J. D. Biersdorfer, David Pogue - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS
-
Cyberbezpieczeństwo i strategie blue teamów. Walka z cyberzagrożeniami w Twojej organizacji
-
Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam
-
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
Cyberbezpieczeństwo dla bystrzaków. Wydanie II
-
Sztuka wojny cyfrowej. Przewodnik dla śledczego po szpiegostwie, oprogramowaniu ransomware i cyberprzestępczości zorganizowanej
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition
-
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source
-
Practical Cloud Native Security with Falco
-
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Bezpieczeństwo sieci w Pythonie. Rozwiązywanie problemów za pomocą skryptów i bibliotek. Wydanie II
-
Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne
-
Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce
-
Wojny w cyberprzestrzeni. Koncepcje, strategie i taktyki, dzięki którym przetrwasz i ocalisz swoją organizację
-
Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Amazon Web Services w akcji. Wydanie II
-
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Docker Networking Cookbook. Click here to enter text
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Zbrodnie przyszłości. Jak cyberprzestępcy, korporacje i państwa mogą używać technologii przeciwko Tobie
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Ethernet. Biblia administratora
-
Cyfrowe ślady. Jest się czego bać
-
Metasploit. Receptury pentestera. Wydanie II
-
Nowy malware. Jest się czego bać
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Metasploit. Przewodnik po testach penetracyjnych
-
Effective Monitoring and Alerting. For Web Operations
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Podstawy ochrony komputerów
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
The Internet: The Missing Manual. The Missing Manual
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks