John Viega, Matt Messier, Pravir Chandra - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Analiza śledcza urządzeń mobilnych. Teoria i praktyka
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie
-
Bezpieczeństwo nowoczesnych aplikacji internetowych. Przewodnik po zabezpieczeniach
-
Amazon Web Services w akcji. Wydanie II
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów związanych z siecią. Wydanie III
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów z siecią
-
125 sposobów na bezpieczeństwo sieci. Wydanie II
-
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Network Security Hacks. 2nd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Linux for Networking Professionals. Strengthen your networking and security efforts with Linux - Second Edition
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Defensive Security Handbook. Best Practices for Securing Infrastructure