M. - ebooki
Tytuły autora: M. dostępne w księgarni Ebookpoint
-
Linux. Wprowadzenie do wiersza poleceń. Wydanie II
-
Systemy operacyjne. Wydanie V
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Linux dla admina. Najlepsze praktyki. O czym pamiętać podczas projektowania i zarządzania systemami
-
Linux. Wiersz poleceń i skrypty powłoki. Biblia. Wydanie IV
-
Programowalność i automatyzacja sieci. Poradnik inżyniera sieci następnej generacji
-
Unix i Linux. Przewodnik administratora systemów. Wydanie V
-
Administrowanie sieciowymi systemami operacyjnymi Windows Serwer i Linux Serwer
-
Ansible w praktyce. Automatyzacja konfiguracji i proste instalowanie systemów. Wydanie III
-
Python dla DevOps. Naucz się bezlitośnie skutecznej automatyzacji
-
Nowoczesny Linux. Przewodnik dla użytkownika natywnej chmury
-
Systemy operacyjne. Architektura, funkcjonowanie i projektowanie. Wydanie IX
-
Linux DevOps. Kurs video. Jenkins, Ansible, Terraform i Traefik
-
Bash. Praktyczne skrypty
-
Linux - bezpieczny komputer osobisty dla początkujących
-
Bash. Receptury
-
Linux dla programistów i użytkowników
-
Docker. Projektowanie i wdrażanie aplikacji
-
Linux. Profesjonalne administrowanie systemem. Wydanie II
-
Ubuntu. Oficjalny podręcznik. Wydanie VIII
-
Ubuntu Linux. Biblia
-
Kali Linux. Testy penetracyjne
-
Linux dla każdego Technika IT
-
Skrypty powłoki systemu Linux. Zagadnienia zaawansowane. Wydanie II
-
Skrypty powłoki systemu Linux. Receptury. Wydanie III
-
Docker. Praktyczne zastosowania
-
Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie
-
Linux Device Driver Development. Everything you need to start with device driver development for Linux kernel and embedded Linux - Second Edition
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Linux Server. Kurs video. Usługi serwerowe, skrypty i środowisko graficzne
-
Linux. Programowanie w powłoce. Praktyczny przewodnik. Wydanie III
-
The Software Developer's Guide to Linux. A practical, no-nonsense guide to using the Linux command line and utilities as a software developer
-
Systemy operacyjne. Wydanie IV
-
Linux. Bezpieczeństwo. Receptury
-
Najlepsze narzędzia w systemie Linux. Wykorzystaj ponad 70 receptur i programuj szybko i skutecznie
-
Ansible w praktyce. Automatyzacja konfiguracji i proste instalowanie systemów. Wydanie II
-
Skrypty powłoki systemu Linux. Receptury
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
RZiS w podziale na miesiące zasilany danymi JPK
-
Understanding the Linux Kernel. 3rd Edition
-
Linux. Wprowadzenie do wiersza poleceń
-
Mastering Embedded Linux Programming. Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell) - Third Edition
-
Mastering Embedded Linux Programming. Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates - Second Edition
-
Using Yocto Project with BeagleBone Black. Unleash the power of the BeagleBone Black embedded platform with Yocto Project
-
Minikomputer Onion Omega 2. Internet rzeczy i inne zastosowania
-
Ubuntu Oneiric Ocelot. Przesiądź się na system open source
-
Programowanie w Linuksie. Ćwiczenia
-
Linux. Rozmówki
-
Linux Kernel Programming. A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization - Second Edition
-
Oracle Linux Cookbook. Embrace Oracle Linux and master Linux Server Management
-
Mobile DevOps Playbook. A practical guide for delivering high-quality mobile applications like a pro
-
Administracja systemami Linux. Programowanie w powłoce bash
-
Architecture and Design of the Linux Storage Stack. Gain a deep understanding of the Linux storage landscape and its well-coordinated layers
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Federated Learning with Python. Design and implement a federated learning system and develop applications using existing frameworks
-
Linux Kernel Debugging. Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules
-
Ansible: Up and Running. 3rd Edition
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Learning Modern Linux
-
Linux Command Line and Shell Scripting Techniques. Master practical aspects of the Linux command line and then use it as a part of the shell scripting process
-
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
Linux Administration Best Practices. Practical solutions to approaching the design and management of Linux systems
-
Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Managing and Visualizing Your BIM Data. Understand the fundamentals of computer science for data visualization using Autodesk Dynamo, Revit, and Microsoft Power BI
-
Build and Code Creative Robots with LEGO BOOST. Unleash your creativity and imagination by building exciting robotics projects
-
Red Hat Enterprise Linux 8 Administration. Master Linux administration skills and prepare for the RHCSA certification exam
-
Building Microservices with Micronaut(R). A quick-start guide to building high-performance reactive microservices for Java developers
-
Linux Kernel Programming. A comprehensive guide to kernel internals, writing kernel modules, and kernel synchronization
-
Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization. Create user-kernel interfaces, work with peripheral I/O, and handle hardware interrupts
-
Mastering Linux Device Driver Development. Write custom device drivers to support computer peripherals in Linux operating systems
-
SELinux System Administration. Implement mandatory access control to secure applications, users, and information flows on Linux - Third Edition
-
Learn Linux Quickly. A beginner-friendly guide to getting up and running with the world's most powerful operating system
-
Digital Forensics with Kali Linux. Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x - Second Edition
-
Hands-On Linux Administration on Azure. Develop, maintain, and automate applications on the Azure cloud platform - Second Edition
-
Hands-On Enterprise Automation on Linux. Efficiently perform large-scale Linux infrastructure automation with Ansible
-
Linux Device Driver Development Cookbook. Learn kernel programming and build custom drivers for your embedded Linux applications
-
Hands-On AWS Penetration Testing with Kali Linux. Set up a virtual lab and pentest major AWS services, including EC2, S3, Lambda, and CloudFormation
-
Hands-On Linux for Architects. Design and implement Linux-based IT solutions
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Mastering Docker Enterprise. A companion guide for agile container adoption
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Learn Linux Shell Scripting - Fundamentals of Bash 4.4. A comprehensive guide to automating administrative tasks with the Bash shell
-
PowerShell Core for Linux Administrators Cookbook. Use PowerShell Core 6.x on Linux to automate complex, repetitive, and time-consuming tasks
-
Hands-On System Programming with Linux. Explore Linux system programming interfaces, theory, and practice
-
Learn Apache Mesos. A beginner’s guide to scalable cluster management and deployment
-
Kali Linux 2018: Assuring Security by Penetration Testing. Unleash the full potential of Kali Linux 2018, now with updated tools - Fourth Edition
-
Learn OpenShift. Deploy, build, manage, and migrate applications with OpenShift Origin 3.9
-
Learning Kali Linux. Security Testing, Penetration Testing, and Ethical Hacking
-
Mastering Linux Shell Scripting. A practical guide to Linux command-line, Bash scripting, and Shell programming - Second Edition
-
Digital Forensics with Kali Linux. Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
-
Linux Device Drivers Development. Develop customized drivers for embedded Linux
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Mastering Linux Kernel Development. A kernel developer's reference manual
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Linux Shell Scripting Bootcamp. The fastest way to learn Linux shell scripting
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Linux: Powerful Server Administration. Recipes for CentOS 7, RHEL 7, and Ubuntu Server Administration
-
Docker Orchestration. Click here to enter text
-
Mastering Swift 3 - Linux. Click here to enter text
-
SELinux System Administration. Effectively secure your Linux systems with SELinux - Second Edition
-
Developing with Docker. Learn to automate your deployments with Docker
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Mastering VMware Horizon 7. Virtualization that can transform your organization - Second Edition
-
CentOS 7 Server Deployment Cookbook
-
Linux Shell Scripting Essentials. Learn shell scripting to solve complex shell-related problems and to efficiently automate your day-to-day tasks
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
Raspberry Pi Hacks. Tips & Tools for Making Things with the Inexpensive Linux Computer
-
Instant Debian - Build a Web Server. Build strong foundations for your future-ready web application using the universal operating system, Debian
-
Web Penetration Testing with Kali Linux. Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit
-
Linux Shell Scripting Cookbook. Don't neglect the shell – this book will empower you to use simple commands to perform complex tasks. Whether you're a casual or advanced Linux user, the cookbook approach makes it all so brilliantly accessible and, above all, useful. - Second Edition
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort
-
Certified Information Systems Security Professional (CISSP) Exam Guide. Become a certified CISSP professional with practical exam-oriented knowledge of all eight domains