Ґері В. Левандовскi - ebooki
Tytuły autora: Ґері В. Левандовскi dostępne w księgarni Ebookpoint
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Sieci komputerowe. Biblia
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Ochrona danych osobowych. Poradnik dla przedsiębiorców
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone
-
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM
-
Metasploit. Przewodnik po testach penetracyjnych
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów z siecią
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Łamanie i zabezpieczanie aplikacji w systemie iOS
-
Effective Monitoring and Alerting. For Web Operations
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting
-
Podstawy ochrony komputerów
-
Archiwizacja i odzyskiwanie danych
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Monitoring i bezpieczeństwo sieci
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych
-
Cisza w sieci
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
-
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Monitoring
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
Essential PHP Security
-
Security and Usability. Designing Secure Systems that People Can Use
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Snort Cookbook
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Managing Security with Snort & IDS Tools
-
Network Security Assessment. Know Your Network
-
Security Warrior
-
Secure Programming Cookbook for C and C++. Recipes for Cryptography, Authentication, Input Validation & More
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Teoria bezpieczeństwa systemów komputerowych
-
OpenBSD. Tworzenie firewalli za pomocą PF
-
Linux. Bezpieczeństwo. Receptury
-
Bezpieczeństwo w sieci
-
Zostań inżynierem sieci. Kurs video. 100 pytań do przyszłego sieciowca
-
Wireshark. Kurs video. Analiza ruchu sieciowego i wykrywanie włamań
-
Prometheus. Kurs video. Monitorowanie systemów i wykrywanie nieprawidłowości
-
Etyczny haking w praktyce. Kurs video. Łamanie haseł, phishing i testy penetracyjne
-
OSINT w praktyce. Kurs video. Dark web, OPSEC i wycieki danych
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Blockchain i kryptowaluty. Kurs video. Zdecentralizowane finanse od podstaw
-
Bezpieczeństwo w ASP.NET Core. Kurs video. Podstawy kryptografii
-
Poradnik hakera. Kurs video. Inżynieria odwrotna i modyfikacja programów komputerowych
-
Blockchain. Kurs video. Smart kontrakty i aplikacje zdecentralizowane w praktyce
-
PHP 7.3. Kurs video. Tworzenie bezpiecznej strony typu e-commerce
-
Poradnik hakera. Kurs video. Inżynieria odwrotna plików binarnych
-
Testowanie w Angularze. Kurs video. Karma i Jasmine
-
Bezpieczeństwo sieci Cisco. Kurs video. Podstawy kryptografii, zabezpieczenia urządzeń i obsługa Kali Linux
-
Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV
-
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
-
Pożeracze danych
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Niewidzialny w Sieci. Sztuka zacierania śladów
-
Polityka bezpieczeństwa i ochrony informacji
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort
-
Windows Server 2003. Bezpieczeństwo sieci
-
Przewodnik audytora systemów informatycznych
-
Rootkity. Sabotowanie jądra systemu Windows
-
W obronie wolności
-
Hack Wars. Tom 1. Na tropie hakerów
-
Hack Wars. Tom 2. Administrator kontratakuje
-
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych
-
Szósty zmysł hakera. O hakowaniu systemów społecznych i przywracaniu sprawiedliwych zasad gry