Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Defensive Security Handbook. 2nd Edition
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część I Wprowadzenie
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Cyberwalka
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III
-
Prawdziwy świat kryptografii
-
Computer Networks in Packet Tracer for beginners
-
Computer Networks in Packet Tracer for intermediate users
-
Packet Tracer for young beginning admins
-
Packet Tracer for young intermediate admins
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects
-
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Zbiór zadań z podstaw teoretycznych kryptografii i ochrony informacji
-
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Mastering Blockchain
-
Threat Modeling
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Blockchain. Podstawy technologii łańcucha bloków w 25 krokach
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Zastosowania technologii Blockchain
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Lean Product Management. Successful products from fuzzy business ideas
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Cyberwojna. Metody działania hakerów
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Praktyczna analiza powłamaniowa. Aplikacja webowa w środowisku Linux
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Dziecko w sieci
-
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Metasploit. Przewodnik po testach penetracyjnych
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Programming .NET Security
-
Linux Security Cookbook
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
DevSecOps for Azure. Implementing security best practices into CI/CD pipelines and Azure DevOps
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Offensive Security Using Python. A hacker's handbook to advanced offensive security using Python
-
Modern Network Observability. A hands-on approach using open-source tools such as Telegraf, Prometheus, Grafana, and other tools
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Automating Security Detection Engineering. A hands-on guide to implementing Detection as Code
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance
-
Defensive Security Handbook. Best Practices for Securing Infrastructure