Architect edge compute solutions with the help of detailed insights, use cases, and best practices for incorporating AWS Outposts, AWS Local Zones, AWS Wavelength, AWS Snow family, and AWS IoT Greengrass into your application design.
Designed for security professionals and aspiring pentesters, this book equips you with the skills and knowledge to exploit vulnerabilities, gain access, and navigate post-exploitation scenarios across diverse platforms.
Ready to become a cloud security champion? This practical guide, written by a seasoned cybersecurity and AWS cloud consultant, equips you with the tools and strategies you need to achieve secure, compliant, and cost-effective AWS operations.
This book helps you learn about decentralized identities, blockchains, and associated technologies, offering insights for leveraging these tools to construct secure and seamless digital experiences.
Facing cyber threats and compliance challenges? Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies to defend against cyber threats and secure cloud, hybrid, and on-premises environments.
This book will help you use a set of optimization techniques and strategies to speed up the training process of ML models. You’ll learn how to identify performance bottlenecks, decide the most suitable approach, and implement the correct solution.
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.
Learn how to transform your SDLC fast by developing the key skills to shift left and complete projects in record time. This book will give you the knowledge to start your own DevOps release management initiative and transform your company.
This book will help you understand why a network source of truth is needed for long-term network automation success, which will in turn save you hundreds of hours in deploying and integrating Nautobot into network automation.
Implementing Palo Alto Prisma Access not only teaches you how and why to deploy Prisma Access, but also delves into component interaction. Discover how to leverage advanced configurations to optimize the user experience and tighten your security.
This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape.
This book will help you gain valuable knowledge and practical skills needed to develop innovative IoT projects by learning how to use ESP32 using Arduino IDE 2.0.
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Dive into the world of AI-driven writing by mastering prompt engineering for diverse applications, from content creation to chatbots. Discover the potential of LLMs for idea generation, overcoming writer's block, boosting productivity, and more.
PyTorch is making it easier than ever before for anyone to build deep learning applications. This PyTorch deep learning book will help you uncover expert techniques to get the most out of your data and build complex neural network models.