Tim Mather, Subra Kumaraswamy, Shahed Latif - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Building an Anonymization Pipeline. Creating Safe Data
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Kali Linux. Testy penetracyjne. Wydanie II
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
A Practical Guide for Effective Patch Management. Unlock the secrets to proactive defense and robust system maintenance