Dr. Erdal Ozkaya - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Czytaj Promocja 2za1
Dowód stawki. Proof of stake (PoS), powstanie Ethereum i filozofia łańcucha bloków
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
Czytaj Promocja 2za1
Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Czytaj Promocja 2za1
Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu
-
Czytaj Promocja 2za1
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Czytaj Promocja 2za1
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego
-
Czytaj Promocja 2za1
Złam ten kod z Pythonem. Jak tworzyć, testować i łamać szyfry
-
Zagrożenia informacji w cyberprzestrzeni, cyberterroryzm
-
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
Czytaj Promocja 2za1
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Czytaj Promocja 2za1
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Ransomware. Defending Against Digital Extortion
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Hacking Android. Click here to enter text
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Practical Linux Security Cookbook. Click here to enter text
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Czytaj Promocja 2za1
Informatyka śledcza. Przewodnik po narzędziach open source
-
Czytaj Promocja 2za1
Dziecko w sieci
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Programming .NET Security
-
Practical UNIX and Internet Security. 3rd Edition
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Ethical Password Cracking. Crack any code using John the Ripper, Hashcat, and advanced methods for password breaking
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
Metasploit Penetration Testing Cookbook. Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike. - Second Edition