Network Scanning CookbookNetwork scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network for vulnerabilities and open ports, which can be used as back doors into a network.
Network Scanning Cookbook contains recipes for configuring these tools in your infrastructure that get you started with scanning ports, services, and devices in your network. As you progress through the chapters, you will learn how to carry out various key scanning tasks, such as firewall detection, OS detection, and access management, and will look at problems related to vulnerability scanning and exploitation in the network. The book also contains recipes for assessing remote services and the security risks that they bring to a network infrastructure.
By the end of the book, you will be familiar with industry-grade tools for network scanning, and tec ...
Hands-On Cloud Solutions with AzureAzure provides cloud-based solutions to support your business demands. Building and running solutions on Azure will help your business maximize the return on investment and minimize the total cost of ownership.
Hands-On Cloud Solutions with Azure focuses on addressing the architectural decisions that usually arise when you design or migrate a solution to Microsoft Azure. You will start by designing the building blocks of infrastructure solution on Azure, such as Azure compute, storage, and networking, followed by exploring the database options it offers. You will get to grips with designing scalable web and mobile solutions and understand where to host your Active Directory and Identity Solution. Moving on, you'll learn how to extend DevOps to Azure.
You will also beneft from some exciting services that enable extremely smooth operations and streamlined DevOps between on-premises and cloud. The book will help you to design a secure environment for your solution, on both the Cloud ...
Pro Microsoft Hyper-V 2019Successfully create and manage your Hyper-V environment without any of the marketing fluff. This book's lab-driven, hands-on approach will get you up and running as quickly and efficiently as possible.
Virtualization is the cornerstone of today's data center. As a modern-day IT pro, you are required to manage environments that are in a regular state of flux and increasing in both size and complexity. To keep up, you need practical information in a format that is succinct, yet comprehensive and highly applicable.
Pro Hyper-V 2019 breaks down critical and time-saving topics into a series of easy-to-digest chapters, showing you how to perform Hyper-V management tasks using both GUI and PowerShell-based tools. Building on your existing knowledge of Windows Server management, Active Directory, networking, and storage, experts and Microsoft MVPs Syrewicze and Siddaway begin with a foundation of why computing workloads are virtualized. This is followed by chapters covering the range of m ...
Exploring PowerShell AutomationDuring the decade that PowerShell has been around, a significant and increasing percentage of Windows administrators have discovered that PowerShell allows them to be more productive. They've realized that PowerShell enables them to perform administrative tasks across a wide range of technologies from Microsoft and third party vendors. The time it takes to develop PowerShell scripts is paid back multiple times by automating repetitive tasks and reducing errors with repeatable, reliable processes.
Exploring PowerShell Automation is a selection of chapters that gives you an overview of using PowerShell to administer your environment. Richard Siddaway has been involved in the production of all of these chapters either as an author or an editor, and has chosen them specifically to represent the breadth of possibilities for administering your systems through PowerShell. The first two chapters provide an overview of PowerShell and PowerShell remoting. The remaining three chapters give you ...
Securing the PerimeterLeverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack.
The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it's more valuable to prevent than to detect a security breach. That's why Identity and Access Management (IAM) is a critical component of an organization's security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as "suites" because IAM is not just one component. It's a number of components working together, including web, authentication, authorization, cryptographic, and persistence services.
Securing the Perimeter docu ...
Learn Keras for Deep Neural NetworksLearn, understand, and implement deep neural networks in a math- and programming-friendly approach using Keras and Python. The book focuses on an end-to-end approach to developing supervised learning algorithms in regression and classification with practical business-centric use-cases implemented in Keras.
The overall book comprises three sections with two chapters in each section. The first section prepares you with all the necessary basics to get started in deep learning. Chapter 1 introduces you to the world of deep learning and its difference from machine learning, the choices of frameworks for deep learning, and the Keras ecosystem. You will cover a real-life business problem that can be solved by supervised learning algorithms with deep neural networks. You'll tackle one use case for regression and another for classification leveraging popular Kaggle datasets.
Later, you will see an interesting and challenging part of deep learning: hyperparameter tuning; helping you furthe ...
Create and Deliver a Killer Product DemoCreate great product demos and sell more of your product with the strategies and inspiration in this book. Insightful interviews are presented with professionals who are giving killer product demos in several types of businesses today. The strategies taught in this book are based on the analysis of product demos that made history and brought millions to their companies (Apple, Intel, Microsoft, Tesla, and more).
Every day thousands of companies give demos to sell their products. In pre-sales for enterprise software a bad demo can make your product look too complex to the point where decision makers won't buy it. In Software-as-a-Service (SaaS) you need to quickly convert signups into active and paying users. At a product launch event you want a perfect demo that is both persuasive and memorable. Remember Steve Jobs?
Apply a simple step-by-step method to create effective product demonstrations; Know the 5 steps to create a wow moment; Study the first exhaustive analysis of product ...
Bioinformatics with Python Cookbook, 2nd EditionBioinformatics is an active research field that uses a range of simple-to-advanced computations to extract valuable information from biological data.
This book covers next-generation sequencing, genomics, metagenomics, population genetics, phylogenetics, and proteomics. You'll learn modern programming techniques to analyze large amounts of biological data. With the help of real-world examples, you'll convert, analyze, and visualize datasets using various Python tools and libraries.
This book will help you get a better understanding of working with a Galaxy server, which is the most widely used bioinformatics web-based pipeline system. This updated edition also includes advanced next-generation sequencing filtering techniques. You'll also explore topics such as SNP discovery using statistical approaches under high-performance computing frameworks such as Dask and Spark.
By the end of this book, you'll be able to use and implement modern programming techniques and frameworks to ...
Learn Microsoft AzureAzure is one of the leading public cloud service providers. Thanks to a number of Azure service updates, it continues to make advances in the realm of cloud computing.
Learn Microsoft Azure starts with the fundamentals of cloud computing. You will learn to configure and set up the Azure infrastructure. As you make your way through the book, you'll explore Azure services, along with working on virtual memory systems (VMS) and deployment models. You will understand various services in the Azure ecosystem, such as Azure IoT and Azure Analytics, among others. An easy-to-follow introduction to various cloud design patterns will also add to your efficiency in designing cloud solutions. In the concluding chapters, you'll secure your virtual networks using Network security groups and configure Azure Active Directory (Azure AD) to set a custom domain name and company profile. ...
Practical HaskellGet a practical, hands-on introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. This book contains excellent coverage of the Haskell ecosystem and supporting tools, include Cabal and Stack for managing projects, HUnit and QuickCheck for software testing, the Spock framework for developing web applications, Persistent and Esqueleto for database access, and parallel and distributed programming libraries.
You'll see how functional programming is gathering momentum, allowing you to express yourself in a more concise way, reducing boilerplate, and increasing the safety of your code. Haskell is an elegant and noise-free pure functional language with a long history, having a huge number of library contributors and an active community. This makes Haskell the best tool for both learning and applying functional programming, and Practical Haskell takes advantage of this to sho ...