Michael Collins - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Bezpieczeństwo sieci komputerowych - Praktyczne przykłady i ćwiczenia w symulatorze Cisco Packet Tracer
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Mastering Vim. Build a software development environment with Vim and Neovim
-
Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications
-
Blockchain. Podstawy technologii łańcucha bloków w 25 krokach
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Zastosowania technologii Blockchain
-
Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers
-
Data science od podstaw. Analiza danych w Pythonie
-
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Bezpiecznie już było. Jak żyć w świecie sieci, terrorystów i ciągłej niepewności
-
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Bezpieczeństwo informacyjne. Nowe wyzwania
-
Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Nowoczesna kryptografia. Praktyczne wprowadzenie do szyfrowania
-
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
Enterprise Agility. Being Agile in a Changing World
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Lean Product Management. Successful products from fuzzy business ideas
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Testy penetracyjne dla zaawansowanych. Hakowanie najlepiej zabezpieczonych sieci na świecie
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Java Programming for Beginners. Learn the fundamentals of programming with Java
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Mastering AWS Security. Create and maintain a secure cloud ecosystem
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Bezpieczeństwo tożsamości i danych w projektach Web
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition