Gianluca Tiepolo - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Software Supply Chain Security
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Cyberjutsu
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Alicja i Bob. Bezpieczeństwo aplikacji w praktyce
-
Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide