Kyle Wilhoit, Joseph Opacki - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Go H*ck Yourself. Proste wprowadzenie do obrony przed cyberatakami
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Bezpiecznie już było. Jak żyć w świecie sieci, terrorystów i ciągłej niepewności
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Hacking Android. Click here to enter text
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Hackers & Painters. Big Ideas from the Computer Age
-
Practical UNIX and Internet Security. 3rd Edition
-
Web Security, Privacy & Commerce. 2nd Edition
-
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting