E. Schetina, K. Green, J. Carlson - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Software Supply Chain Security
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
-
Cyberjutsu
-
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Alicja i Bob. Bezpieczeństwo aplikacji w praktyce
-
Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Mastering Blockchain
-
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Zastosowania technologii Blockchain
-
Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
Przestępczość teleinformatyczna 2015
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
Joomla! Zabezpieczanie witryn
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Bezpieczeństwo w sieci
-
Usuwanie prywatnych danych z Internetu