Kamil Monicz - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Hands-On Differential Privacy
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Cyberbezpieczeństwo i strategie blue teamów. Walka z cyberzagrożeniami w Twojej organizacji
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Mała księga wielkich szyfrów
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Computer Networks in Packet Tracer for beginners
-
Computer Networks in Packet Tracer for intermediate users
-
Packet Tracer for young beginning admins
-
Packet Tracer for young intermediate admins
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Hacking Kubernetes
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
97 Things Every SRE Should Know
-
Amazon Web Services w akcji. Wydanie II
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Duch w sieci. Moje przygody jako najbardziej poszukiwanego hakera wszech czasów
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Zaprojektuj bota. Tworzenie interfejsów konwersacyjnych
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Bezpieczeństwo tożsamości i danych w projektach Web
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
DevOps Bootcamp. The fastest way to learn DevOps
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Sztuka podstępu. Łamałem ludzi, nie hasła. Wydanie II
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Identity and Data Security for Web Development. Best Practices
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw
-
Accumulo. Application Development, Table Design, and Best Practices
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
Kali Linux. Testy penetracyjne
-
Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Podstawy ochrony komputerów
-
Cisza w sieci
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Computer Security Basics. 2nd Edition
-
OpenBSD. Tworzenie firewalli za pomocą PF
-
Etyczny haking w praktyce. Kurs video. Łamanie haseł, phishing i testy penetracyjne
-
OSINT w praktyce. Kurs video. Dark web, OPSEC i wycieki danych
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Bezpieczeństwo w ASP.NET Core. Kurs video. Podstawy kryptografii
-
PHP 7.3. Kurs video. Tworzenie bezpiecznej strony typu e-commerce
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
-
Niewidzialny w sieci. Sztuka zacierania śladów
-
ISO 27001 - zapewnij bezpieczeństwo informacji
-
Niewidzialny w Sieci. Sztuka zacierania śladów
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort
-
Rootkity. Sabotowanie jądra systemu Windows