Dawid Perdek - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Kali Linux i testy penetracyjne. Biblia
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
Metasploit. Receptury pentestera. Wydanie II
-
Kali Linux. Testy penetracyjne
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Metasploit. Przewodnik po testach penetracyjnych
-
Testowanie w Angularze. Kurs video. Karma i Jasmine