Mateusz Paruzel - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki
-
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Go H*ck Yourself. Proste wprowadzenie do obrony przed cyberatakami
-
Informatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym
-
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Cyberbezpieczeństwo w bashu. Jak za pomocą wiersza poleceń prowadzić działania zaczepne i obronne
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Kryptografia. W teorii i praktyce
-
Data Governance: The Definitive Guide
-
Blockchain Success Stories
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Bezpiecznie już było. Jak żyć w świecie sieci, terrorystów i ciągłej niepewności
-
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity
-
Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Hacking Android. Click here to enter text
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
Android. Podręcznik hackera
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Testowanie bezpieczeństwa aplikacji internetowych. Receptury
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Hackers & Painters. Big Ideas from the Computer Age
-
Practical UNIX and Internet Security. 3rd Edition
-
Web Security, Privacy & Commerce. 2nd Edition
-
Hakerzy i malarze. Wielkie idee ery komputerów
-
Elastic Stack. Kurs video. Monitoring aplikacji i systemów IT
-
Zabbix. Kurs video. Monitoring systemów IT
-
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting