Marknadens största urval
Snabb leverans

Böcker utgivna av Packt Publishing

Filter
Filter
Sortera efterSortera Populära
  • av Miriam C. Wiesner
    685,-

    Explore PowerShell's offensive and defensive capabilities to strengthen your organization's security with this practical guidePurchase of the print or Kindle book includes a free PDF eBookKey Features- Master PowerShell for security by configuring, auditing, monitoring, exploiting, and bypassing defenses- Research and develop methods to bypass security features and use stealthy tradecraft- Explore essential security features in PowerShell and protect your environment against exploits and bypassesBook DescriptionTake your cybersecurity skills to the next level with this comprehensive guide to PowerShell security! Whether you're a red or blue teamer, you'll gain a deep understanding of PowerShell's security capabilities and how to use them.After revisiting PowerShell basics and scripting fundamentals, you'll dive into PowerShell Remoting and remote management technologies. You'll learn how to configure and analyze Windows event logs and understand the most important event logs and IDs to monitor your environment. You'll dig deeper into PowerShell's capabilities to interact with the underlying system, Active Directory and Azure AD. Additionally, you'll explore Windows internals including APIs and WMI, and how to run PowerShell without powershell.exe. You'll uncover authentication protocols, enumeration, credential theft, and exploitation, to help mitigate risks in your environment, along with a red and blue team cookbook for day-to-day security tasks. Finally, you'll delve into mitigations, including Just Enough Administration, AMSI, application control, and code signing, with a focus on configuration, risks, exploitation, bypasses, and best practices.By the end of this book, you'll have a deep understanding of how to employ PowerShell from both a red and blue team perspective.What you will learn- Leverage PowerShell, its mitigation techniques, and detect attacks- Fortify your environment and systems against threats- Get unique insights into event logs and IDs in relation to PowerShell and detect attacks- Configure PSRemoting and learn about risks, bypasses, and best practices- Use PowerShell for system access, exploitation, and hijacking- Red and blue team introduction to Active Directory and Azure AD security- Discover PowerShell security measures for attacks that go deeper than simple commands- Explore JEA to restrict what commands can be executedWho this book is forThis book is for security professionals, penetration testers, system administrators, and red and blue teams looking to learn how to leverage PowerShell for security operations. A basic understanding of PowerShell, cybersecurity fundamentals, and scripting is a must. For some parts a basic understanding of active directory, C++/C#, and assembly can be beneficial.Table of Contents- Getting Started with PowerShell- PowerShell Scripting Fundamentals- Exploring PowerShell Remote Management Technologies and PowerShell Remoting- Detection - Auditing and Monitoring- PowerShell Is Powerful - System and API Access- Active Directory - Attacks and Mitigation- Hacking the Cloud - Exploiting Azure Active Directory/Entra ID- Red Team Tasks and Cookbook- Blue Team Tasks and Cookbook- Language Modes and Just Enough Administration (JEA)- AppLocker, Application Control, and Code Signing- Exploring the Antimalware Scan Interface (AMSI)- What Else? - Further Mitigations and Resources

  • av Mihir Shah
    605

    Master widely used cloud native platforms like Kubernetes, Calico, Kibana, Grafana, Anchor, and more to ensure secure infrastructure and software developmentPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn how to select cloud-native platforms and integrate security solutions into the systemLeverage cutting-edge tools and platforms securely on a global scale in production environmentsUnderstand the laws and regulations necessary to prevent federal prosecutionBook Description:For cloud security engineers, it's crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF).The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you'll explore throughout. You'll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you'll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices.By the end of this book, you'll be better equipped to create secure code and system designs.What You Will Learn:Understand security concerns and challenges related to cloud-based app developmentExplore the different tools for securing configurations, networks, and runtimeImplement threat modeling for risk mitigation strategiesDeploy various security solutions for the CI/CD pipelineDiscover best practices for logging, monitoring, and alertingUnderstand regulatory compliance product impact on cloud securityWho this book is for:This book is for developers, security professionals, and DevOps teams involved in designing, developing, and deploying cloud native applications. It benefits those with a technical background seeking a deeper understanding of cloud-native security and the latest tools and technologies for securing cloud native infrastructure and runtime environments. Prior experience with cloud vendors and their managed services is advantageous for leveraging the tools and platforms covered in this book.

  • av Mostafa Yahia
    775,-

    Detect and investigate various cyber threats and techniques carried out by malicious actors by analyzing logs generated from different sourcesPurchase of the print or Kindle book includes a free PDF eBookKey Features- Understand and analyze various modern cyber threats and attackers' techniques- Gain in-depth knowledge of email security, Windows, firewall, proxy, WAF, and security solution logs- Explore popular cyber threat intelligence platforms to investigate suspicious artifactsBook DescriptionEffective threat investigation requires strong technical expertise, analytical skills, and a deep understanding of cyber threats and attacker techniques. It's a crucial skill for SOC analysts, enabling them to analyze different threats and identify security incident origins. This book provides insights into the most common cyber threats and various attacker techniques to help you hone your incident investigation skills.The book begins by explaining phishing and email attack types and how to detect and investigate them, along with Microsoft log types such as Security, System, PowerShell, and their events. Next, you'll learn how to detect and investigate attackers' techniques and malicious activities within Windows environments. As you make progress, you'll find out how to analyze the firewalls, flows, and proxy logs, as well as detect and investigate cyber threats using various security solution alerts, including EDR, IPS, and IDS. You'll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis.By the end of this book, you'll have learned how to analyze popular systems and security appliance logs that exist in any environment and explore various attackers' techniques to detect and investigate them with ease.What you will learn- Get familiarized with and investigate various threat types and attacker techniques- Analyze email security solution logs and understand email flow and headers- Find out how to analyze Microsoft event logs- Practical investigation of the various Windows threats and attacks- Analyze web proxy logs to investigate C&C communication attributes- Understand web application firewall (WAF) logs and examine various external attacks- Analyze FW logs and security alerts to investigate cyber threats- Understand the role of CTI in investigation and identify potential threatsWho this book is forThis book is for Security Operation Center (SOC) analysts, security professionals, cybersecurity incident investigators, incident handlers, incident responders, or anyone looking to explore attacker techniques and delve deeper into detecting and investigating attacks. If you want to efficiently detect and investigate cyberattacks by analyzing logs generated from different log sources, then this is the book for you. Basic knowledge of cybersecurity and networking domains and entry-level security concepts are necessary to get the most out of this book.Table of Contents- Investigating Email Threats- Email Flow and Header Analysis- Introduction to Windows Event Logs- Tracking Accounts Login and Management- Investigating Suspicious Process Execution Using Windows Event Logs- Investigating PowerShell Event Logs- Investigating Persistence and Lateral Movement Using Windows Event Logs- Network Firewall Logs Analysis- Investigating Cyber Threats by Using the Firewall Logs- Web Proxy Logs Analysis(N.B. Please use the Look Inside option to see further chapters)

  • av Otàvio Santana
    619,-

    The definitive guide for designing and delivering reliable and high-performing persistence layers using Java in the cloud-native agePurchase of the print or Kindle book includes a free PDF eBookKey Features:Uncover database patterns for designing readable and maintainable architectures and Java applicationsMaster various techniques to overcome application and architecture persistence challengesDiscover painless application modernization with change-data-capture powered by cloud-native technologiesBook Description:Having a solid software architecture breathes life into tech solutions. In the early stages of an application's development, critical decisions need to be made, such as whether to go for microservices, a monolithic architecture, the event-driven approach, or containerization. In Java contexts, frameworks and runtimes also need to be defi ned. But one aspect is often overlooked - the persistence layer - which plays a vital role similar to that of data stores in modern cloud-native solutions. To optimize applications and data stores, a holistic understanding of best practices, technologies, and existing approaches is crucial.This book presents well-established patterns and standards that can be used in Java solutions, with valuable insights into the pros and cons of trending technologies and frameworks used in cloud-native microservices, alongside good Java coding practices. As you progress, you'll confront the challenges of cloud adoption head-on, particularly those tied to the growing need for cost reduction through stack modernization. Within these pages, you'll discover application modernization strategies and learn how enterprise data integration patterns and event-driven architectures enable smooth modernization processes with low-to-zero impact on the existing legacy stack.What You Will Learn:Gain insights into data integration in Java services and the inner workings of frameworksApply data design patterns to create a more readable and maintainable design systemUnderstand the impact of design patterns on program performanceExplore the role of cloud-native technologies in modern application persistenceOptimize database schema designs and leverage indexing strategies for improved performanceImplement proven strategies to handle data storage, retrieval, and management efficientlyWho this book is for:If you're a developer, engineer, or software architect working in the field of software development, particularly with a focus on Java solutions, this book is for you.

