Erez Ben-Ari, Rainier Amara, Erez Y Ben - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
System bezpieczeństwa w cyberprzestrzeni RP
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Prawdziwa głębia OSINT. Odkryj wartość danych Open Source Intelligence
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Go H*ck Yourself. Proste wprowadzenie do obrony przed cyberatakami
-
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Cyberbezpieczeństwo dla bystrzaków. Wydanie II
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
Computer Networks in Packet Tracer for beginners
-
Packet Tracer for young beginning admins
-
Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
Analiza śledcza urządzeń mobilnych. Teoria i praktyka
-
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition
-
Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition
-
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Ochrona cyberprzestrzeni Unii Europejskiej
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne
-
Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Bezpieczny Senior w Internecie
-
Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation
-
Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce
-
The Cybersecurity Manager's Guide
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Kliknij tutaj, aby zabić wszystkich. Bezpieczeństwo i przetrwanie w hiperpołączonym świecie
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Cyberwojna. Metody działania hakerów
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Ocena bezpieczeństwa sieci wyd. 3
-
Dane i Goliat. Ukryta bitwa o Twoje dane i kontrolę nad światem
-
Mastering AWS Security. Create and maintain a secure cloud ecosystem
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Network Security Assessment. Know Your Network. 3rd Edition
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Accumulo. Application Development, Table Design, and Best Practices
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Metasploit. Receptury pentestera. Wydanie II
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Sieci komputerowe. Biblia
-
Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness
-
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Podstawy ochrony komputerów
-
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
Intelligence-Driven Incident Response. Outwitting the Adversary
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure