Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Defensive Security Handbook. 2nd Edition
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część I Wprowadzenie
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Cyberwalka
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Threat Modeling
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Lean Product Management. Successful products from fuzzy business ideas
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Cyberwojna. Metody działania hakerów
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Programming .NET Security
-
Linux Security Cookbook
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Linux. Bezpieczeństwo. Receptury
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
DevSecOps for Azure. Implementing security best practices into CI/CD pipelines and Azure DevOps
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Offensive Security Using Python. A hacker's handbook to advanced offensive security using Python
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Automating Security Detection Engineering. A hands-on guide to implementing Detection as Code
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
Defensive Security Handbook. Best Practices for Securing Infrastructure