Edward Whalen - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bezpieczeństwo systemu Linux. Hardening i najnowsze techniki zabezpieczania przed cyberatakami. Wydanie III
-
Linux dla admina. Najlepsze praktyki. O czym pamiętać podczas projektowania i zarządzania systemami
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Linux Administration Best Practices. Practical solutions to approaching the design and management of Linux systems
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Building Microservices with Micronaut(R). A quick-start guide to building high-performance reactive microservices for Java developers
-
Mastering Linux Administration. A comprehensive guide to installing, configuring, and maintaining Linux systems in the modern data center
-
RZiS w podziale na miesiące zasilany danymi JPK
-
Python dla DevOps. Naucz się bezlitośnie skutecznej automatyzacji
-
Learn Linux Quickly. A beginner-friendly guide to getting up and running with the world's most powerful operating system
-
Mastering Linux Security and Hardening. Protect your Linux systems from intruders, malware attacks, and other cyber threats - Second Edition
-
Linux Observability with BPF. Advanced Programming for Performance Analysis and Networking
-
Programowalność i automatyzacja sieci. Poradnik inżyniera sieci następnej generacji
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Hands-On Linux for Architects. Design and implement Linux-based IT solutions
-
Skrypty powłoki systemu Linux. Zagadnienia zaawansowane. Wydanie II
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Learn Apache Mesos. A beginner’s guide to scalable cluster management and deployment
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Kali Linux 2018: Assuring Security by Penetration Testing. Unleash the full potential of Kali Linux 2018, now with updated tools - Fourth Edition
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
CompTIA Linux+ Certification Guide. A comprehensive guide to achieving LX0-103 and LX0-104 certifications with mock exams
-
Systemy operacyjne. Architektura, funkcjonowanie i projektowanie. Wydanie IX
-
Android Things Quick Start Guide. Build your own smart devices using the Android Things platform
-
Practical Linux Security Cookbook. Secure your Linux environment from modern-day attacks with practical recipes - Second Edition
-
Learn OpenShift. Deploy, build, manage, and migrate applications with OpenShift Origin 3.9
-
Unix i Linux. Przewodnik administratora systemów. Wydanie V
-
Mastering Linux Shell Scripting. A practical guide to Linux command-line, Bash scripting, and Shell programming - Second Edition
-
Machine Learning with Swift. Artificial Intelligence for iOS
-
Embedded Linux Development Using Yocto Project Cookbook. Practical recipes to help you leverage the power of Yocto to build exciting Linux-based systems - Second Edition
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Embedded Linux Development using Yocto Projects. Learn to leverage the power of Yocto Project to build efficient Linux-based products - Second Edition
-
Mastering Assembly Programming. From instruction set to kernel module with Intel processor
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Docker. Projektowanie i wdrażanie aplikacji
-
Continuous Delivery with Docker and Jenkins. Delivering software at scale
-
Docker Orchestration. Click here to enter text
-
Developing with Docker. Learn to automate your deployments with Docker
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Raspberry Pi Hacks. Tips & Tools for Making Things with the Inexpensive Linux Computer
-
Programowanie w Linuksie. Ćwiczenia
-
Bash. Receptury
-
Using Samba. A File & Print Server for Linux, Unix & Mac OS X. 3rd Edition
-
Running Linux. 5th Edition
-
Linux Device Drivers. 3rd Edition
-
Managing RAID on Linux
-
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
-
The Ultimate Linux Shell Scripting Guide. Automate, Optimize, and Empower tasks with Linux Shell Scripting
-
Oracle Database 10g. Administracja bazy danych w Linuksie