Adrian Neagu - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Data science od podstaw. Analiza danych w Pythonie. Wydanie II
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Data science od podstaw. Analiza danych w Pythonie
-
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python
-
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
-
Lean Product Management. Successful products from fuzzy business ideas
-
TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js
-
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Docker Networking Cookbook. Click here to enter text
-
Praktyczna inżynieria wsteczna. Metody, techniki i narzędzia
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks
-
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Zbrodnie przyszłości. Jak cyberprzestępcy, korporacje i państwa mogą używać technologii przeciwko Tobie
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
-
Sharing Big Data Safely. Managing Data Security
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Ethernet. Biblia administratora
-
Cyfrowe ślady. Jest się czego bać
-
Metasploit. Receptury pentestera. Wydanie II
-
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual
-
Nowy malware. Jest się czego bać
-
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Metasploit. Przewodnik po testach penetracyjnych
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Effective Monitoring and Alerting. For Web Operations
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Metasploit Penetration Testing Cookbook. Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike. - Second Edition
-
Pożeracze danych