Marian Molski, Małgorzata Łacheta - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Strategie cyberbezpieczeństwa współczesnego świata
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Cyberbezpieczeństwo i strategie blue teamów. Walka z cyberzagrożeniami w Twojej organizacji
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Analiza śledcza urządzeń mobilnych. Teoria i praktyka
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Bezpieczeństwo aplikacji internetowych dla programistów. Rzeczywiste zagrożenia, praktyczna ochrona
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Data Governance: The Definitive Guide
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Rootkity i Bootkity
-
Efektywny Kotlin. Najlepsze praktyki
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Building an Anonymization Pipeline. Creating Safe Data
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Lean Product Management. Successful products from fuzzy business ideas
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Accumulo. Application Development, Table Design, and Best Practices
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Metasploit. Receptury pentestera. Wydanie II
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Programming .NET Security
-
Practical UNIX and Internet Security. 3rd Edition
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition
-
The Ultimate Linux Shell Scripting Guide. Automate, Optimize, and Empower tasks with Linux Shell Scripting
-
Microsoft eDiscovery in Depth. Become an expert in Microsoft Purview content search and eDiscovery
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
ISO 27001 - zapewnij bezpieczeństwo informacji
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Przewodnik audytora systemów informatycznych