Dawid Perdek - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach
-
Blockchain. Podstawy technologii łańcucha bloków w 25 krokach
-
Dziecko w sieci
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Security Power Tools
-
Programming .NET Security
-
Linux Security Cookbook
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Testowanie w Angularze. Kurs video. Karma i Jasmine
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance
-
Defensive Security Handbook. Best Practices for Securing Infrastructure