Articles about Packt

Get 'The Ultimate Kali Linux Book -- Second Edition' ($41.99 value) FREE for a limited time

Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.

The Ultimate Kali Linux Book -- Second Edition is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you’ll understand how to set up a lab and explore core penetration testing concepts.

Continue reading

Get 'JavaScript from Beginner to Professional' ($28.99 value) FREE for a limited time

This book demonstrates the capabilities of JavaScript for web application development by combining theoretical learning with code exercises and fun projects that you can challenge yourself with.

The guiding principle of the book is to show how straightforward JavaScript techniques can be used to make web apps ranging from dynamic websites to simple browser-based games.

Continue reading

Get 'Efficiency Best Practices for Microsoft 365' ($28.99 value) FREE for a limited time

Efficiency Best Practices for Microsoft 365 covers the entire range of over 25 desktop and mobile applications on the Microsoft 365 platform.

This book will provide simple, immediately usable, and authoritative guidance to help you save at least 20 minutes every day, advance in your career, and achieve business growth. You'll start by covering components and tasks such as creating and storing files and then move on to data management and data analysis.

Continue reading

Get 'Industrial Cybersecurity -- Second Edition' ($51.99 value) FREE for a limited time

With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure.

Industrial Cybersecurity -- Second Edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.

Continue reading

Get 'The Art of Writing Efficient Programs' ($31.99 value) FREE for a limited time

The great free lunch of "performance taking care of itself" is over.

Until recently, programs got faster by themselves as CPUs were upgraded, but that doesn't happen anymore. The clock frequency of new processors has almost peaked, and while new architectures provide small improvements to existing programs, this only helps slightly. To write efficient software, you now have to know how to program by making good use of the available computing resources, and this book will teach you how to do that.

Continue reading

Get 'Modern DevOps Practices' ($35.99 value) FREE for a limited time

Containers have entirely changed how developers and end-users see applications as a whole. With Modern DevOps Practices, you'll learn all about containers, their architecture and benefits, and how to implement them within your development lifecycle.

You'll discover how you can transition from the traditional world of virtual machines and adopt modern ways of using DevOps to ship a package of software continuously. Starting with a quick refresher on the core concepts of containers, you'll move on to study the architectural concepts to implement modern ways of application development.

Continue reading

Get 'Python for Geeks' ($39.99 value) FREE for a limited time

Python is a multipurpose language that can be used for multiple use cases. Python for Geeks will teach you how to advance in your career with the help of expert tips and tricks.

You'll start by exploring the different ways of using Python optimally, both from the design and implementation point of view. Next, you'll understand the life cycle of a large-scale Python project. As you advance, you'll focus on different ways of creating an elegant design by modularizing a Python project and learn best practices and design patterns for using Python.

Continue reading

Get 'Linux for Networking Professionals' ($44.99 value) FREE for a limited time

As Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons.

If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must.

Continue reading

Get 'Microsoft 365 Word Tips and Tricks' ($29.99 value) FREE for a limited time

Microsoft Word, or MS Word, is a word processor developed by Microsoft. Although Word is one of the office productivity applications included in the Microsoft Office suite, it can also be purchased as a standalone product.

MS Word enables you to create, edit, and save professional documents, among other helpful features. Anyone who wants to get better at working with Word will be able to put their MS Word knowledge to use with this practical guide.

Continue reading

Get 'DevOps Adoption Strategies' ($34.99 value) FREE for a limited time

DevOps is a set of best practices enabling operations and development teams to work together to produce higher-quality work and, among other things, quicker releases.

DevOps Adoption Strategies: Principles, Processes, Tools, and Trends will help you to understand the fundamentals needed to get started with DevOps, and prepare you to start deploying technical tools confidently.

Continue reading

Get 'Linux System Programming Techniques' ($27.99 value) FREE for a limited time

Linux is the world's most popular open source operating system. Linux System Programming Techniques will enable you to extend the Linux OS with your own system programs and communicate with other programs on the system.

The book begins by exploring the Linux filesystem, its basic commands, built-in manual pages, the GNU compiler collection (GCC), and Linux system calls. You'll then discover how to handle errors in your programs and will learn to catch errors and print relevant information about them.

Continue reading

Get 'Infosec Strategies and Best Practices' ($27.99 value) FREE for a limited time

Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.

This book starts by helping you to understand the core principles of information security, why risk management is important, and how you can drive information security governance. You'll then explore methods for implementing security controls to achieve the organization's information security goals.

Continue reading

Get 'Python Ethical Hacking from Scratch' ($27.99 value) FREE for a limited time

Penetration testing enables you to evaluate the security or strength of a computer system, network, or web application that an attacker can exploit.

With Python Ethical Hacking from Scratch, you'll understand why Python is one of the fastest-growing programming languages for penetration testing. You'll find out how to harness the power of Python and pentesting to enhance your system security.

Continue reading

Get 'Deep Learning from the Basics' ($27.99 value) FREE for a limited time

Deep learning is rapidly becoming the most preferred way of solving data problems. This is thanks, in part, to its huge variety of mathematical algorithms and their ability to find patterns that are otherwise invisible to us.

Deep Learning from the Basics begins with a fast-paced introduction to deep learning with Python, its definition, characteristics, and applications. You’ll learn how to use the Python interpreter and the script files in your applications, and utilize NumPy and Matplotlib in your deep learning models.

Continue reading

Get 'Mastering Python for Networking and Security -- Second Edition' ($27.99 value) FREE for a limited time

It’s now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches can occur from simple network line hacks.

As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.