Katharine Jarmul - książki
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Czytaj Promocja 2za1
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Strategie cyberbezpieczeństwa współczesnego świata
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Czytaj Promocja 2za1
Cyberbezpieczeństwo w małych sieciach. Praktyczny przewodnik dla umiarkowanych paranoików
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Czytaj Promocja 2za1
Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Czytaj Promocja 2za1
Internet. Hacking
-
Practical Data Privacy
-
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Czytaj Promocja 2za1
Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców
-
Czytaj Promocja 2za1
Bezpieczny Senior w Internecie
-
Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
-
Czytaj Promocja 2za1
Efektywny Kotlin. Najlepsze praktyki
-
Blockchain Success Stories
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
Czytaj Promocja 2za1
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Czytaj Promocja 2za1
Bitcoin. Ilustrowany przewodnik
-
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
Czytaj Promocja 2za1
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Czytaj Promocja 2za1
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Czytaj Promocja 2za1
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Practical OneOps. Implement DevOps with ease
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Practical Linux Security Cookbook. Click here to enter text
-
Czytaj Promocja 2za1
Bezpieczeństwo rozproszonych systemów informatycznych
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Czytaj Promocja 2za1
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Czytaj Promocja 2za1
Podstawy kryptografii. Wydanie III
-
Czytaj Promocja 2za1
Metasploit. Receptury pentestera. Wydanie II
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Czytaj Promocja 2za1
Dziecko w sieci
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Czytaj Promocja 2za1
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Security Warrior
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Etyczny haking w praktyce. Kurs video. Łamanie haseł, phishing i testy penetracyjne
-
OSINT w praktyce. Kurs video. Dark web, OPSEC i wycieki danych
-
Blockchain i kryptowaluty. Kurs video. Zdecentralizowane finanse od podstaw
-
PHP 7.3. Kurs video. Tworzenie bezpiecznej strony typu e-commerce
-
Introduction to Kali Purple. Protect critical IT assets with an all-in-one approach to cybersecurity
-
Czytaj Promocja 2za1
Królestwo kłamstw. Podróż w głąb świata cyberprzestępców
-
Intelligence-Driven Incident Response. Outwitting the Adversary
-
Metasploit Penetration Testing Cookbook. Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike. - Second Edition
-
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych