Katharine Jarmul - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie
-
Alicja i Bob. Bezpieczeństwo aplikacji w praktyce
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Bezpieczny Senior w Internecie
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Atak na sieć okiem hakera. Wykrywanie i eksploatacja luk w zabezpieczeniach sieci
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
Hacking: The Next Generation. The Next Generation
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Snort Cookbook
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Microsoft Windows Server 2022. Kurs video. Zaawansowane techniki administrowania siecią
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych