Marcin Gomulak - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących. Wydanie II
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Sztuka tworzenia wydajnego kodu. Przewodnik po zaawansowanych technikach wykorzystywania sprzętu i kompilatorów
-
Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących
-
Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Złam ten kod z Pythonem. Jak tworzyć, testować i łamać szyfry
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
Wojny w cyberprzestrzeni. Koncepcje, strategie i taktyki, dzięki którym przetrwasz i ocalisz swoją organizację
-
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
-
Data science od podstaw. Analiza danych w Pythonie. Wydanie II
-
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Data science od podstaw. Analiza danych w Pythonie
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Sharing Big Data Safely. Managing Data Security
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Computer Security Basics. 2nd Edition
-
Security and Usability. Designing Secure Systems that People Can Use
-
Managing Security with Snort & IDS Tools
-
Hackers & Painters. Big Ideas from the Computer Age
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Poradnik hakera. Kurs video. Inżynieria odwrotna i modyfikacja programów komputerowych
-
Poradnik hakera. Kurs video. Inżynieria odwrotna plików binarnych
-
Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance
-
Metasploit Penetration Testing Cookbook. Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike. - Second Edition