Douglas W. Hubbard, Richard Seiersen - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Inżynieria odwrotna w praktyce. Narzędzia i techniki
-
Accumulo. Application Development, Table Design, and Best Practices
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
Jak pozostać anonimowym w sieci
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Informatyka śledcza. Przewodnik po narzędziach open source
-
Metasploit. Receptury pentestera. Wydanie II
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Audyt bezpieczeństwa informacji w praktyce
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Effective Monitoring and Alerting. For Web Operations
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Podstawy ochrony komputerów
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
ScreenOS Cookbook
-
Security Power Tools
-
Computer Security Basics. 2nd Edition
-
Security and Usability. Designing Secure Systems that People Can Use
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Snort Cookbook
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Web Security, Privacy & Commerce. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Linux. Bezpieczeństwo. Receptury
-
Etyczny haking w praktyce. Kurs video. Łamanie haseł, phishing i testy penetracyjne
-
Zabbix. Kurs video. Monitoring systemów IT
-
OSINT w praktyce. Kurs video. Dark web, OPSEC i wycieki danych
-
Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
-
ISO 27001 - zapewnij bezpieczeństwo informacji
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Przewodnik audytora systemów informatycznych
-
Rootkity. Sabotowanie jądra systemu Windows
-
Prywatność danych w praktyce. Skuteczna ochrona prywatności i bezpieczeństwa danych