Marian Molski, Małgorzata Łacheta - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Mastering AWS Security. Create and maintain a secure cloud ecosystem
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Ransomware. Defending Against Digital Extortion
-
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Hacking Android. Click here to enter text
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Practical Linux Security Cookbook. Click here to enter text
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Accumulo. Application Development, Table Design, and Best Practices
-
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
-
Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Metasploit. Receptury pentestera. Wydanie II
-
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Dziecko w sieci
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Testowanie bezpieczeństwa aplikacji internetowych. Receptury
-
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
-
Cisza w sieci
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Programming .NET Security
-
Practical UNIX and Internet Security. 3rd Edition
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
ISO 27001 - zapewnij bezpieczeństwo informacji
-
Metasploit Penetration Testing Cookbook. Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike. - Second Edition
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Przewodnik audytora systemów informatycznych