Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Docker Deep Dive. Zero to Docker in a single book - Third Edition
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Data science od podstaw. Analiza danych w Pythonie. Wydanie II
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Blockchain. Podstawy technologii łańcucha bloków w 25 krokach
-
Data science od podstaw. Analiza danych w Pythonie
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Sharing Big Data Safely. Managing Data Security
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Security and Usability. Designing Secure Systems that People Can Use
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
Web Security, Privacy & Commerce. 2nd Edition