Imran Bashir - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Ochrona danych osobowych w służbach mundurowych
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Cybersecurity Research, Education and Management: University Perspective
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego
-
Algorytmy kryptograficzne w Pythonie. Wprowadzenie
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
Blue team i cyberbezpieczeństwo. Zestaw narzędzi dla specjalistów od zabezpieczeń w sieci
-
Zagrożenia informacji w cyberprzestrzeni, cyberterroryzm
-
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach
-
Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II
-
Blockchain. Podstawy technologii łańcucha bloków w 25 krokach
-
Bezpiecznie już było. Jak żyć w świecie sieci, terrorystów i ciągłej niepewności
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Ransomware. Defending Against Digital Extortion
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Hacking Android. Click here to enter text
-
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Practical Windows Forensics. Leverage the power of digital forensics for Windows systems
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Identity and Data Security for Web Development. Best Practices
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Sharing Big Data Safely. Managing Data Security
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Dziecko w sieci
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Power Tools
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Network Security Hacks. 2nd Edition
-
Computer Security Basics. 2nd Edition
-
Security and Usability. Designing Secure Systems that People Can Use
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Security Warrior
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV
-
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Incident Response for Windows. Adapt effective strategies for managing sophisticated cyber attacks targeting Windows systems
-
Defensive Security Handbook. Best Practices for Securing Infrastructure