  • av Marcelo Guerra Hahn
    685,-

    Take your C++ skills to the next level with expert insights on advanced techniques, design patterns, and high-performance programmingPurchase of the print or Kindle book includes a free PDF eBookKey Features:Master templates, metaprogramming, and advanced functional programming techniques to elevate your C++ skillsDesign scalable and efficient C++ applications with the latest features of C++17 and C++20Explore real-world examples and essential design patterns to optimize your codeBook Description:Are you an experienced C++ developer eager to take your skills to the next level? This updated edition of Expert C++ is tailored to propel you toward your goals.This book takes you on a journey of building C++ applications while exploring advanced techniques beyond object-oriented programming. Along the way, you'll get to grips with designing templates, including template metaprogramming, and delve into memory management and smart pointers. Once you have a solid grasp of these foundational concepts, you'll advance to more advanced topics such as data structures with STL containers and explore advanced data structures with C++. Additionally, the book covers essential aspects like functional programming, concurrency, and multithreading, and designing concurrent data structures. It also offers insights into designing world-ready applications, incorporating design patterns, and addressing networking and security concerns. Finally, it adds to your knowledge of debugging and testing and large-scale application design.With Expert C++ as your guide, you'll be empowered to push the boundaries of your C++ expertise and unlock new possibilities in software development.What You Will Learn:Go beyond the basics to explore advanced C++ programming techniquesDevelop proficiency in advanced data structures and algorithm design with C++17 and C++20Implement best practices and design patterns to build scalable C++ applicationsMaster C++ for machine learning, data science, and data analysis framework designDesign world-ready applications, incorporating networking and security considerationsStrengthen your understanding of C++ concurrency, multithreading, and optimizing performance with concurrent data structuresWho this book is for:This book will empower experienced C++ developers to achieve advanced proficiency, enabling them to build professional-grade applications with the latest features of C++17 and C++20. If you're an aspiring software engineer or computer science student, you'll able to master advanced C++ programming techniques through real-world applications that will prepare you for complex projects and real-world challenges.

  • av Jeff Hendrickson
    499,-

    Optimize UX analytics for your design workflow and discover effective techniques and strategies to craft unforgettable, impactful user experiencesPurchase of the print or Kindle book includes a free PDF eBookKey Features:Enhance your understanding of qualitative and quantitative analysis for successful UX projectsApply design thinking and use surveys, interviews, and UX analytics tools for better product designOvercome bottlenecks and challenges at each stage of the user experienceBook Description:UX analytics is a field that recognizes the significance of understanding human behavior and emotions in designing user experiences. It goes beyond mere metrics and embraces a people-centric approach. With the help of this comprehensive guide, you'll acquire essential skills, knowledge, and techniques to establish a top-notch UX analytics practice.Unleashing the Power of UX Analytics will equip you with the strategies and tactics necessary to effectively collect, analyze, and interpret data, empowering you to make informed decisions that enhance the overall user experience. It emphasizes the importance of empathy in comprehending user needs and desires, enabling you to create meaningful and impactful design solutions. As you advance, this book walks you through the entire UX analytics process, from setting goals and defining key performance indicators (KPIs) to implementing various research methods and tools. You'll gain insights into user interview best practices, usability testing, and techniques for gathering qualitative and quantitative data.Armed with the knowledge of data analysis and interpretation, you'll be able to uncover patterns, trends, and user preferences to make data-driven decisions.What You Will Learn:Understand the significance of analytics in successful UX projectsApply design thinking as a problem-solving tool in a UX practiceExplore taxonomies, dashboards, KPIs, and data visualizations to understand data enterprise in depthDiscover key considerations to determine which UX analytics tools are best for your projectsCraft a North Star statement and understand how it guides your workDesign and deliver the best research findings collateralGet to grips with heuristics and performing the effective evaluationsWho this book is for:This book is for product managers, UX researchers, designers, and anyone involved in UX and business development, both in management roles and as individual contributors. If you are looking to master the methodologies, principles, and best practices for driving product design decisions through UX analytics, this book is absolutely the right pick for you. While a basic understanding of user experience principles is beneficial, it is not a prerequisite, as everything you need to know will be explained.

  • av Simone Onofri
    679,-

    Master the art of web exploitation with real-world techniques on SAML, WordPress, IoT, ElectronJS, and Ethereum smart contractsPurchase of the print or Kindle book includes a free PDF eBookKey Features- Learn how to detect vulnerabilities using source code, dynamic analysis, and decompiling binaries- Find and exploit vulnerabilities such as SQL Injection, XSS, Command Injection, RCE, and Reentrancy- Analyze real-world security incidents based on MITRE ATT&CK to understand the risk at the CISO levelBook DescriptionWeb attacks and exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the latest challenges in web application security, providing you with an in-depth understanding of hackers' methods and the practical knowledge and skills needed to effectively understand web attacks.The book starts by emphasizing the importance of mindset and toolset in conducting successful web attacks. You'll then explore the methodologies and frameworks used in these attacks, and learn how to configure the environment using interception proxies, automate tasks with Bash and Python, and set up a research lab. As you advance through the book, you'll discover how to attack the SAML authentication layer; attack front-facing web applications by learning WordPress and SQL injection, and exploit vulnerabilities in IoT devices, such as command injection, by going through three CTFs and learning about the discovery of seven CVEs. Each chapter analyzes confirmed cases of exploitation mapped with MITRE ATT&CK. You'll also analyze attacks on Electron JavaScript-based applications, such as XSS and RCE, and the security challenges of auditing and exploiting Ethereum smart contracts written in Solidity. Finally, you'll find out how to disclose vulnerabilities.By the end of this book, you'll have enhanced your ability to find and exploit web vulnerabilities.What you will learn- Understand the mindset, methodologies, and toolset needed to carry out web attacks- Discover how SAML and SSO work and study their vulnerabilities- Get to grips with WordPress and learn how to exploit SQL injection- Find out how IoT devices work and exploit command injection- Familiarize yourself with ElectronJS applications and transform an XSS to an RCE- Discover how to audit Solidity's Ethereum smart contracts- Get the hang of decompiling, debugging, and instrumenting web applicationsWho this book is forThis book is for anyone whose job role involves ensuring their organization's security - penetration testers and red teamers who want to deepen their knowledge of the current security challenges for web applications, developers and DevOps professionals who want to get into the mindset of an attacker; and security managers and CISOs looking to truly understand the impact and risk of web, IoT, and smart contracts. Basic knowledge of web technologies, as well as related protocols is a must.Table of Contents- Mindset and Methodologies- Toolset for Web Attacks and Exploitation- Attacking the Authentication Layer - a SAML Use Case- Attacking Internet-Facing Web Applications - SQL Injection and Cross-Site Scripting (XSS) on WordPress- Attacking IoT Devices - Command Injection and Path Traversal- Attacking Electron JavaScript Applications - from Cross-Site Scripting (XSS) to Remote Command Execution (RCE)- Attacking Ethereum Smart Contracts - Reentrancy, Weak Sources of Randomness, and Business Logic- Continuing the Journey of Vulnerability Discovery

  • av Vladimir Dementyev
    665,-

    Transition from the traditional Rails MVC trio to an abstraction model and evolve your application codebase with synchronized components, boosting flexibility and maintainabilityKey Features:- Understand Rails' architectural patterns along with its advantages and disadvantages- Organize business logic in Rails apps when the default approach is insufficient- Introduce new abstractions to address design problems- Purchase of the print or Kindle book includes a free PDF eBookBook Description:The Ruby on Rails framework boosts productivity by leveraging the convention-over-configuration principle and model-view-controller (MVC) pattern, enabling developers to build features efficiently. This initial simplicity often leads to complexity, making a well-structured codebase difficult to maintain. Written by a seasoned software engineer and award-winning contributor to many other open-source projects, including Ruby on Rails and Ruby, this book will help you keep your code maintainable while working on a Rails app.You'll get to grips with the framework's capabilities and principles to harness the full potential of Rails, and tackle many common design problems by discovering useful patterns and abstraction layers. By implementing abstraction and dividing the application into manageable modules, you'll be able to concentrate on specific parts of the app development without getting overwhelmed by the entire codebase. This also encourages code reuse, simplifying the process of adding new features and enhancing the application's capabilities. Additionally, you'll explore further steps in scaling Rails codebase, such as service extractions.By the end of this book, you'll become a code design specialist with a deep understanding of the Rails framework principles.What You Will Learn:- Get to grips with Rails' core components and its request/response cycle- See how Rails' convention-over-configuration principle affects development- Explore patterns for software flexibility, extensibility, and testability in Rails- Identify and address Rails' anti-patterns for cleaner code- Implement design patterns for handling bloated models and messy views- Expand from mailers to multi-channel notification deliveries- Introduce different authorization models and layers to your codebase- Take a class-based approach to configuration in RailsWho this book is for:This book is for Rails application developers looking to efficiently manage the growing complexity of their projects. Whether you've recently launched your first Rails minimum viable product or are struggling to progress with a sizable monolithic application, this book is here to help. A deep understanding of core Rails principles is a must. Prior experience in building web apps using the Rails framework will help you understand and apply the concepts in the book in a better way.Table of Contents- Rails as a Web Application Framework- Active Models and Records- More Adapters, Less Implementations- Rails Anti-Patterns?- When Rails Abstractions Are Not Enough- Data Layer Abstractions- Handling User Input outside of Models- Pulling Out the Representation Layer- Authorization Models and Layers- Crafting the Notifications Layer- Better Abstractions for HTML Views- Configuration as a First-Class Application Citizen- Cross-Layers and Off-Layers

  • av Kevin Michael Land
    745,-

    Work through multiple design projects in this part-color guide to understand how Autodesk Fusion 360 helps improve efficiency and draftingKey Features- Understand the project workflow of Autodesk Fusion 360- Design and redesign projects while learning to fix errors- Gain a better insight into repurposing real-world items into Fusion 360 for custom designs- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionAutodesk Fusion 360 has become an indispensable tool for designers, tinkerers, and engineers worldwide thanks to its versatility that allows for large-scale assemblies and smaller, quick 3D prints. If you've faced challenges with learning Fusion 360, this book will help you overcome them and build the confidence to design your own projects, explaining step-by-step instructions and the purpose of each tool.In this book, you'll dive into the design workspace and learn sketching fundamentals such as setting up a component, recognizing when a sketch is fully constrained, and parametrically flexing models. Through trial and error, you'll work on multiple easy-to-build projects to create simple, useful items that can be quickly 3D printed for use around the house and then advance to much bigger projects that require joint connectivity and large assemblies.By the end of this book, you'll be able to sketch fully parametric designs, translate them into 3D models, and create your own unique designs.What you will learn- Gain proficiency in Fusion 360 user interface, navigation, and functionality- Create and transform simple 2D sketches into 3D models- Manipulate and control parametric 2D sketches using dimensions- Become familiar with drafting on paper and taking measurements with calipers- Create a bicycle assembly part with Fusion 360- Use the form environment to create organic shapes- Render a 3D model and understand how to apply materials and lighting- Generate 2D assembly model drawings for documentation purposesWho this book is forBeginner or intermediate designers who prefer hands-on learning will find this book useful, especially designers, woodworkers, 3D printing enthusiasts, and hobbyists who enjoy creating things, rather than experienced machinists. The basic projects are accessible without prior CAD skills, although some fundamental CAD understanding is beneficial for those interested in going further. It is highly recommended that you use a 3-button mouse for all projects to fully utilize floating pop-up menus.Table of Contents- Working within the Design Workspace- Planes, Sketches, Constraints, and Parametric Dimensions- Project Building Basics- Creating a Customizable S-Hook- Designing Decorative Doorknobs- Designing a Simple Bottle Holder- Creating a Bike Reference Model- Creating a Bottle Reference Model- Building the Bottle Holder- Improving the Bottle Holder Design- The FORM Environment- Modeling a Scary Tealight Ghost- Using Form and Solid Modeling to Create a Cushioned Chair- Using a Scanned Image to Create a 3D Model- Modeling a Bottle Topper

  • av Christopher Lee
    389,-

    Proven techniques, best practices, and tips for writing effective user stories, leveraging user story mapping, and expert interviews to deliver high value to usersPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn how to write and implement effective user stories to improve product developmentDiscover techniques to gather requirements, prioritize, and refine user storiesHandle stakeholder expectations, communicate user stories, and incorporate user feedbackBook DescriptionThe Art of Crafting User Stories is a must-read for product managers, UX professionals, and product developers dedicated to creating meaningful digital experiences. This book provides a comprehensive, step-by-step approach to empower you to master the techniques for creating user stories that drive effective product development. This book takes you on a journey from identifying and capturing user needs, goals, and perspectives through user stories, to crafting impactful stories for design choices and organizing tasks efficiently. You'll learn how to define the problem area, recognize user personas, and develop user scenarios with the aid of real-world examples, practical tips, and exercises designed to help you develop your skills in crafting user-centered experiences. Moreover, you'll gain a thorough understanding of user stories, their role in Agile development, and how to use them to plan and manage products effectively. By the end of this book, you'll be able to improve the quality and efficiency of your own products by applying the hands-on practical skills to create compelling digital experiences that resonate with users and stay relevant in the market. What you will learnLeverage user personas in product development for prioritizing features and guiding design decisionsCommunicate with stakeholders to gather accurate information for writing user storiesAvoid common mistakes by implementing best practices for user story developmentEstimate the time and resources required for each user story and incorporate estimates into the product planApply product frameworks and techniques for user story prioritization and requirement elicitationBenefit from the experiences, insights, and practices of experts in the field of user story mappingWho this book is forIf you're interested in learning about user stories, as a product management method in Agile development, this book is for you. It's suitable for anyone involved in software development, including product managers, product owners, Agile coaches, designers, product analysts, and developers. Although prior experience with Agile development is not expected, a basic understanding of software development will be beneficial.Table of ContentsIntroduction to User StoriesUnderstanding the User PerspectiveWriting Effective User StoriesPrioritizing and Estimating User StoriesWorking with StakeholdersUser Story Refinement and Continuous ImprovementUser Stories in PracticeExpert InterviewsConclusion

  • av Garima Bajpai
    605

    Discover various cloud services alongside modern software development practices and tools with the guidance of two industry leaders in DevOpsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Modernize continuous delivery in the cloud with strategic goals and objectivesMaster continuous delivery with the right tools, applications, and use casesPerform multi-cluster and multi-cloud deployments efficientlyBook Description:Many organizations are embracing cloud technology to remain competitive, but implementing and adopting development processes while modernizing a cloud-based ecosystem can be challenging.Strategizing Continuous Delivery in Cloud helps you modernize continuous delivery and achieve infrastructure-application convergence in the cloud. You'll learn the differences between cloud-based and traditional delivery approaches and develop a tailored strategy. You'll discover how to secure your cloud delivery environment, ensure software security, run different test types, and test in the pre-production and production stages.You'll also get to grips with the prerequisites for onboarding cloud-based continuous delivery for organizational and technical aspects. Then, you'll explore key aspects of readiness to overcome core challenges in your cloud journey, including GitOps, progressive delivery controllers, feature flagging, differences between cloud-based and traditional tools, and implementing cloud chaos engineering.By the end of this book, you'll be well-equipped to select the right cloud environment and technologies for CD and be able to explore techniques for implementing CD in the cloud.What You Will Learn:Uncover the foundation for modernizing continuous delivery and prepare for continuous delivery in cloudBuild fast, efficient, secure, and interoperable software for real-world resultsUnderstand end-to-end continuous delivery for multi-cloud, hybrid, and on-premiseSet up and scale continuous delivery in the cloud for maximum returnImplement cost optimization for continuous delivery in the cloudDiscover trends and advancements in CD with cloud-native technologiesWho this book is for:This book is for developers, site reliability engineers, DevOps architects, and engineers looking to strategize, plan, and implement continuous delivery in the cloud. You must have a basic understanding of CI/CD concepts and be familiar with cloud ecosystem, DevOps, or CI/CD pipelines.

