Katharine Jarmul - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Cyberwalka
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Practical Data Privacy
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
Ochrona danych osobowych w służbach mundurowych
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Podręcznik hardware hackera
-
Kali Linux i testy penetracyjne. Biblia
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Bezpieczeństwo systemów informatycznych firm i instytucji
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie
-
Alicja i Bob. Bezpieczeństwo aplikacji w praktyce
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Bezpieczny Senior w Internecie
-
CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego
-
Zagrożenia informacji w cyberprzestrzeni, cyberterroryzm
-
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
97 Things Every SRE Should Know
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Atak na sieć okiem hakera. Wykrywanie i eksploatacja luk w zabezpieczeniach sieci
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Praktyczna analiza powłamaniowa. Aplikacja webowa w środowisku Linux
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
Dziecko w sieci
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Bezpieczne programowanie. Aplikacje hakeroodporne
-
Hacking: The Next Generation. The Next Generation
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Snort Cookbook
-
Kerberos: The Definitive Guide. The Definitive Guide
-
OpenBSD. Tworzenie firewalli za pomocą PF
-
Microsoft Windows Server 2022. Kurs video. Zaawansowane techniki administrowania siecią
-
Offensive Security Using Python. A hacker's handbook to advanced offensive security using Python
-
The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Rootkity. Sabotowanie jądra systemu Windows
-
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych