Giuseppe Di Federico, Fabrizio Barcaroli - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Niebieski lis. Polecenia procesorów Arm i inżynieria wsteczna
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
Sztuka tworzenia wydajnego kodu. Przewodnik po zaawansowanych technikach wykorzystywania sprzętu i kompilatorów
-
Krótki kurs. Kryptografia
-
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Building an Anonymization Pipeline. Creating Safe Data
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Kali Linux. Testy penetracyjne. Wydanie II
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Hacking Android. Click here to enter text
-
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
Sharing Big Data Safely. Managing Data Security
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Metasploit. Przewodnik po testach penetracyjnych
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
A Practical Guide for Effective Patch Management. Unlock the secrets to proactive defense and robust system maintenance