  • av Peter Rising
    619,-

    Explore expert tips and techniques to effectively manage the security, compliance, and identity features within your Microsoft 365 applicationsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Discover techniques to reap the full potential of Microsoft security and compliance suiteExplore a range of strategies for effective security and complianceGain practical knowledge to resolve real-world challengesBook Description:The Microsoft 365 Security, Compliance, and Identity Administration is designed to help you manage, implement, and monitor security and compliance solutions for Microsoft 365 environments.With this book, you'll first configure, administer identity and access within Microsoft 365. You'll learn about hybrid identity, authentication methods, and conditional access policies with Microsoft Intune. Next, you'll discover how RBAC and Azure AD Identity Protection can be used to detect risks and secure information in your organization. You'll also explore concepts such as Microsoft Defender for endpoint and identity, along with threat intelligence. As you progress, you'll uncover additional tools and techniques to configure and manage Microsoft 365, including Azure Information Protection, Data Loss Prevention (DLP), and Microsoft Defender for Cloud Apps.By the end of this book, you'll be well-equipped to manage and implement security measures within your Microsoft 365 suite successfully.What You Will Learn:Get up to speed with implementing and managing identity and accessUnderstand how to employ and manage threat protectionManage Microsoft 365's governance and compliance featuresImplement and manage information protection techniquesExplore best practices for effective configuration and deploymentEnsure security and compliance at all levels of Microsoft 365Who this book is for:This book is for IT professionals, administrators, or anyone looking to pursue a career in security administration and wants to enhance their skills in utilizing Microsoft 365 Security Administration. A basic understanding of administration principles of Microsoft 365 and Azure Active Directory is a must. A good grip of on-premises Active Directory will be beneficial.

  • av Brittany Joiner
    365,-

    An expert's guide to unleash your productivity potential for work and personal projects with Trello automation, advanced features, integrations, and Power-UpsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Uncover the secrets of Trello's core features, automation, and integrations to become a Trello power userMaster Trello with practical advice, real-world examples, and workflows to improve task managementGet in-depth knowledge of Trello to get it up and running within minutes and scale it for future needsBook Description:Managing large projects and teams can be an immense challenge, but having an efficient project management system can make all the difference. Trello is one of the leading project management systems, however, it's crucial to understand its features to leverage its full potential Supercharging Productivity with Trello is the perfect guide for you to enhance efficiency and do more in less time.You'll start by exploring Trello's structure, including cards, boards, and lists, before diving into Trello card basics. Next, you'll learn to use Trello views and templates to aggregate tasks and organize projects. You'll then explore automation, including triggers and actions, to create powerful workflows that will help you prioritize tasks and organize your data effectively. Later, you'll discover Power-Ups, an add-on that extends Trello's functionality. Throughout the book, you'll find practical tips and real-world examples to gain practical knowledge.By the end of this book, you'll be well-equipped to use Trello effectively for task and project management helping you stay on top of your game and deliver quick wins in no time.What You Will Learn:Explore Trello's structure and the important featuresCustomize Trello cards and fields to fit your use caseCreate Trello views to get a mile-high view of your projectsDiscover Trello's automation features to save time and automate tasksUse Power-Ups for documentation, reporting, contacts, and moreGet the most out of Trello with real-world examples and practical tipsWho this book is for:If you are a busy professional, student, entrepreneur, or anyone looking to get more done in less time, this book is for you. Whether you're new or an experienced Trello user, this comprehensive guide will provide the tools and strategies needed to streamline your workflow, boost your productivity, and achieve your goals.

  • av Breght van Baelen
    665,-

    Master core data architecture design concepts and Azure Data & AI services to gain a cloud data and AI architect's perspective to developing end-to-end solutionsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Translate and implement conceptual architectures with the right Azure servicesInject artificial intelligence into data solutions for advanced analyticsLeverage cloud computing and frameworks to drive data science workloadsBook Description:With data's growing importance in businesses, the need for cloud data and AI architects has never been higher. The Azure Data and AI Architect Handbook is designed to assist any data professional or academic looking to advance their cloud data platform designing skills. This book will help you understand all the individual components of an end-to-end data architecture and how to piece them together into a scalable and robust solution.You'll begin by getting to grips with core data architecture design concepts and Azure Data & AI services, before exploring cloud landing zones and best practices for building up an enterprise-scale data platform from scratch. Next, you'll take a deep dive into various data domains such as data engineering, business intelligence, data science, and data governance. As you advance, you'll cover topics ranging from learning different methods of ingesting data into the cloud to designing the right data warehousing solution, managing large-scale data transformations, extracting valuable insights, and learning how to leverage cloud computing to drive advanced analytical workloads. Finally, you'll discover how to add data governance, compliance, and security to solutions.By the end of this book, you'll have gained the expertise needed to become a well-rounded Azure Data & AI architect.What You Will Learn:Design scalable and cost-effective cloud data platforms on Microsoft AzureExplore architectural design patterns with various use casesDetermine the right data stores and data warehouse solutionsDiscover best practices for data orchestration and transformationHelp end users to visualize data using interactive dashboardingLeverage OpenAI and custom ML models for advanced analyticsManage security, compliance, and governance for the data estateWho this book is for:This book is for anyone looking to elevate their skill set to the level of an architect. Data engineers, data scientists, business intelligence developers, and database administrators who want to learn how to design end-to-end data solutions and get a bird's-eye view of the entire data platform will find this book useful. Although not required, basic knowledge of databases and data engineering workloads is recommended.

  • av Adnan Masood
    605

    Build and deploy your AI models successfully by exploring model governance, fairness, bias, and potential pitfallsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn ethical AI principles, frameworks, and governanceUnderstand the concepts of fairness assessment and bias mitigationIntroduce explainable AI and transparency in your machine learning modelsBook DescriptionResponsible AI in the Enterprise is a comprehensive guide to implementing ethical, transparent, and compliant AI systems in an organization. With a focus on understanding key concepts of machine learning models, this book equips you with techniques and algorithms to tackle complex issues such as bias, fairness, and model governance.Throughout the book, you'll gain an understanding of FairLearn and InterpretML, along with Google What-If Tool, ML Fairness Gym, IBM AI 360 Fairness tool, and Aequitas. You'll uncover various aspects of responsible AI, including model interpretability, monitoring and management of model drift, and compliance recommendations. You'll gain practical insights into using AI governance tools to ensure fairness, bias mitigation, explainability, privacy compliance, and privacy in an enterprise setting. Additionally, you'll explore interpretability toolkits and fairness measures offered by major cloud AI providers like IBM, Amazon, Google, and Microsoft, while discovering how to use FairLearn for fairness assessment and bias mitigation. You'll also learn to build explainable models using global and local feature summary, local surrogate model, Shapley values, anchors, and counterfactual explanations.By the end of this book, you'll be well-equipped with tools and techniques to create transparent and accountable machine learning models.What you will learnUnderstand explainable AI fundamentals, underlying methods, and techniquesExplore model governance, including building explainable, auditable, and interpretable machine learning modelsUse partial dependence plot, global feature summary, individual condition expectation, and feature interactionBuild explainable models with global and local feature summary, and influence functions in practiceDesign and build explainable machine learning pipelines with transparencyDiscover Microsoft FairLearn and marketplace for different open-source explainable AI tools and cloud platformsWho this book is forThis book is for data scientists, machine learning engineers, AI practitioners, IT professionals, business stakeholders, and AI ethicists who are responsible for implementing AI models in their organizations.Table of ContentsA Primer on Explainable and Ethical AIAlgorithms Gone Wild - Bias's Greatest HitsOpening the Algorithmic BlackboxOperationalizing Model MonitoringModel Governance - Audit, and Compliance Standards & RecommendationsEnterprise Starter Kit for Fairness, Accountability and TransparencyInterpretability Toolkits and Fairness MeasuresFairness in AI System with Microsoft FairLearnFairness Assessment and Bias Mitigation with FairLearn and Responsible AI ToolboxFoundational Models and Azure OpenAI

