Andy Oram, John Viega - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Defensive Security Handbook. 2nd Edition
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Inżynieria zabezpieczeń Tom II
-
Inżynieria zabezpieczeń Tom I
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
Analiza śledcza urządzeń mobilnych. Teoria i praktyka
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie
-
Hacking Kubernetes
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Bezpieczeństwo nowoczesnych aplikacji internetowych. Przewodnik po zabezpieczeniach
-
Threat Modeling
-
Praktyczna analiza plików binarnych
-
Amazon Web Services w akcji. Wydanie II
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Lean Product Management. Successful products from fuzzy business ideas
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Linux for Networking Professionals. Strengthen your networking and security efforts with Linux - Second Edition
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Defensive Security Handbook. Best Practices for Securing Infrastructure