Ґері В. Левандовскi - ebooki
Tytuły autora: Ґері В. Левандовскi dostępne w księgarni Ebookpoint
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Kliknij tutaj, aby zabić wszystkich. Bezpieczeństwo i przetrwanie w hiperpołączonym świecie
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie
-
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Bezpieczeństwo sieci komputerowych - Praktyczne przykłady i ćwiczenia w symulatorze Cisco Packet Tracer
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Cyberwojna. Metody działania hakerów
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Ocena bezpieczeństwa sieci wyd. 3
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów związanych z siecią. Wydanie III
-
Dane i Goliat. Ukryta bitwa o Twoje dane i kontrolę nad światem
-
Odliczając do dnia zero. Stuxnet, czyli prawdziwa historia cyfrowej broni
-
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Troubleshooting OpenVPN. Click here to enter text
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
Penetration Testing: A Survival Guide. A Survival Guide
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Network Security Assessment. Know Your Network. 3rd Edition
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Ransomware. Defending Against Digital Extortion
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition
-
Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco
-
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
Skanowanie sieci z Kali Linux. Receptury
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Accumulo. Application Development, Table Design, and Best Practices
-
Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance
-
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
Niewidzialny w sieci. Sztuka zacierania śladów
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
Bezpieczeństwo informacyjne