John Viega, Matt Messier, Pravir Chandra - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Defensive Security Handbook. 2nd Edition
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Inżynieria zabezpieczeń Tom II
-
Inżynieria zabezpieczeń Tom I
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Web Application Security. 2nd Edition
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Analiza śledcza urządzeń mobilnych. Teoria i praktyka
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
Cybersecurity Research, Education and Management: University Perspective
-
Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie
-
Hacking Kubernetes
-
Hands-On Smart Contract Development with Hyperledger Fabric V2
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming
-
Bezpieczeństwo nowoczesnych aplikacji internetowych. Przewodnik po zabezpieczeniach
-
Threat Modeling
-
Praktyczna analiza plików binarnych
-
Amazon Web Services w akcji. Wydanie II
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Lean Product Management. Successful products from fuzzy business ideas
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów związanych z siecią. Wydanie III
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów z siecią
-
125 sposobów na bezpieczeństwo sieci. Wydanie II
-
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Network Security Hacks. 2nd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Linux for Networking Professionals. Strengthen your networking and security efforts with Linux - Second Edition
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Defensive Security Handbook. Best Practices for Securing Infrastructure