Roberto Freato, Brent C Samodien - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Duch w sieci. Moje przygody jako najbardziej poszukiwanego hakera wszech czasów
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
PHP, MySQL i JavaScript. Wprowadzenie. Wydanie V
-
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Kliknij tutaj, aby zabić wszystkich. Bezpieczeństwo i przetrwanie w hiperpołączonym świecie
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach
-
Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers
-
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Cyberwojna. Metody działania hakerów
-
Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition
-
Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach
-
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Ocena bezpieczeństwa sieci wyd. 3
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Dane i Goliat. Ukryta bitwa o Twoje dane i kontrolę nad światem
-
Mastering AWS Security. Create and maintain a secure cloud ecosystem
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Bezpieczeństwo tożsamości i danych w projektach Web
-
Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Network Security Assessment. Know Your Network. 3rd Edition
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Practical Windows Forensics. Leverage the power of digital forensics for Windows systems
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks
-
Przestępczość teleinformatyczna 2015
-
Identity and Data Security for Web Development. Best Practices
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Ukryta tożsamość. Jak się obronić przed utratą prywatności
-
Accumulo. Application Development, Table Design, and Best Practices
-
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
-
Hadoop Security. Protecting Your Big Data Platform
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
Intelligence-Driven Incident Response. Outwitting the Adversary
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
ISO 27001 - zapewnij bezpieczeństwo informacji