  • av Raghav Kandarpa
    515,-

    Become a data wrangling expert and make well-informed decisions by effectively utilizing and analyzing raw unstructured data in a systematic mannerPurchase of the print or Kindle book includes a free PDF eBookKey Features:Implement query optimization during data wrangling using the SQL language with practical use casesMaster data cleaning, handle the date function and null value, and write subqueries and window functionsPractice self-assessment questions for SQL-based interviews and real-world case study roundsBook Description:The amount of data generated continues to grow rapidly, making it increasingly important for businesses to be able to wrangle this data and understand it quickly and efficiently. Although data wrangling can be challenging, with the right tools and techniques you can efficiently handle enormous amounts of unstructured data.The book starts by introducing you to the basics of SQL, focusing on the core principles and techniques of data wrangling. You'll then explore advanced SQL concepts like aggregate functions, window functions, CTEs, and subqueries that are very popular in the business world. The next set of chapters will walk you through different functions within SQL query that cause delays in data transformation and help you figure out the difference between a good query and bad one. You'll also learn how data wrangling and data science go hand in hand. The book is filled with datasets and practical examples to help you understand the concepts thoroughly, along with best practices to guide you at every stage of data wrangling.By the end of this book, you'll be equipped with essential techniques and best practices for data wrangling, and will predominantly learn how to use clean and standardized data models to make informed decisions, helping businesses avoid costly mistakes.What You Will Learn:Build time series models using data wranglingDiscover data wrangling best practices as well as tips and tricksFind out how to use subqueries, window functions, CTEs, and aggregate functionsHandle missing data, data types, date formats, and redundant dataBuild clean and efficient data models using data wrangling techniquesRemove outliers and calculate standard deviation to gauge the skewness of dataWho this book is for:This book is for data analysts looking for effective hands-on methods to manage and analyze large volumes of data using SQL. The book will also benefit data scientists, product managers, and basically any role wherein you are expected to gather data insights and develop business strategies using SQL as a language. If you are new to or have basic knowledge of SQL and databases and an understanding of data cleaning practices, this book will give you further insights into how you can apply SQL concepts to build clean, standardized data models for accurate analysis.

  • av Navnit Shukla
    559,-

    Revamp your data landscape and implement highly effective data pipelines in AWS with this hands-on guidePurchase of the print or Kindle book includes a free PDF eBookKey Features:Execute extract, transform, and load (ETL) tasks on data lakes, data warehouses, and databasesImplement effective Pandas data operation with data wranglerIntegrate pipelines with AWS data servicesBook Description:Data wrangling is the process of cleaning, transforming, and organizing raw, messy, or unstructured data into a structured format. It involves processes such as data cleaning, data integration, data transformation, and data enrichment to ensure that the data is accurate, consistent, and suitable for analysis. Data Wrangling on AWS equips you with the knowledge to reap the full potential of AWS data wrangling tools.First, you'll be introduced to data wrangling on AWS and will be familiarized with data wrangling services available in AWS. You'll understand how to work with AWS Glue DataBrew, AWS data wrangler, and AWS Sagemaker. Next, you'll discover other AWS services like Amazon S3, Redshift, Athena, and Quicksight. Additionally, you'll explore advanced topics such as performing Pandas data operation with AWS data wrangler, optimizing ML data with AWS SageMaker, building the data warehouse with Glue DataBrew, along with security and monitoring aspects.By the end of this book, you'll be well-equipped to perform data wrangling using AWS services.What You Will Learn:Explore how to write simple to complex transformations using AWS data wranglerUse abstracted functions to extract and load data from and into AWS datastoresConfigure AWS Glue DataBrew for data wranglingDevelop data pipelines using AWS data wranglerIntegrate AWS security features into Data Wrangler using identity and access management (IAM)Optimize your data with AWS SageMakerWho this book is for:This book is for data engineers, data scientists, and business data analysts looking to explore the capabilities, tools, and services of data wrangling on AWS for their ETL tasks. Basic knowledge of Python, Pandas, and a familiarity with AWS tools such as AWS Glue, Amazon Athena is required to get the most out of this book.

  • av Carlos Santana Roldán
    619,-

    Dive in and discover how to build awesome React web apps that you can scale and maintain using design patterns and the latest industry insights.Key Features:Discover and unpack the latest React 18 and Node 19 features in this updated fourth editionGet up to speed with TypeScript, MonoRepo architecture, and several cutting-edge React toolsLearn from plenty of real-world examples and an improved chapter flowBook Description:React helps you work smarter, not harder - but to reap the benefits of this popular JavaScript library and its components, you need a straightforward guide that will teach you how to make the most of it.React 18 Design Patterns and Best Practices will help you use React effectively to make your applications more flexible, easier to maintain, and improve their performance, while giving your workflow a huge boost. With a better organization of topics and knowledge about best practices added to your developer toolbox, the updated fourth edition ensures an enhanced learning experience.The book is split into three parts; the first will teach you the fundamentals of React patterns, the second will dive into how React works, and the third will focus on real-world applications. All the code samples are updated to the latest version of React and you'll also find plenty of new additions that explore React 18 and Node 19's newest features, alongside MonoRepo Architecture and a dedicated chapter on TypeScript.By the end of this book, you'll be able to efficiently build and deploy real-world React web applications.What You Will Learn:Get familiar with the new React 18 and Node 18 featuresExplore TypeScript's basic and advanced capabilitiesMake components communicate with each other by applying consolidate patternsDive into MonoRepo architectureUse server-side rendering to make applications load fasterWrite a comprehensive set of tests to create robust and maintainable codeBuild high-performing applications by styling and optimizing React componentsWho this book is for:This book is for web developers who want to master React by learning key design patterns and best practices in real-world application development. You'll need an intermediate-level experience with React and JavaScript before you get started.

  • av Iain Anderson
    1 079,-

    Unlock the hidden gems of video editing with Iain Anderson, Apple Certified Trainer Bonus 1: Get the Ultimate FCP Keyboard Shortcut Cheat-Sheet for maximum speed! Bonus 2: Get Free Digital Updates for your book, regardless of the format you purchase!Key Features:- Covers the newest features for FCP 10.7.1 along with expert tips, step-by-step tutorials, and advanced techniques- Easy-to-follow and well-organized, with clear explanations and helpful tips for beginners and experienced users- Updated with the latest features, including a new 360° Workflows Appendix, Object Tracking, advanced color correction techniques, and much moreBook Description:Elevate your video editing skills with Final Cut Pro 10.7.1, the ultimate tool for efficient and professional editing, offering powerful new features to enhance your workflow and give your videos a stunning look.The second edition of this comprehensive guide covers exciting new features in FCP, teaching you how to streamline your workflow with customizable workspaces, shortcuts, and advanced trimming tools. Explore best-in-class titles and a comprehensive suite of visual effects in Final Cut Pro for dynamic videos, create a great-sounding mix with Final Cut Pro's audio tools, and utilize the magnetic timeline, multicam editing, and advanced color correction for every project.Whether you're creating content for social media, YouTube, or Hollywood, Final Cut Pro Efficient Editing, Second Edition is your ultimate guide to professional video editing. Get your copy today and take your video editing skills to the next level.What You Will Learn:- Organize and manage media from multiple sources- Edit and manipulate video with an intuitive interface and powerful tools- Streamline your workflow with customizable workspaces and keyboard shortcuts- Sync and edit multicam interviews with ease and learn advanced trimming techniques- Use advanced audio and color grading tools to achieve a professional-quality finish- Work with other editors using the built-in collaboration tools- Create stunning visual effects and complex motion graphics titles- Export video projects in a variety of formats for delivery to multiple platforms and user devicesWho this book is for:This book is designed to help everyone: creative professionals, anyone new to video editing, and existing editors switching from other video editing systems to Final Cut Pro or stepping up from iMovie. Whether you are a beginner or a professional, you'll find this FCP book highly valuable. All you need to get started is a basic familiarity with macOS.

  • av Vincent Vandenbussche
    785,-

    Methodologies and recipes to regularize any machine learning and deep learning model using cutting-edge technologies such as stable diffusion, Dall-E and GPT-3Purchase of the print or Kindle book includes a free PDF eBookKey Features:Learn to diagnose the need for regularization in any machine learning modelRegularize different ML models using a variety of techniques and methodsEnhance the functionality of your models using state of the art computer vision and NLP techniquesBook Description:Regularization is an infallible way to produce accurate results with unseen data, however, applying regularization is challenging as it is available in multiple forms and applying the appropriate technique to every model is a must. The Regularization Cookbook provides you with the appropriate tools and methods to handle any case, with ready-to-use working codes as well as theoretical explanations.After an introduction to regularization and methods to diagnose when to use it, you'll start implementing regularization techniques on linear models, such as linear and logistic regression, and tree-based models, such as random forest and gradient boosting. You'll then be introduced to specific regularization methods based on data, high cardinality features, and imbalanced datasets. In the last five chapters, you'll discover regularization for deep learning models. After reviewing general methods that apply to any type of neural network, you'll dive into more NLP-specific methods for RNNs and transformers, as well as using BERT or GPT-3. By the end, you'll explore regularization for computer vision, covering CNN specifics, along with the use of generative models such as stable diffusion and Dall-E.By the end of this book, you'll be armed with different regularization techniques to apply to your ML and DL models.What You Will Learn:Diagnose overfitting and the need for regularizationRegularize common linear models such as logistic regressionUnderstand regularizing tree-based models such as XGBoosUncover the secrets of structured data to regularize ML modelsExplore general techniques to regularize deep learning modelsDiscover specific regularization techniques for NLP problems using transformersUnderstand the regularization in computer vision models and CNN architecturesApply cutting-edge computer vision regularization with generative modelsWho this book is for:This book is for data scientists, machine learning engineers, and machine learning enthusiasts, looking to get hands-on knowledge to improve the performances of their models. Basic knowledge of Python is a prerequisite.

  • av Alan Clements
    559,-

    Learn computer architecture with Python and ARM, simulating assembly program execution and designing a computer simulatorPurchase of the print or Kindle book includes a free PDF eBookKey Features- Build a computer simulator with Python: Learn computer architecture by designing and constructing a simulator- Python for architecture: Use Python to simulate and execute assembly language instructions- ARM programming on Raspberry Pi: Explore ARM assembly language and run programs on Raspberry PiBook DescriptionThis comprehensive guide offers a unique and immersive learning experience by combining Python programming with ARM architecture.Starting with an introduction to computer architecture and the flow of data within a computer system, you'll progress to building your own interpreter using Python. You'll see how this foundation enables the simulation of computer operations and learn ways to enhance a simulator by adding new instructions and displaying improved results.As you advance, you'll explore the TC1 Assembler and Simulator Program to gain insights into instruction analysis and explore practical examples of simulators. This will help you build essential skills in understanding complex computer instructions, strengthening your grasp of computer architecture. Moreover, you'll be introduced to the Raspberry Pi operating system, preparing you to delve into the detailed language of the ARM computer. This includes exploring the ARM instruction set architecture, data-processing instructions, subroutines, and the stack.With clear explanations, practical examples, and coding exercises, this resource will enable you to design and construct your own computer simulator, simulate assembly language programs, and leverage the Raspberry Pi for ARM programming.What you will learn- Master the core principles of computer architecture- Understand the role of registers, memory, and data flow in computers- Discover how to design and implement a computer simulator using Python- Simulate and execute assembly language programs on the simulator- Enhance the simulator using new instructions for improved output- Analyze complex computer instructions for deeper architectural understanding- Explore the ARM instruction set and data processing on the Raspberry Pi- Develop proficiency in writing, assembling, and running ARM code on the Raspberry PiWho this book is forThis book is for university students studying computer science, particularly those enrolled in a computer architecture module. With its practical approach and succinct explanations, it is also suitable for hobbyists, enthusiasts, and self-learners seeking a deeper understanding of computer systems. The book assumes foundational knowledge of number bases, binary arithmetic, and Boolean logic concepts. While it primarily caters to the computer science field, this book is less geared toward electrical or electronics engineering.Table of Contents- Introduction to the computer- Computer architecture: Data flow in a computer- Crafting an interpreter: First steps- A little more Python- Analyzing the Instruction- The Different Types of Computing Technologies- Adding New Instructions- Displaying results- Examples of simulators- "Basics of the Raspberry Pi operating system"- "ARM instruction set architecture"- ARM data-processing instructions- Appendix I: Examples of ARM code

  • av François Voron
    679,-

    Learn all the features and best practices of FastAPI to build, deploy, and monitor powerful data science and AI apps, like object detection or image generation.Purchase of the print or Kindle book includes a free PDF eBookKey Features:Uncover the secrets of FastAPI, including async I/O, type hinting, and dependency injectionLearn to add authentication, authorization, and interaction with databases in a FastAPI backendDevelop real-world projects using pre-trained AI modelsBook Description:Building Data Science Applications with FastAPI is the go-to resource for creating efficient and dependable data science API backends. This second edition incorporates the latest Python and FastAPI advancements, along with two new AI projects - a real-time object detection system and a text-to-image generation platform using Stable Diffusion.The book starts with the basics of FastAPI and modern Python programming. You'll grasp FastAPI's robust dependency injection system, which facilitates seamless database communication, authentication implementation, and ML model integration. As you progress, you'll learn testing and deployment best practices, guaranteeing high-quality, resilient applications.Throughout the book, you'll build data science applications using FastAPI with the help of projects covering common AI use cases, such as object detection and text-to-image generation. These hands-on experiences will deepen your understanding of using FastAPI in real-world scenarios.By the end of this book, you'll be well equipped to maintain, design, and monitor applications to meet the highest programming standards using FastAPI, empowering you to create fast and reliable data science API backends with ease while keeping up with the latest advancements.What You Will Learn:Explore the basics of modern Python and async I/O programmingGet to grips with basic and advanced concepts of the FastAPI frameworkDeploy a performant and reliable web backend for a data science applicationIntegrate common Python data science libraries into a web backendIntegrate an object detection algorithm into a FastAPI backendBuild a distributed text-to-image AI system with Stable DiffusionAdd metrics and logging and learn how to monitor themWho this book is for:This book is for data scientists and software developers interested in gaining knowledge of FastAPI and its ecosystem to build data science applications. Basic knowledge of data science and machine learning concepts and how to apply them in Python is recommended.

  • av Ahilan Ponnusamy
    605

    Align your operating model with your organization's goals and enable leadership, culture, engineering, and operations to tame the complexities of the distributed futurePurchase of the print or Kindle book includes a free PDF eBookKey Features:Get hands-on with creating your operating model across on-premises, cloud, and edgeLearn how to group, construct, and scope operating model dimensionsTackle operating model complexities like architecture, stakeholder management, platform operations, compliance, security, and technology selectionBook Description:Cloud goals, such as faster time to market, lower total cost of ownership (TCO), capex reduction, self-service enablement, and complexity reduction are important, but organizations often struggle to achieve the desired outcomes. With edge computing gaining momentum across industries and making it possible to move workloads seamlessly between cloud and edge locations, organizations need working recipes to find ways of extracting the most value out of their cloud and edge estate.This book provides a practical way to build a strategy-aligned operating model while considering various related factors such as culture, leadership, team structures, metrics, intrinsic motivators, team incentives, tenant experience, platform engineering, operations, open source, and technology choices. Throughout the chapters, you'll discover how single, hybrid, or multicloud architectures, security models, automation, application development, workload deployments, and application modernization can be reutilized for edge workloads to help you build a secure yet flexible technology operating model. The book also includes a case study which will walk you through the operating model build process in a step-by-step way.By the end of this book, you'll be able to build your own fit-for-purpose distributed technology operating model for your organization in an open culture way.What You Will Learn:Get a holistic view of technology operating models and linked organization goals, strategy, and teamsOvercome challenges of extending tech operating models to distributed cloud and edge environmentsDiscover key architectural considerations in building operating modelsExplore the benefits of using enterprise-ready open-source productsUnderstand how open hybrid cloud and modern dev and ops practices improve outcomesWho this book is for:If you are a cloud architect, solutions architect, DevSecOps or platform engineering manager, CTO, CIO, or IT decision maker tasked with leading cloud and edge computing initiatives, creating architectures and enterprise capability models, aligning budgets, or showing your board the value of your technology investments, then this book is for you. Prior knowledge of cloud computing, application development, and edge computing concepts will help you get the most out of this book.

