Kamil Lipski - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Go H*ck Yourself. Proste wprowadzenie do obrony przed cyberatakami
-
Cyberbezpieczeństwo dla bystrzaków. Wydanie II
-
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
-
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne
-
Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Bezpieczny Senior w Internecie
-
Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls
-
Modern Data Protection
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
-
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
Ethernet. Biblia administratora
-
Audyt bezpieczeństwa informacji w praktyce
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Ochrona danych osobowych. Poradnik dla przedsiębiorców
-
SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM
-
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
The Internet: The Missing Manual. The Missing Manual
-
Digital Identity
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Managing Security with Snort & IDS Tools
-
Security Warrior
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Building Internet Firewalls. 2nd Edition
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Elastic Stack. Kurs video. Monitoring aplikacji i systemów IT
-
Prometheus. Kurs video. Monitorowanie systemów i wykrywanie nieprawidłowości
-
Etyczny haking w praktyce. Kurs video. Łamanie haseł, phishing i testy penetracyjne
-
Zabbix. Kurs video. Monitoring systemów IT
-
OSINT w praktyce. Kurs video. Dark web, OPSEC i wycieki danych
-
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers
-
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
Windows Server 2003. Bezpieczeństwo sieci