Packt Publishing - ebooki
Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals.
Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools.
As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
Więcej »
-
Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
-
Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition
-
Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
Rust for Blockchain Application Development. Learn to build decentralized applications on popular blockchain technologies using Rust
-
Mastering AWS Security. Strengthen your cloud environment using AWS security features coupled with proven strategies - Second Edition
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition
-
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition
-
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation
-
Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls
-
Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition
-
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Automating Security Detection Engineering. A hands-on guide to implementing Detection as Code
-
CCSP (ISC)2 Certified Cloud Security Professional: Exam Guide. Build your knowledge to pass the CCSP exam with expert guidance
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners
-
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA
-
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques
-
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level