Michal Zalewski - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Practical OneOps. Implement DevOps with ease
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Docker Networking Cookbook. Click here to enter text
-
Praktyczna inżynieria wsteczna. Metody, techniki i narzędzia
-
Ransomware. Defending Against Digital Extortion
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
Hacking Android. Click here to enter text
-
CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Identity and Data Security for Web Development. Best Practices
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Practical Linux Security Cookbook. Click here to enter text
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board
-
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Sharing Big Data Safely. Managing Data Security
-
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Accumulo. Application Development, Table Design, and Best Practices
-
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
-
Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
Android. Podręcznik hackera
-
Jak pozostać anonimowym w sieci
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Ethernet. Biblia administratora
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Cyfrowe ślady. Jest się czego bać
-
Metasploit. Receptury pentestera. Wydanie II
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Kali Linux. Testy penetracyjne
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Nowy malware. Jest się czego bać
-
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Dziecko w sieci
-
Audyt bezpieczeństwa informacji w praktyce
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress
-
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Effective Monitoring and Alerting. For Web Operations
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
125 sposobów na bezpieczeństwo sieci. Wydanie II
-
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Podstawy ochrony komputerów
-
Testowanie bezpieczeństwa aplikacji internetowych. Receptury
-
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
-
Profesjonalne tworzenie kopii zapasowych i odzyskiwanie danych
-
Cisza w sieci
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
ISO 27001 - zapewnij bezpieczeństwo informacji
-
Bezpieczeństwo informacyjne
-
Metasploit Penetration Testing Cookbook. Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike. - Second Edition