Katharine Jarmul - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Cyberwalka
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Practical Data Privacy
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Bezpieczeństwo systemów informatycznych firm i instytucji
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie
-
Alicja i Bob. Bezpieczeństwo aplikacji w praktyce
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
97 Things Every SRE Should Know
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Bezpieczne programowanie. Aplikacje hakeroodporne
-
Hacking: The Next Generation. The Next Generation
-
Snort Cookbook
-
Kerberos: The Definitive Guide. The Definitive Guide
-
OpenBSD. Tworzenie firewalli za pomocą PF
-
Offensive Security Using Python. A hacker's handbook to advanced offensive security using Python
-
The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for critical infrastructure protection
-
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Rootkity. Sabotowanie jądra systemu Windows
-
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych