Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Strategie cyberbezpieczeństwa współczesnego świata
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Czytaj Promocja 2za1
Sztuka wojny cyfrowej. Przewodnik dla śledczego po szpiegostwie, oprogramowaniu ransomware i cyberprzestępczości zorganizowanej
-
Czytaj Promocja 2za1
Internet. Hacking
-
Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Czytaj Promocja 2za1
Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców
-
Czytaj Promocja 2za1
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Czytaj Promocja 2za1
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Czytaj Promocja 2za1
Mroczne odmęty phishingu. Nie daj się złowić!
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Czytaj Promocja 2za1
Metasploit. Receptury pentestera. Wydanie II
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
Metasploit Penetration Testing Cookbook. Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike. - Second Edition