Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Docker Deep Dive. Zero to Docker in a single book - Third Edition
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Hands-On Differential Privacy
-
Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Informatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym
-
Security Chaos Engineering
-
Computer Networks in Packet Tracer for beginners
-
Packet Tracer for young beginning admins
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Po pierwsze: bezpieczeństwo. Przewodnik dla twórców oprogramowania
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu
-
Ochrona cyberprzestrzeni Unii Europejskiej
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Bezpieczeństwo sieci w Pythonie. Rozwiązywanie problemów za pomocą skryptów i bibliotek. Wydanie II
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects
-
Hacking Kubernetes
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation
-
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing
-
AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
-
Mastering Blockchain
-
Amazon Web Services w akcji. Wydanie II
-
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
-
Building an Anonymization Pipeline. Creating Safe Data
-
Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition
-
Data science od podstaw. Analiza danych w Pythonie. Wydanie II
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Blockchain. Podstawy technologii łańcucha bloków w 25 krokach
-
Data science od podstaw. Analiza danych w Pythonie
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Praktyczna inżynieria wsteczna. Metody, techniki i narzędzia
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Sharing Big Data Safely. Managing Data Security
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Accumulo. Application Development, Table Design, and Best Practices
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Podstawy ochrony komputerów
-
Profesjonalne tworzenie kopii zapasowych i odzyskiwanie danych
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and
-
ScreenOS Cookbook
-
Security and Usability. Designing Secure Systems that People Can Use
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Snort Cookbook
-
Linux Security Cookbook
-
Modern Network Observability. A hands-on approach using open-source tools such as Telegraf, Prometheus, Grafana, and other tools