Détail de l'éditeur
PACKT PUBLISHING |
Documents disponibles chez cet éditeur (2692)
![](./images/expand_all.gif)
![](./images/collapse_all.gif)
![Tris disponibles](./images/orderby_az.gif)
Titre : The Cybersecurity Playbook for Modern Enterprises Type de document : e-book Auteurs : Jeremy WITTKOP Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781803248639 Note générale : copyrighted Langues : Anglais (eng) Résumé : Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniquesKey FeaturesUnderstand what happens in an attack and build the proper defenses to secure your organizationDefend against hacking techniques such as social engineering, phishing, and many morePartner with your end user community by building effective security awareness training programsBook DescriptionSecurity is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised.This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world.By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow.What you will learnUnderstand the macro-implications of cyber attacksIdentify malicious users and prevent harm to your organizationFind out how ransomware attacks take placeWork with emerging techniques for improving security profilesExplore identity and access management and endpoint securityGet to grips with building advanced automation modelsBuild effective training programs to protect against hacking techniquesDiscover best practices to help you and your family stay safe onlineWho this book is forThis book is for security practitioners, including analysts, engineers, and security leaders, who want to better understand cybersecurity challenges. It is also for beginners who want to get a holistic view of information security to prepare for a career in the cybersecurity field. Business leaders looking to learn about cyber threats and how they can protect their organizations from harm will find this book especially useful. Whether you're a beginner or a seasoned cybersecurity professional, this book has something new for everyone. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88926719 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=543028 The Definitive Guide to Modernizing Applications on Google Cloud / Steve (Satish) SANGAPU / PACKT PUBLISHING (2022)
![]()
Titre : The Definitive Guide to Modernizing Applications on Google Cloud Type de document : e-book Auteurs : Steve (Satish) SANGAPU Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781800209794 Note générale : copyrighted Langues : Anglais (eng) Résumé : Get to grips with the tools, services, and functions needed for application migration to help you move from legacy applications to cloud-native on Google CloudKey FeaturesDiscover how a sample legacy application can be transformed into a cloud-native application on Google CloudLearn where to start and how to apply application modernization techniques and toolingWork with real-world use cases and instructions to modernize an application on Google CloudBook DescriptionLegacy applications, which comprise 75–80% of all enterprise applications, often end up being stuck in data centers. Modernizing these applications to make them cloud-native enables them to scale in a cloud environment without taking months or years to start seeing the benefits. This book will help software developers and solutions architects to modernize their applications on Google Cloud and transform them into cloud-native applications.This book helps you to build on your existing knowledge of enterprise application development and takes you on a journey through the six Rs: rehosting, replatforming, rearchitecting, repurchasing, retiring, and retaining. You'll learn how to modernize a legacy enterprise application on Google Cloud and build on existing assets and skills effectively. Taking an iterative and incremental approach to modernization, the book introduces the main services in Google Cloud in an easy-to-understand way that can be applied immediately to an application.By the end of this Google Cloud book, you'll have learned how to modernize a legacy enterprise application by exploring various interim architectures and tooling to develop a cloud-native microservices-based application.What you will learnDiscover the principles and best practices for building cloud-native applicationsStudy the six Rs of migration strategy and learn when to choose which strategyRehost a legacy enterprise application on Google Compute EngineReplatform an application to use Google Load Balancer and Google Cloud SQLRefactor into a single-page application (SPA) supported by REST servicesReplatform an application to use Google Identity Platform and Firebase AuthenticationRefactor to microservices using the strangler patternAutomate the deployment process using a CI/CD pipeline with Google Cloud BuildWho this book is forThis book is for software developers and solutions architects looking to gain experience in modernizing their enterprise applications to run on Google Cloud and transform them into cloud-native applications. Basic knowledge of Java and Spring Boot is necessary. Prior knowledge of Google Cloud is useful but not mandatory. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88922836 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=539017 The DevOps Career Handbook : The ultimate guide to pursuing a successful career in DevOps / John KNIGHT / PACKT PUBLISHING (2022)
![]()
Titre : The DevOps Career Handbook : The ultimate guide to pursuing a successful career in DevOps Type de document : e-book Auteurs : John KNIGHT Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781803230948 Note générale : copyrighted Langues : Anglais (eng) Résumé : Explore the diverse DevOps career paths and prepare for each stage of the interview process with collective wisdom from DevOps experts and interviews with DevOps Practitioners Key FeaturesNavigate the many career opportunities in the field of DevOpsDiscover proven tips and tricks from industry experts for every step of the DevOps interviewSave both time and money by avoiding common mistakes in your interviewsBook DescriptionDevOps is a set of practices that make up a culture, and practicing DevOps methods can make developers more productive and easier to work with. The DevOps Career Handbook is filled with hundreds of tips and tricks from experts regarding every step of the interview process, helping you save time and money by steering clear of avoidable mistakes.You'll learn about the various career paths available in the field of DevOps, before acquiring the essential skills needed to begin working as a DevOps professional. If you are already a DevOps engineer, this book will help you to gain advanced skills to become a DevOps specialist. After getting to grips with the basics, you'll discover tips and tricks for preparing your resume and online profiles and find out how to build long-lasting relationships with the recruiters. Finally, you'll read through interviews which will give you an insight into a career in DevOps from the viewpoint of individuals at different career levels.By the end of this DevOps book, you'll gain a solid understanding of what DevOps is, the various DevOps career paths, and how to prepare for your interview.What you will learnUnderstand various roles and career paths for DevOps practitionersDiscover proven techniques to stand out in the application processPrepare for the many stages of your interview, from the phone screen to taking the technical challenge and then the onsite interviewNetwork effectively to help your career move in the right directionTailor your resume to specific DevOps rolesDiscover how to negotiate after you've been extended an offerWho this book is forThis book is for DevOps professionals looking to take the next step in their career, engineers looking to make a career switch, technology managers who want to understand the complete picture of the DevOps landscape, and anyone interested in incorporating DevOps into their tech journey. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88931930 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=552251 The Foundations of Threat Hunting : Organize and design effective cyber threat hunts to meet business needs / Chad MAURICE / PACKT PUBLISHING (2022)
![]()
Titre : The Foundations of Threat Hunting : Organize and design effective cyber threat hunts to meet business needs Type de document : e-book Auteurs : Chad MAURICE Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781803242996 Note générale : copyrighted Langues : Anglais (eng) Résumé : Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterpriseKey FeaturesLearn foundational concepts for effective threat hunting teams in pursuit of cyber adversariesRecognize processes and requirements for executing and conducting a huntCustomize a defensive cyber framework needed to grow and mature a hunt teamBook DescriptionThreat hunting is a concept that takes traditional cyber defense and spins it onto its head. It moves the bar for network defenses beyond looking at the known threats and allows a team to pursue adversaries that are attacking in novel ways that have not previously been seen. To successfully track down and remove these advanced attackers, a solid understanding of the foundational concepts and requirements of the threat hunting framework is needed. Moreover, to confidently employ threat hunting in a business landscape, the same team will need to be able to customize that framework to fit a customer's particular use case.This book breaks down the fundamental pieces of a threat hunting team, the stages of a hunt, and the process that needs to be followed through planning, execution, and recovery. It will take you through the process of threat hunting, starting from understanding cybersecurity basics through to the in-depth requirements of building a mature hunting capability. This is provided through written instructions as well as multiple story-driven scenarios that show the correct (and incorrect) way to effectively conduct a threat hunt.By the end of this cyber threat hunting book, you'll be able to identify the processes of handicapping an immature cyber threat hunt team and systematically progress the hunting capabilities to maturity.What you will learnUnderstand what is required to conduct a threat huntKnow everything your team needs to concentrate on for a successful huntDiscover why intelligence must be included in a threat huntRecognize the phases of planning in order to prioritize effortsBalance the considerations concerning toolset selection and employmentAchieve a mature team without wasting your resourcesWho this book is forThis book is for anyone interested in learning how to organize and execute effective cyber threat hunts, establishing extra defense capabilities within their company, and wanting to mature an organization's cybersecurity posture. It will also be useful for anyone looking for a framework to help a hunt team grow and evolve. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88931934 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=552248 The Insider's Guide to Arm Cortex-M Development : Leverage embedded software development tools and examples to become an efficient Cortex-M developer / Zachary LASIUK / PACKT PUBLISHING (2022)
![]()
Titre : The Insider's Guide to Arm Cortex-M Development : Leverage embedded software development tools and examples to become an efficient Cortex-M developer Type de document : e-book Auteurs : Zachary LASIUK Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781803231112 Note générale : copyrighted Langues : Anglais (eng) Résumé : Learn and implement the latest Arm Cortex-M microcontroller development concepts such as performance optimization, security, software reuse, machine learning, continuous integration, and cloud-based development from industry expertsKey FeaturesLearn how to select the best Cortex-M hardware, software, and tools for your projectUnderstand the use of key software components and how to optimize and develop modern applicationsGet hands-on experience implementing quality software using example code provided in the bookPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionCortex-M has been around since 2004, so why a new book now? With new microcontrollers based on the Cortex-M55 and Cortex-M85 being introduced this year, Cortex-M continues to expand. New software concepts, such as standardized software reuse, have emerged alongside new topics including security and machine learning. Development methodologies have also significantly advanced, with more embedded development taking place in the cloud and increased levels of automation. Due to these advances, a single engineer can no longer understand an entire project and requires new skills to be successful.This book provides a unique view of how to navigate and apply the latest concepts in microcontroller development. The book is split into two parts. First, you'll be guided through how to select the ideal set of hardware, software, and tools for your specific project. Next, you'll explore how to implement essential topics for modern embedded developers. Throughout the book, there are examples for you to learn by working with real Cortex-M devices with all software available on GitHub. You will gain experience with the small Cortex-M0+, the powerful Cortex-M55, and more Cortex-M processors.By the end of this book, you'll be able to practically apply modern Cortex-M software development concepts.What you will learnFamiliarize yourself with heuristics to identify the right components for your Cortex-M projectBoot code to efficiently start up a Cortex-M deviceOptimize algorithms with compilers, middleware, and other meansGet to grips with machine learning frameworks and implementation techniquesUnderstand security in the embedded space with solutions like TrustZone and TF-MExplore cloud-based development methodologies to increase efficiencyDive into continuous integration frameworks and best practicesIdentify future trends that could impact Cortex-M software developmentWho this book is forThis book is for practicing engineers and students working with embedded and IoT systems who want to quickly learn how to develop quality software for Arm Cortex-M processors without reading long technical manuals. If you're looking for a book that explains C or assembly language programming for the purpose of creating a single application or mastering a type of programming such as digital signal processing algorithms, then this book is NOT for you. A basic understanding of embedded hardware and software, along with general C programming skills will assist with understanding the concepts covered in this book. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88937048 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=560127 PermalinkPermalinkThe Kubernetes Operator Framework Book : Overcome complex Kubernetes cluster management challenges with automation toolkits / Michael DAME / PACKT PUBLISHING (2022)
PermalinkPermalinkPermalinkThe Missing Bootstrap 5 Guide : Customize and extend Bootstrap 5 with Sass and JavaScript to create unique website designs / Jeppe Schaumburg JENSEN / PACKT PUBLISHING (2022)
PermalinkPermalinkThe Photographer's Guide to Adobe Lightroom : Learn industry-standard best practices and techniques to get the best out of the latest version of Lightroom Classic / Marcin LEWANDOWSKI / PACKT PUBLISHING (2022)
PermalinkThe Python Workshop : Write Python code to solve challenging real-world problems / Corey WADE / PACKT PUBLISHING (2022)
PermalinkPermalinkThe Salesforce Business Analyst Handbook : Proven business analysis techniques and processes for a superior user experience and adoption / Srini MUNAGAVALASA / PACKT PUBLISHING (2022)
PermalinkPermalinkPermalinkThe Ultimate Guide to Informed Wearable Technology : A hands-on approach for creating wearables from prototype to purpose using Arduino systems / Christine FARION / PACKT PUBLISHING (2022)
PermalinkPermalinkPermalinkTime Series Analysis with Python Cookbook : Practical recipes for exploratory data analysis, data preparation, forecasting, and model evaluation / Tarek A. ATWAN / PACKT PUBLISHING (2022)
PermalinkPermalinkPermalinkTransforming Healthcare with DevOps : A practical DevOps4Care guide to embracing the complexity of digital transformation / Jeroen MULDER / PACKT PUBLISHING (2022)
Permalink
![rss](https://cataloguelibrary.neoma-bs.fr/images/rss.png)
-
59 Rue Taittinger, 51100 Reims
-
00 33 (0)3 26 77 46 15
-
Library Campus Reims
-
1 Rue du Maréchal Juin, BP 215
76825 Mont Saint Aignan cedex -
00 33 (0)2 32 82 58 26
-