  • av Stian Thorgersen
    725,-

    Gain a practical understanding of Keycloak to enable authentication and authorization in applications while leveraging the additional features provided by Keycloak.Purchase of the print or Kindle book includes a free PDF eBookKey Features:- A beginners' guide to Keycloak focussed on understanding Identity and Access Management- Implement authentication and authorization in applications using Keycloak 22- Utilize Keycloak in securing applications developed by you and the existing applications in your enterpriseBook Description:The second edition of Keycloak - Identity and Access Management for Modern Applications is an updated, comprehensive introduction to Keycloak and its updates.In this new edition, you will learn how to use the latest distribution of Keycloak. The recent versions of Keycloak are now based on Quarkus, which brings a new and improved user experience and a new admin console with a higher focus on usability. You will see how to leverage Spring Security, instead of the Keycloak Spring adapter while using Keycloak 22. As you progress, you'll understand the new Keycloak distribution and explore best practices in using OAuth. Finally, you'll cover general best practices and other information on how to protect your applications.By the end of this new edition, you'll have learned how to install and manage the latest version of Keycloak to secure new and existing applications using the latest features.What You Will Learn:- Understand how to install, configure, and manage the latest version of Keycloak- Discover how to obtain access tokens through OAuth 2.0- Utilize a reverse proxy to secure an application implemented in any programming language or framework- Safely manage Keycloak in a production environment- Secure different types of applications, including web, mobile, and native applications- Discover the frameworks and third-party libraries that can expand KeycloakWho this book is for:This book is for developers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security. Basic knowledge of app development, authentication, and authorization is expected.Table of Contents- Getting Started with Keycloak- Securing Your First Application- Brief Introduction to Standards- Authenticating Users with OIDC- Authorizing Access with OAuth 2.0- Securing Different Application Types- Integrating Applications with Keycloak- Authorization Strategies- Configuring Keycloak for Production- Managing Users- Authenticating Users- Managing Tokens and Sessions- Extending Keycloak- Securing Keycloak and Applications

  • av Ahmad Mozaffar
    605

    Leverage the power of WebAssembly with .NET 7 and C# to develop cutting-edge frontend web applications systematically with this comprehensive guidePurchase of the print or Kindle book includes a free PDF eBookKey Features- Explore Blazor WebAssembly through a systematic, step-by-step approach- Discover the concepts essential to develop and deploy real-world SPAs- Create robust components and develop efficient unit tests by using the bUnit frameworkBook DescriptionBlazor WebAssembly is a revolutionary technology in software development that enables you to develop web applications with a rich user interface using C# without JavaScript. It can be run natively in the browser and soon on mobile apps with .NET MAUI, making it a superweapon in the .NET developer's toolbox. This capability has opened the doors for the JavaScript community to have a stable framework to build single page applications (SPAs) maintained by Microsoft and driven by the community.Mastering Blazor WebAssembly is a complete resource that teaches you everything you need to build client-side web applications using C# & .NET 7.0. Throughout this book, you'll discover the anatomy of a Blazor WebAssembly project, along with the build, style, and structure of the components. You'll implement forms to catch user input and collect data, as well as explore the topics of navigating between the pages in depth. The chapters will guide you through handling complex scenarios like RenderTrees, writing efficient unit tests, using variant security methods, and publishing the app to different providers, all in a practical manner.By the end of this book, you'll have the skills necessary to build web apps with Blazor WebAssembly, along with the basics for a future in mobile development with .NET MAUI and Blazor.What You Will Learn- Develop basic and advanced components in Blazor to meet your application's specific requirements- Utilize Blazor forms to efficiently collect user input and handle data validation- Enhance your app with JavaScript logic, integrating it smoothly within your Blazor application- Call RESTful APIs in Blazor, enabling seamless integration with external services- Explore advanced identity and security techniques in Blazor ensuring robust authentication and authorization mechanisms- Build reliable apps by implementing unit testing and effective error handling strategiesWho this book is forThis book is for existing .NET developers eager to leverage their C# skills to build single page applications without relying on JavaScript frameworks, as well as for JavaScript developers curious about Blazor's capabilities and its user-friendly approach to web development. Tech enthusiasts seeking an in-depth understanding of Blazor's inner workings will also find this guide useful for discovering and mastering Blazor's powerful and intuitive web development capabilities.Table of Contents- Understanding the Anatomy of a Blazor WebAssembly Project- Components in Blazor- Developing Advanced Components in Blazor- Navigation and Routing- Capturing User Input with Forms and Validation- Consuming JavaScript in Blazor- Managing Application State- Consuming Web APIs from Blazor WebAssembly- Authenticating and Authorizing Users in Blazor- Handling Errors in Blazor WebAssembly- Giving Your App a Speed Boost- RenderTree in Blazor- Testing Blazor WebAssembly Apps- Publishing Blazor WebAssembly Apps- What's Next?

  • av Adam Kramarzewski
    679,-

    Arm yourself with the practical skills and cutting-edge insights necessary to successfully design captivating games across a variety of genres and platformsPurchase of the print or Kindle book includes a free PDF eBookKey FeaturesMaster the skills, processes, and techniques essential for working in a professional settingGrasp the core principles and processes of level design, world building, and storytellingDesign, implement, and refine high-quality features and mechanics for contemporary video gamesBook DescriptionIf you're in search of a cutting-edge actionable guide to game design, your quest ends here! Immerse yourself in the fundamentals of game design with expert guidance from veterans with decades of game design experience across a variety of genres and platforms.The second edition of this book remains dedicated to its original goal of helping you master the fundamentals of game design in a practical manner with the addition of some of the latest trends in game design and a whole lot of fresh, real-world examples from games of the current generation. This update brings a new chapter on games as a service, explaining the evolving role of the game designer and diving deeper into the design of games that are meant to be played forever. From conceptualizing a game idea, you'll gradually move on to devising a design plan and adapting solutions from existing games, exploring the craft of producing original game mechanics, and eliminating anticipated design risks through testing. You'll then be introduced to level design, interactive storytelling, user experience and accessibility.By the end of this game design book, you'll have learned how to wrap up a game ahead of its release date, work through the challenges of designing free-to-play games and games as a service, and significantly improve their quality through iteration, playtesting, and polishing.What you will learnDefine the scope and structure of a game projectConceptualize a game idea and present it to othersDesign gameplay systems and communicate them clearly and thoroughlyBuild and validate engaging game mechanicsDesign successful games as a service and prepare them for live operationsImprove the quality of a game through playtesting and meticulous polishingWho this book is forWhether you are a student eager to design your very first game or a game designer looking to expand your skill set, this book will help you master the fundamentals of game design across all stages of game development. With a focus on best practices and a pragmatic approach, Practical Game Design offers insights into the art and craft of game design from two senior game designers, with insider knowledge that even veterans will find valuable. While prior experience with game development is not absolutely necessary, having basic knowledge of popular video games will prove helpful.Table of ContentsIntroducing the Game Production ProcessPreparing a Game ConceptScoping a Game ProjectCreating Design DocumentationUnderstanding Game MechanicsDesigning Systems and FeaturesMaking PrototypesDesigning Compelling Stories for GamesThe Fundamentals of Level DesignCreating CharactersBalancing Your Content and SystemsBuilding a Great User Interface and User ExperienceMaking Your Games AccessibleMastering Games as a ServiceUnderstanding Monetization TechniquesThe Final 10%

  • av Adarsh Nair
    539,-

    Strengthen your ability to implement, assess, evaluate, and enhance the effectiveness of information security controls based on ISO/IEC 27001/27002:2022 standardsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Familiarize yourself with the clauses and control references of ISO/IEC 27001:2022Define and implement an information security management system aligned with ISO/IEC 27001/27002:2022Conduct management system audits to evaluate their effectiveness and adherence to ISO/IEC 27001/27002:2022Book Description:ISO 27001 and ISO 27002 are globally recognized standards for information security management systems (ISMSs), providing a robust framework for information protection that can be adapted to all organization types and sizes. Organizations with significant exposure to information-security-related risks are increasingly choosing to implement an ISMS that complies with ISO 27001. This book will help you understand the process of getting your organization's information security management system certified by an accredited certification body.The book begins by introducing you to the standards, and then takes you through different principles and terminologies. Once you completely understand these standards, you'll explore their execution, wherein you find out how to implement these standards in different sizes of organizations. The chapters also include case studies to enable you to understand how you can implement the standards in your organization. Finally, you'll get to grips with the auditing process, planning, techniques, and reporting and learn to audit for ISO 27001.By the end of this book, you'll have gained a clear understanding of ISO 27001/27002 and be ready to successfully implement and audit for these standards.What You Will Learn:Develop a strong understanding of the core principles underlying information securityGain insights into the interpretation of control requirements in the ISO 27001/27002:2022 standardUnderstand the various components of ISMS with practical examples and case studiesExplore risk management strategies and techniquesDevelop an audit plan that outlines the scope, objectives, and schedule of the auditExplore real-world case studies that illustrate successful implementation approachesWho this book is for:This book is for information security professionals, including information security managers, consultants, auditors, officers, risk specialists, business owners, and individuals responsible for implementing, auditing, and administering information security management systems. Basic knowledge of organization-level information security management, such as risk assessment, security controls, and auditing, will help you grasp the topics in this book easily.

  • av Kelsey Gilbert Kreiling
    499,-

    Uncover expert insights, practical tools, and a library of resources, including everything you need to build design-focused websites with rich user experience-from signup to launchPurchase of the print or Kindle book includes a free PDF eBookKey Features:Discover professional insights as you get hands-on with designing a custom website on Squarespace 7.1 and Fluid EngineLaunch a website on your domain with features like commerce, member areas, blogging, and schedulingGrow your audience with a mobile-optimized website you can own, edit, and updateBook Description:You may have heard about Squarespace and even started a trial site, but launching it can be a real challenge for new users. While the basic features look simple enough, shaping Squarespace to fit your business needs requires expert help. That's where author and Squarespace expert Kelsey Gilbert Kreiling can help. Squarespace from Signup to Launch is a comprehensive resource for customizing the most design-focused and user-friendly website builder in the no-code world.Enriched with insights and resources from Squarespace experts such as Christy Price, Will Myers, David Iskander, Kristine Neil, Kathryn Joachim, Beatriz Caraballo, Justin Mabee, Shelly Morse, and more, this book goes beyond a technical manual. It prepares you to build a website, explains the foundational knowledge behind Squarespace 7.1 and Fluid Engine, and fosters a professional designer's mindset. Throughout the book, you'll learn how to build forms, use content blocks, optimize websites for mobile, build an online store, and become proficient in Squarespace's built-in SEO, marketing, and analytics tools.By the end of this Squarespace book, you'll have the confidence to build professional websites with a developer's technical knowledge, project organization, and design intuition. You won't just launch your site; you'll be proud to share it with the world.What You Will Learn:Build a website on Squarespace, step by step, with expert insights and practical tipsPlan your site content with an easy-to-understand outlineSource and create the visual elements necessary to achieve a professional websiteGo beyond pre-set templates by creating a polished design from navigation to footerIntegrate custom code to enhance both the design and functionality of your projectOptimize your website for mobile viewing and search engine visibilityImplement effective marketing strategies to promote your site and grow your audience after its launchWho this book is for:If you are interested in building a website on the Squarespace platform, using its newest version 7.1 and Fluid Engine, this book is for you. Whether you're a brand designer with little or no code experience, an entrepreneur seeking full ownership and usability of a website, or a website designer versed in other platforms looking to expand your skill set to other platforms, this comprehensive go-to guide covers everything you need. No matter your entry point, this book will offer an understanding of the why and how of Squarespace.

  • av Andy Gardiner
    685,-

    Layout multipage documents faster for print and digital output in this part-color guide, with consistent control over typography, color and positioning, all whilst using the latest Adobe InDesign 2023 features to automate repetitive and complex tasksKey Features- Create engaging design solutions for print and digital media such as posters, magazines, books, and brochures- Master the powerful tools InDesign offers to simplify complex tasks and avoid potentially disastrous mistakes- Discover InDesign best practices to increase productivity and speed up the design process with this illustrated guideBook DescriptionAdobe InDesign is the leading desktop publishing and layout software for producing brochures, magazines, flyers, books, posters, and a wide range of digital documents. It allows you to rapidly draft your documents with precise control over typography, images, positioning, alignment, color, and other interactive features. However, InDesign's interface, tools, and workflows can be a bit challenging to get to grips with. This cookbook will assist you in building unparalleled InDesign workflows with tried and tested recipes.With Designing the Adobe InDesign Way, you'll learn how to add and edit content, create color swatches, and use features such as tables, all while applying software best practices and techniques to ensure that your work is fast, efficient, and easily maintained. Additionally, you'll explore advanced InDesign features such as text styles, parent pages, tables of contents, and pre-flighting. Finally, you'll take a closer look at the many export options in InDesign and ways to truly maximize its capabilities.By the end of this book, you'll be well equipped to draft and design your own projects while ensuring your work is compatible with industry standards for print and digital documents.What You Will Learn- Navigate and customize the InDesign interface- Understand how to set up new documents for different types of content- Explore how to add and adjust content within your documents- Discover a range of tools to speed up your workflow and make you more efficient- Check your documents for errors and make the required corrections- Share your document output in different formats based on specific requirementsWho this book is forThis book is for marketing and communications professionals, marketing executives, marketing managers, marketing assistants, communications officers, communications managers, graphic designers, publishers, bids and tender teams, PR professionals, and brand managers looking to gain a deep understanding of InDesign. Anyone seeking to learn InDesign to create more professional content and advance their skills will find the book useful.Table of Contents- Customizing the InDesign Interface and New Document Settings- Working with Text in InDesign- Creating and Using Tables- Using the InDesign Frame Tools- Adding Images to Your Document- Taking Images Further - Creating and Applying Parent Pages- Working with Colours and Gradients- Formatting with Paragraph and Character Styles- Generating and Updating a Table of Contents- Creating Interactivity and PDF Forms- Using and Collaborating with CC Libraries- Preflighting and Outputting

  • av Jon Holt
    785,-

    Learn to identify problems when developing complex systems and design effective solutions using a model-based system engineering approachKey Features:- Implement model-based systems engineering, including visualization, verification, and validation processes- Explore the complexity of a system and learn how it can be commissioned as an effective resource- Filled with comprehensive explanations, practical examples and self assessment testsBook Description:Systems engineering helps in developing and describing complex systems. Written by an internationally-recognized systems engineering expert, this updated edition provides insight into elements to consider when designing a complex system that is robust and successful.The latest edition covers the new approaches of Model-Based Systems Engineering (MBSE) and its deployment techniques using the Trinity approach. You will learn about the system engineering life cycle and processes to implement. Effective systems can be built only when the system is designed with close attention to detail, meaning each aspect of the system is recognized and understood before the system is built. The book explains in great detail, different system models and visualization techniques, with a focus on SysML, to help you visualize a system in the design phase. You will also learn various verification and validation techniques to ensure your system design is ready to be implemented. The book ends with key management processes, systems engineering best practices, and guidelines, with a new section on effective approaches based on the author's impressive 30 years of experience in the field.By the end of this systems engineering book, you'll be able to apply modern model-based systems engineering techniques to your own systems and projects.What You Will Learn:- Study the three evils of systems engineering: complexity, ambiguous communication, lack of understanding- Learn how to deploy MBSE using the Trinity approach- Receive invaluable information about the philosophy of modeling from a seasoned professional- Understand the MBSE life cycle and how design, verification, and validation fit into it- Explore processes and concepts such as activities, stakeholders, and resources- Discover how needs fit into the life cycle and how to comply with relevant processes- Gain a deeper understanding of how to model effectively and efficientlyWho this book is for:This book is for aspiring systems engineers, engineering managers, or anyone looking to apply systems engineering practices to their systems and projects. While a well-structured, model-based approach to systems engineering is an essential skill for engineers of all disciplines, many companies are finding that new graduates have little understanding of MBSE. This book helps you acquire this skill with the help of a simple and practical approach to developing successful systems. No prior knowledge of systems engineering or modeling is required to get started with this book.Table of Contents- Introduction to Systems Engineering- Model-Based Systems Engineering- Systems and Interfaces- Life Cycles- System Engineering Processes- Needs and Requirements- Modeling the Design- Modeling Verification and Validation- Methodologies- System Engineering Management- Deploying MBSE- The Art of Modeling- Best Practices

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.