Tim Mather, Subra Kumaraswamy, Shahed Latif - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów
-
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Cyberwojna. Metody działania hakerów
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Dane i Goliat. Ukryta bitwa o Twoje dane i kontrolę nad światem
-
Odliczając do dnia zero. Stuxnet, czyli prawdziwa historia cyfrowej broni
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Przestępczość teleinformatyczna 2016
-
Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
DevOps Bootcamp. The fastest way to learn DevOps
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Kali Linux. Testy penetracyjne. Wydanie II
-
Bezpieczeństwo urządzeń mobilnych. Receptury
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Practical OneOps. Implement DevOps with ease
-
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
-
Black Hat Python. Język Python dla hakerów i pentesterów
-
Skanowanie sieci z Kali Linux. Receptury
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Accumulo. Application Development, Table Design, and Best Practices
-
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Audyt bezpieczeństwa informacji w praktyce
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Effective Monitoring and Alerting. For Web Operations
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Podstawy ochrony komputerów
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Bezpieczne programowanie. Aplikacje hakeroodporne
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Intelligence-Driven Incident Response. Outwitting the Adversary
-
Niewidzialny w sieci. Sztuka zacierania śladów
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure