Razi Rais, Christina Morillo, Evan Gilman, Doug Barth - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
Android. Podręcznik hackera
-
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
Jak pozostać anonimowym w sieci
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
Dziecko w sieci
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website
-
SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM
-
Metasploit. Przewodnik po testach penetracyjnych
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów z siecią
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Łamanie i zabezpieczanie aplikacji w systemie iOS
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
125 sposobów na bezpieczeństwo sieci. Wydanie II
-
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting
-
Podstawy ochrony komputerów
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
ScreenOS Cookbook
-
Security Power Tools
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Network Security Hacks. 2nd Edition
-
The Internet: The Missing Manual. The Missing Manual
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Building Internet Firewalls. 2nd Edition
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Teoria bezpieczeństwa systemów komputerowych
-
Linux. Bezpieczeństwo. Receptury
-
Zostań inżynierem sieci. Kurs video. 100 pytań do przyszłego sieciowca
-
Wireshark. Kurs video. Analiza ruchu sieciowego i wykrywanie włamań
-
Prometheus. Kurs video. Monitorowanie systemów i wykrywanie nieprawidłowości
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Testowanie w Angularze. Kurs video. Karma i Jasmine
-
Bezpieczeństwo sieci Cisco. Kurs video. Podstawy kryptografii, zabezpieczenia urządzeń i obsługa Kali Linux
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Polityka bezpieczeństwa i ochrony informacji
-
Rootkity. Sabotowanie jądra systemu Windows
-
Sieci Zero Trust. Budowanie bezpiecznych systemów w niezaufanym środowisku. Wydanie II