V. Anton Spraul - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Threat Modeling
-
Efektywny Kotlin. Najlepsze praktyki
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
Amazon Web Services w akcji. Wydanie II
-
Building an Anonymization Pipeline. Creating Safe Data
-
Container Security. Fundamental Technology Concepts that Protect Containerized Applications
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Mastering Vim. Build a software development environment with Vim and Neovim
-
Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Bezpieczeństwo informacyjne. Nowe wyzwania
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Nowoczesna kryptografia. Praktyczne wprowadzenie do szyfrowania
-
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
Enterprise Agility. Being Agile in a Changing World
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Lean Product Management. Successful products from fuzzy business ideas
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów
-
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Java Programming for Beginners. Learn the fundamentals of programming with Java
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Practical OneOps. Implement DevOps with ease
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Ransomware. Defending Against Digital Extortion
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure