Mike van Drongelen, Aravind Krishnaswamy - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Hands-On Smart Contract Development with Hyperledger Fabric V2
-
Bezpieczny Senior w Internecie
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
Data Governance: The Definitive Guide
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Zbiór zadań z podstaw teoretycznych kryptografii i ochrony informacji
-
Zagrożenia informacji w cyberprzestrzeni, cyberterroryzm
-
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
-
Platformy integracyjne Zagadnienia wybrane
-
97 Things Every SRE Should Know
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Efektywny Kotlin. Najlepsze praktyki
-
Blockchain Success Stories
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Building an Anonymization Pipeline. Creating Safe Data
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain
-
Bitcoin. Ilustrowany przewodnik
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Internet Rzeczy
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
Duch w sieci. Moje przygody jako najbardziej poszukiwanego hakera wszech czasów
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
-
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
Bezpieczeństwo sieci komputerowych - Praktyczne przykłady i ćwiczenia w symulatorze Cisco Packet Tracer
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Zastosowania technologii Blockchain
-
Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Bezpiecznie już było. Jak żyć w świecie sieci, terrorystów i ciągłej niepewności
-
The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale
-
Bezpieczeństwo informacyjne. Nowe wyzwania
-
Kotlin Quick Start Guide. Core features to get you ready for developing applications
-
Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Lean Product Management. Successful products from fuzzy business ideas
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów
-
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach
-
The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Królestwo kłamstw. Podróż w głąb świata cyberprzestępców