Kyle Wilhoit, Joseph Opacki - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
Ochrona danych osobowych w służbach mundurowych
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Internet Rzeczy (IoT). Problemy cyberbezpieczeństwa
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Cybersecurity Research, Education and Management: University Perspective
-
CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego
-
Zagrożenia informacji w cyberprzestrzeni, cyberterroryzm
-
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
Data science od podstaw. Analiza danych w Pythonie. Wydanie II
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Atak na sieć okiem hakera. Wykrywanie i eksploatacja luk w zabezpieczeniach sieci
-
Data science od podstaw. Analiza danych w Pythonie
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Identity and Data Security for Web Development. Best Practices
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Practical Linux Security Cookbook. Click here to enter text
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Hadoop Security. Protecting Your Big Data Platform
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Dziecko w sieci
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Managing Security with Snort & IDS Tools
-
Programming .NET Security
-
Linux Security Cookbook
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection