M. - ebooki
Tytuły autora: M. dostępne w księgarni Ebookpoint
-
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Hacking Kubernetes
-
Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
97 Things Every Information Security Professional Should Know
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Hands-On Smart Contract Development with Hyperledger Fabric V2
-
Bezpieczny Senior w Internecie
-
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming
-
Rootkity i Bootkity
-
AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
-
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
-
Platformy integracyjne Zagadnienia wybrane
-
97 Things Every SRE Should Know
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Building an Anonymization Pipeline. Creating Safe Data
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain
-
Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers
-
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Kotlin Quick Start Guide. Core features to get you ready for developing applications
-
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
Enterprise Agility. Being Agile in a Changing World
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Lean Product Management. Successful products from fuzzy business ideas
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools