Adam Nogły - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III
-
Computer Networks in Packet Tracer for beginners
-
Computer Networks in Packet Tracer for intermediate users
-
Packet Tracer for young beginning admins
-
Packet Tracer for young intermediate admins
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Cyberwojna. Metody działania hakerów
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Metasploit. Przewodnik po testach penetracyjnych
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Zostań inżynierem sieci. Kurs video. 100 pytań do przyszłego sieciowca
-
Wireshark. Kurs video. Analiza ruchu sieciowego i wykrywanie włamań
-
Prometheus. Kurs video. Monitorowanie systemów i wykrywanie nieprawidłowości
-
Bezpieczeństwo sieci Cisco. Kurs video. Podstawy kryptografii, zabezpieczenia urządzeń i obsługa Kali Linux
-
VMware vSphere ESXi 8. Instalacja, konfiguracja i wprowadzenie do vCenter
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Modern Network Observability. A hands-on approach using open-source tools such as Telegraf, Prometheus, Grafana, and other tools
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance
-
Defensive Security Handbook. Best Practices for Securing Infrastructure