Ґері В. Левандовскi - ebooki
Tytuły autora: Ґері В. Левандовскi dostępne w księgarni Ebookpoint
-
97 Things Every SRE Should Know
-
Mastering Blockchain
-
Threat Modeling
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Efektywny Kotlin. Najlepsze praktyki
-
Blockchain Success Stories
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Praktyczna analiza plików binarnych
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Bezpieczeństwo w chmurze
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Amazon Web Services w akcji. Wydanie II
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Container Security. Fundamental Technology Concepts that Protect Containerized Applications
-
Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Internet Rzeczy
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition
-
The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition
-
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar
-
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Duch w sieci. Moje przygody jako najbardziej poszukiwanego hakera wszech czasów
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
PHP, MySQL i JavaScript. Wprowadzenie. Wydanie V
-
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Kliknij tutaj, aby zabić wszystkich. Bezpieczeństwo i przetrwanie w hiperpołączonym świecie
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach
-
Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Bezpieczeństwo sieci komputerowych - Praktyczne przykłady i ćwiczenia w symulatorze Cisco Packet Tracer
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Zaprojektuj bota. Tworzenie interfejsów konwersacyjnych
-
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Mastering Vim. Build a software development environment with Vim and Neovim
-
Blockchain. Podstawy technologii łańcucha bloków w 25 krokach
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Zastosowania technologii Blockchain
-
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Królestwo kłamstw. Podróż w głąb świata cyberprzestępców