Justin Hutchens - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Strategie cyberbezpieczeństwa współczesnego świata
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Cyberwalka
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Cyberbezpieczeństwo dla bystrzaków. Wydanie II
-
Sztuka wojny cyfrowej. Przewodnik dla śledczego po szpiegostwie, oprogramowaniu ransomware i cyberprzestępczości zorganizowanej
-
Practical Data Privacy
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Cybersecurity w pytaniach i odpowiedziach
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Bezpieczeństwo systemów informatycznych firm i instytucji
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
-
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności
-
Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie
-
Bezpieczeństwo sieci w Pythonie. Rozwiązywanie problemów za pomocą skryptów i bibliotek. Wydanie II
-
Alicja i Bob. Bezpieczeństwo aplikacji w praktyce
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce
-
97 Things Every SRE Should Know
-
Hakowanie sztucznej inteligencji
-
Threat Modeling
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Nowoczesna kryptografia. Praktyczne wprowadzenie do szyfrowania
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Przestępczość teleinformatyczna 2016
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Kali Linux. Testy penetracyjne. Wydanie II
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Black Hat Python. Język Python dla hakerów i pentesterów
-
Skanowanie sieci z Kali Linux. Receptury
-
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Practical Hardware Pentesting, Second edition. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition
-
DevSecOps for Azure. Implementing security best practices into CI/CD pipelines and Azure DevOps
-
Offensive Security Using Python. A hacker's handbook to advanced offensive security using Python
-
The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
-
Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Microsoft eDiscovery in Depth. Become an expert in Microsoft Purview content search and eDiscovery
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
-
Intelligence-Driven Incident Response. Outwitting the Adversary