date: 10/20/2017
    Kindle book details: Kindle Edition, 358 pages

    Machine Learning for the Web

    https://www.amazon.com/Machine-Learning-Web-Andrea-Isoni-ebo...
    Key Features
    • Targets two big and prominent markets where sophisticated web apps are of need and importance.
    • Practical examples of building machine learning web application, which are easy to follow and replicate.
    • A comprehensive tutorial on Python libraries and frameworks to get you up and started.
    Book DescriptionPython is a general purpose and also a comparatively easy to learn programming language. Hence it is the language of choice for data scientists to prototype, visualize, and run data analyses on small and medium-sized data sets. This is a unique book that helps bridge the gap between machine learning and web development. It focuses on the difficulties of implementing predictive analytics in web applications. We focus on the Python language, frameworks, tools, and libraries, showing you how to build a machine learning system. You will explore the core machine learning concepts and then develop and deploy the data into a web application using the Django framework. You will also learn to carry out web, document, and server mining tasks, and build recommendation engines. Later, you will explore Python's impressive Django framework and will find out how to build a modern simple web app with machine learning features.What you will learn
    • Get familiar with the fundamental concepts and some of the jargons used in the machine learning community
    • Use tools and techniques to mine data from websites
    • Grasp the core concepts of Django framework
    • Get to know the most useful clustering and classification techniques and implement them in Python
    • Acquire all the necessary knowledge to build a web application with Django
    • Successfully build and deploy a movie recommendation system application using the Django framework in Python
    About the AuthorAndrea Isoni is a data scientist, PhD, and physicist professional with extensive experience in software developer positions. He has an extensive knowledge of machine learning algorithms and techniques. He also has experience with multiple languages, such as Python, C/C++, Java, JavaScript, C#, SQL, HTML, and Hadoop.Table of Contents
  • Introduction to Practical Machine Learning Using Python
  • Unsupervised Machine Learning
  • Supervised Machine Learning
  • Web Mining Techniques
  • Recommendation Systems
  • Getting Started with Django
  • Movie Recommendation System Web Application
  • Sentiment Analyser Application for Movie Reviews
  • Author: Andrea Isoni
    Published by: Packt Publishing | Publication date: 07/29/2016
    Kindle book details: Kindle Edition, 298 pages

    Thinking in JavaScript

    https://www.amazon.com/Thinking-JavaScript-Aravind-Shenoy-eb...
    JavaScript is a scripting language for the web. Before we delve into the intricacies of JavaScript, we need to know why it is used. While HTML tells your browser how your webpage will look, JavaScript is used for dynamic content and to add functionality. Using this book, you will understand the concept of JavaScript and its use in web designing. You will also have a look at jQuery in general. You will learn about Functions, Operators, the concept of Variables, Conditions and Loops, Arrays, and the basics of jQuery in this book. Instead of wandering through loads of theory, we have used practical examples in this book. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output thereby understanding the subtle nuances of JavaScript. By the end of the book, with practice, you can achieve better things and get more acquainted with JavaScript.
    Published by: Packt Publishing | Publication date: 04/14/2014
    Kindle book details: Kindle Edition, 47 pages

    Thinking in CSS

    https://www.amazon.com/Thinking-CSS-Aravind-Shenoy-ebook/dp/...
    You will gain an intermediate knowledge of CSS after reading this book. Instead of wandering through loads of theory, we will understand CSS more practically so that we can design a webpage using CSS. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All that you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding gets better with practice. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of CSS. By the end of the book, with practice, you can achieve better things and get more acquainted with CSS.
    Published by: Packt Publishing | Publication date: 04/14/2014
    Kindle book details: Kindle Edition, 46 pages

    Thinking in HTML

    https://www.amazon.com/Thinking-HTML-Aravind-Shenoy-ebook/dp...
    You will gain an intermediate knowledge of HTML after reading this book. Instead of wandering through loads of theory, we will understand HTML practically so that we can semantically define the markup and structure of a webpage. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding improves with practice. The examples in this book are compatible with almost every modern browser such as Mozilla Firefox, Opera or Google Chrome to name a few. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of HTML. By the end of the book, with practice, you can achieve better things as you get to grips with HTML.
    Published by: Packt Publishing | Publication date: 09/15/2014
    Kindle book details: Kindle Edition, 67 pages

    Industrial Cybersecurity: Efficiently secure critical infrastructure systems

    https://www.amazon.com/Industrial-Cybersecurity-Efficiently-...
    Key Features
    • Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
    • Filled with practical examples to help you secure critical infrastructure systems efficiently
    • A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems
    Book DescriptionWith industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.What you will learn
    • Understand industrial cybersecurity, its control systems and operations
    • Design security-oriented architectures, network segmentation, and security support services
    • Configure event monitoring systems, anti-malware applications, and endpoint security
    • Gain knowledge of ICS risks, threat detection, and access management
    • Learn about patch management and life cycle management
    • Secure your industrial control systems from design through retirement
    About the AuthorPascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and over 15 years of experience in designing, troubleshooting, and securing large-scale industrial control systems and the various types of network technologies they utilize. After more than a decade of hands-on, in-the-field experience, he joined Rockwell Automation in 2015 and is currently employed as Senior Consultant of Industrial Cybersecurity with the Network and Security Services Group. He recently became a digital nomad and now travels the world with his family while fighting cyber adversaries.Table of Contents
  • Industrial Control Systems
  • Insecure by Inheritance
  • Anatomy of an ICS Attack Scenario
  • Industrial Control System Risk Assessment
  • The Perdue Reference Model for Industrial Control Systems
  • The Defense In-Depth Model
  • Physical ICS Security_SSR
  • ICS Network Security
  • ICS Computer Security
  • ICS Application Security
  • ICS Device Security
  • ICS Policies, Procedures and Security Planning
  • Published by: Packt Publishing | Publication date: 10/18/2017
    Kindle book details: Kindle Edition, 456 pages

    Hadoop Explained

    https://www.amazon.com/Hadoop-Explained-Aravind-Shenoy-ebook...
    With the almost unfathomable increase in web traffic over recent years, driven by millions of connected users, businesses are gaining access to massive amounts of complex, unstructured data from which to gain insight.When Hadoop was introduced by Yahoo in 2007, it brought with it a paradigm shift in how this data was stored and analysed. Hadoop allowed small and medium sized companies to store huge amounts of data on cheap commodity servers in racks. The introduction of Big Data has allowed businesses to make decisions based on quantifiable analysis. Hadoop is now implemented in major organizations such as Amazon, IBM, Cloudera, and Dell to name a few. This book introduces you to Hadoop and to concepts such as ‘MapReduce’, ‘Rack Awareness’, ‘Yarn’ and ‘HDFS Federation’, which will help you get acquainted with the technology.
    Published by: Packt Publishing | Publication date: 06/16/2014
    Kindle book details: Kindle Edition, 156 pages

    Mastering Go: Create Golang production applications using network libraries, concurrency, and advanced Go data structures

    https://www.amazon.com/Mastering-production-applications-con...
    Exploring the major features and packages of Go, along with its types and data-structures, enabling the reader to write threadsafe, concurrent cloud, and network applicationsKey Features
    • Not your typical introduction to the Golang programming language
    • Exploring Golang cradle to grave, completes the developer’s Golang education
    • A thorough exploration into the core libraries and Golang features, that usually are taken for granted
    • In depth explanation, detailing the rationale behind composite data types, Golang concurrency, and the Golang networking library
    Book DescriptionThe Go programming language, often referred to as Golang (albeit wrongly), is really making strides, with some masterclass developments, architected by the greatest programming minds. Tobias Lutke, CEO of Shopify, recently quoted as saying “Go will be the server language of the future”, powerful words, with much ambition. Go programmers are in high demand, but more controversially, Go takes the stage, where C and Unix programmers previously led the way.The growth of the Go language has seen it become the means by which systems, networking, web, and cloud applications are implemented. Comfortable with syntax, you’ll benefit by mastering the use of the libraries and utilise its features, speed, and efficiency, for which the Go ecology is justly famous.You already know a little Go syntax and you’ve written some small projects, most Go programmers face the difficulty of having to integrate their Golang skills with production code. Typical introductions to Go programming, often stop short of this transition, the author continue on, showing you just how to tackle this.Offering a compendium of Go, the book begins with an account of how Go has been implemented, also, the reader will benefit from a dedicated chapter, an in-depth account of concurrency, systems and network programming, imperative for modern-day native cloud development. What you will learn
    • Understand the design choices of Golang syntax
    • Know enough Go internals to be able to optimize Golang code
    • Appreciate concurrency models available in Golang
    • Understand the interplay of systems and networking code
    • Write server-level code that plays well in all environments
    • Understand the context and appropriate use of Go data types and data structures
    Who this book is forThis book is for Golang programmers. You should have previously read an introductory book on Go, or to have worked through the Tour of Go or an equivalent online course. This book will definitely help to remember the basic concepts of concurrency, but network programming will be explained. A certain amount of previous coding and production experience would be helpful. Table of Contents
  • Go and the Operating System
  • Understanding Go Internals
  • Working with Basic Go Data Types
  • The Uses of Composite Types
  • Enhancing Go Code with Data Structures
  • What You Might Not Know About Go Packages
  • Reflection and Interfaces for All Seasons
  • Telling a Unix System What to Do
  • Go Concurrency – Goroutines, Channels, and Pipelines
  • Go Concurrency – Advanced Topics
  • Code Testing, Optimization, and Profiling
  • The Foundations of Network Programming in Go
  • Network Programming – Building Servers and Clients
  • Published by: Packt Publishing | Publication date: 04/30/2018
    Kindle book details: Kindle Edition, 606 pages

    Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

    https://www.amazon.com/Learning-Malware-Analysis-techniques-...
    Understand malware analysis and its practical implementationKey Features
    • Explore the key concepts of malware analysis and memory forensics using real-world examples
    • Learn the art of detecting, analyzing, and investigating malware threats
    • Understand adversary tactics and techniques
    Book DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.What you will learn
    • Create a safe and isolated lab environment for malware analysis
    • Extract the metadata associated with malware
    • Determine malware's interaction with the system
    • Perform code analysis using IDA Pro and x64dbg
    • Reverse-engineer various malware functionalities
    • Reverse engineer and decode common encoding/encryption algorithms
    • Reverse-engineer malware code injection and hooking techniques
    • Investigate and hunt malware using memory forensics
    Who this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book. Table of Contents
  • Introduction to Malware Analysis
  • Static Analysis
  • Dynamic Analysis
  • Assembly Language and Disassembly Primer
  • Disassembly Using IDA
  • Debugging Malicious Binaries
  • Malware Functionalities and Persistence
  • Code Injection and Hooking
  • Malware Obfuscation Techniques
  • Hunting Malware Using Memory Forensics
  • Detecting Advanced Malware Using Memory Forensics
  • Author: Monnappa K A
    Published by: Packt Publishing | Publication date: 06/29/2018
    Kindle book details: Kindle Edition, 512 pages

    Practical Web Penetration Testing: Secure web applications using Burp Suite, Nmap, Metasploit, and more

    https://www.amazon.com/Practical-Web-Penetration-Testing-app...
    Learn how to execute web application penetration testing end-to-endKey Features
    • Build an end-to-end threat model landscape for web application security
    • Learn both web application vulnerabilities and web intrusion testing
    • Associate network vulnerabilities with a web application infrastructure
    Book DescriptionCompanies all over the world want to hire professionals dedicated to application security. Practical Web Penetration Testing focuses on this very trend, teaching you how to conduct application security testing using real-life scenarios.To start with, you’ll set up an environment to perform web application penetration testing. You will then explore different penetration testing concepts such as threat modeling, intrusion test, infrastructure security threat, and more, in combination with advanced concepts such as Python scripting for automation. Once you are done learning the basics, you will discover end-to-end implementation of tools such as Metasploit, Burp Suite, and Kali Linux. Many companies deliver projects into production by using either Agile or Waterfall methodology. This book shows you how to assist any company with their SDLC approach and helps you on your journey to becoming an application security specialist.By the end of this book, you will have hands-on knowledge of using different tools for penetration testing.What you will learn
    • Learn how to use Burp Suite effectively
    • Use Nmap, Metasploit, and more tools for network infrastructure tests
    • Practice using all web application hacking tools for intrusion tests using Kali Linux
    • Learn how to analyze a web application using application threat modeling
    • Know how to conduct web intrusion tests
    • Understand how to execute network infrastructure tests
    • Master automation of penetration testing functions for maximum efficiency using Python
    Who this book is forPractical Web Penetration Testing is for you if you are a security professional, penetration tester, or stakeholder who wants to execute penetration testing using the latest and most popular tools. Basic knowledge of ethical hacking would be an added advantage. Table of Contents
  • Building a Vulnerable Web Application Lab
  • Kali Linux Installation
  • Delving Deep into the Usage of Kali Linux
  • All About Using Burp Suite
  • Understanding Web Application Vulnerabilities
  • Application Security Pre-Engagement
  • Application Threat Modeling
  • Source Code Review
  • Network Penetration Testing
  • Web Intrusion Tests
  • Pentest Automation Using Python
  • Appendix A: Nmap Cheat Sheet
  • Appendix B: Metasploit Cheat Sheet
  • Appendix C: Netcat Cheat Sheet
  • Appendix D: Networking Reference Section
  • Appendix E: Python Quick Reference
  • Author: Gus Khawaja
    Published by: Packt Publishing | Publication date: 06/22/2018
    Kindle book details: Kindle Edition, 294 pages
    [1] 2345Next
    PDFfetch