Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Learning DevSecOps
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY
-
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
Strategie cyberbezpieczeństwa współczesnego świata
-
Cyberbezpieczeństwo i strategie blue teamów. Walka z cyberzagrożeniami w Twojej organizacji
-
Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Zero Trust Networks. 2nd Edition
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część I Wprowadzenie
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących. Wydanie II
-
Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam
-
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
Prawdziwy świat kryptografii
-
Cyberbezpieczeństwo dla bystrzaków. Wydanie II
-
Sztuka wojny cyfrowej. Przewodnik dla śledczego po szpiegostwie, oprogramowaniu ransomware i cyberprzestępczości zorganizowanej
-
Internet. Hacking
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Security Chaos Engineering
-
Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Podręcznik hardware hackera
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition
-
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Kali Linux i testy penetracyjne. Biblia
-
Sztuka tworzenia wydajnego kodu. Przewodnik po zaawansowanych technikach wykorzystywania sprzętu i kompilatorów
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source
-
Practical Cloud Native Security with Falco
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
Practical Fraud Prevention
-
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Bezpieczeństwo sieci w Pythonie. Rozwiązywanie problemów za pomocą skryptów i bibliotek. Wydanie II
-
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne
-
Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Złam ten kod z Pythonem. Jak tworzyć, testować i łamać szyfry
-
Kryptografia. W teorii i praktyce
-
Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce
-
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
Data Governance: The Definitive Guide
-
Wojny w cyberprzestrzeni. Koncepcje, strategie i taktyki, dzięki którym przetrwasz i ocalisz swoją organizację
-
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming
-
Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition
-
Rootkity i Bootkity
-
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
-
Platformy integracyjne Zagadnienia wybrane
-
Blockchain Success Stories
-
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Amazon Web Services w akcji. Wydanie II
-
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Incident Management for Industrial Control Systems. Safeguard industrial control systems by mastering critical infrastructure cybersecurity
-
A Practical Guide for Effective Patch Management. Unlock the secrets to proactive defense and robust system maintenance
-
Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition
-
Microsoft eDiscovery in Depth. Become an expert in Microsoft Purview content search and eDiscovery
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance