Bruce Schneier - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
Archiwizacja i odzyskiwanie danych
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Security Power Tools
-
Network Security Hacks. 2nd Edition
-
Computer Security Basics. 2nd Edition
-
Essential PHP Security
-
Security and Usability. Designing Secure Systems that People Can Use
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Managing Security with Snort & IDS Tools
-
Security Warrior
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Blockchain i kryptowaluty. Kurs video. Zdecentralizowane finanse od podstaw
-
Blockchain. Kurs video. Smart kontrakty i aplikacje zdecentralizowane w praktyce
-
Testowanie w Angularze. Kurs video. Karma i Jasmine
-
Niewidzialny w Sieci. Sztuka zacierania śladów
-
Szósty zmysł hakera. O hakowaniu systemów społecznych i przywracaniu sprawiedliwych zasad gry