Włodzimierz Iwanowski - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Lean Product Management. Successful products from fuzzy business ideas
-
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów
-
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Cyberwojna. Metody działania hakerów
-
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Kali Linux. Testy penetracyjne. Wydanie II
-
Bezpieczeństwo urządzeń mobilnych. Receptury
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Ransomware. Defending Against Digital Extortion
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Zbrodnie przyszłości. Jak cyberprzestępcy, korporacje i państwa mogą używać technologii przeciwko Tobie
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Łamanie i zabezpieczanie aplikacji w systemie iOS
-
Podstawy ochrony komputerów
-
Hacking: The Next Generation. The Next Generation
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
ScreenOS Cookbook
-
Security Power Tools
-
Computer Security Basics. 2nd Edition
-
Security and Usability. Designing Secure Systems that People Can Use
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Snort Cookbook
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Security Warrior
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Building Internet Firewalls. 2nd Edition
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Linux. Bezpieczeństwo. Receptury
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Przewodnik audytora systemów informatycznych