Ґері В. Левандовскi - ebooki
Tytuły autora: Ґері В. Левандовскi dostępne w księgarni Ebookpoint
-
Ethernet. Biblia administratora
-
Cyfrowe ślady. Jest się czego bać
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Metasploit. Receptury pentestera. Wydanie II
-
Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Nowy malware. Jest się czego bać
-
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Sieci komputerowe. Biblia
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Ochrona danych osobowych. Poradnik dla przedsiębiorców
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone
-
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM
-
Metasploit. Przewodnik po testach penetracyjnych
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów z siecią
-
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
Effective Monitoring and Alerting. For Web Operations
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting
-
Podstawy ochrony komputerów
-
Monitoring i bezpieczeństwo sieci
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych
-
Cisza w sieci
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
-
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Monitoring
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Snort Cookbook
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Managing Security with Snort & IDS Tools
-
Network Security Assessment. Know Your Network
-
Security Warrior
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Bezpieczeństwo w sieci
-
Microsoft Windows Server 2022. Kurs video. Zaawansowane techniki administrowania siecią
-
Zostań inżynierem sieci. Kurs video. 100 pytań do przyszłego sieciowca
-
Wireshark. Kurs video. Analiza ruchu sieciowego i wykrywanie włamań
-
Prometheus. Kurs video. Monitorowanie systemów i wykrywanie nieprawidłowości
-
Etyczny haking w praktyce. Kurs video. Łamanie haseł, phishing i testy penetracyjne
-
OSINT w praktyce. Kurs video. Dark web, OPSEC i wycieki danych
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Bezpieczeństwo sieci Cisco. Kurs video. Podstawy kryptografii, zabezpieczenia urządzeń i obsługa Kali Linux
-
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
-
Polityka bezpieczeństwa i ochrony informacji
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort
-
Windows Server 2003. Bezpieczeństwo sieci
-
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych