Tim Mather, Subra Kumaraswamy, Shahed Latif - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Metasploit. Przewodnik po testach penetracyjnych
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance