Ґері В. Левандовскi - ebooki
Tytuły autora: Ґері В. Левандовскi dostępne w księgarni Ebookpoint
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Dane i Goliat. Ukryta bitwa o Twoje dane i kontrolę nad światem
-
Odliczając do dnia zero. Stuxnet, czyli prawdziwa historia cyfrowej broni
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Przestępczość teleinformatyczna 2016
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
DevOps Bootcamp. The fastest way to learn DevOps
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Kali Linux. Testy penetracyjne. Wydanie II
-
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Bezpieczeństwo urządzeń mobilnych. Receptury
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Practical OneOps. Implement DevOps with ease
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
-
Black Hat Python. Język Python dla hakerów i pentesterów
-
Skanowanie sieci z Kali Linux. Receptury
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Ukryta tożsamość. Jak się obronić przed utratą prywatności
-
Accumulo. Application Development, Table Design, and Best Practices
-
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Metasploit. Receptury pentestera. Wydanie II
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Łamanie i zabezpieczanie aplikacji w systemie iOS
-
Effective Monitoring and Alerting. For Web Operations
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Podstawy ochrony komputerów
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Monitoring
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
Security and Usability. Designing Secure Systems that People Can Use
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Snort Cookbook
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Managing Security with Snort & IDS Tools
-
Security Warrior
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
Web Security, Privacy & Commerce. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Niewidzialny w sieci. Sztuka zacierania śladów
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
ISO 27001 - zapewnij bezpieczeństwo informacji