Katharine Jarmul - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Strategie cyberbezpieczeństwa współczesnego świata
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Cyberbezpieczeństwo w małych sieciach. Praktyczny przewodnik dla umiarkowanych paranoików
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Cyberbezpieczeństwo - strategie ataku i obrony. Jak osiągnąć najwyższy możliwy stan zabezpieczeń systemu informatycznego. Wydanie III
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Practical Data Privacy
-
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Efektywny Kotlin. Najlepsze praktyki
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Practical OneOps. Implement DevOps with ease
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Metasploit. Receptury pentestera. Wydanie II
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Security Warrior
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Etyczny haking w praktyce. Kurs video. Łamanie haseł, phishing i testy penetracyjne
-
OSINT w praktyce. Kurs video. Dark web, OPSEC i wycieki danych
-
Introduction to Kali Purple. Protect critical IT assets with an all-in-one approach to cybersecurity
-
Intelligence-Driven Incident Response. Outwitting the Adversary
-
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych