Marcin Gomulak - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bezpieczeństwo informacyjne. Nowe wyzwania
-
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Kotlin Quick Start Guide. Core features to get you ready for developing applications
-
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Nowoczesna kryptografia. Praktyczne wprowadzenie do szyfrowania
-
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
Lean Product Management. Successful products from fuzzy business ideas
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Java Programming for Beginners. Learn the fundamentals of programming with Java
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Bezpieczeństwo urządzeń mobilnych. Receptury
-
Docker Networking Cookbook. Click here to enter text
-
Praktyczna inżynieria wsteczna. Metody, techniki i narzędzia
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
Practical Windows Forensics. Leverage the power of digital forensics for Windows systems
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Zbrodnie przyszłości. Jak cyberprzestępcy, korporacje i państwa mogą używać technologii przeciwko Tobie
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
Sharing Big Data Safely. Managing Data Security
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
Ukryta tożsamość. Jak się obronić przed utratą prywatności
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Podstawy kryptografii. Wydanie III
-
Ethernet. Biblia administratora
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Audyt bezpieczeństwa informacji w praktyce
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone
-
Metasploit. Przewodnik po testach penetracyjnych
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Monitoring i bezpieczeństwo sieci
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych
-
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
-
Security Monitoring
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Secure Programming Cookbook for C and C++. Recipes for Cryptography, Authentication, Input Validation & More
-
Programming .NET Security
-
Linux Security Cookbook
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Building Internet Firewalls. 2nd Edition
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Teoria bezpieczeństwa systemów komputerowych
-
Linux. Bezpieczeństwo. Receptury
-
Elastic Stack. Kurs video. Monitoring aplikacji i systemów IT
-
Zabbix. Kurs video. Monitoring systemów IT
-
Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce
-
Blockchain. Kurs video. Cyfrowa ewolucja w świecie finansów
-
Poradnik hakera. Kurs video. Inżynieria odwrotna i modyfikacja programów komputerowych
-
Poradnik hakera. Kurs video. Inżynieria odwrotna plików binarnych
-
Zero Trust Networks. Building Secure Systems in Untrusted Networks
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
Bezpieczeństwo informacyjne
-
Przewodnik audytora systemów informatycznych