Bruno Stelmaszyk - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Hands-On Differential Privacy
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Informatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym
-
Security Chaos Engineering
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Po pierwsze: bezpieczeństwo. Przewodnik dla twórców oprogramowania
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Bezpieczeństwo sieci w Pythonie. Rozwiązywanie problemów za pomocą skryptów i bibliotek. Wydanie II
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
Hacking Kubernetes
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Amazon Web Services w akcji. Wydanie II
-
Building an Anonymization Pipeline. Creating Safe Data
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Accumulo. Application Development, Table Design, and Best Practices
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Podstawy ochrony komputerów
-
ScreenOS Cookbook
-
Security and Usability. Designing Secure Systems that People Can Use
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Snort Cookbook
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Web Security, Privacy & Commerce. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition
-
Linux. Bezpieczeństwo. Receptury
-
Zabbix. Kurs video. Monitoring systemów IT
-
Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career