Yoram Orzach, Nagendra Kumar Nainar, Yogesh Ramdoss - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Hands-On Differential Privacy
-
Zagrożenia cyberbezpieczeństwa i rozwój złośliwego oprogramowania. Poznaj strategie obrony przed współczesnymi niebezpieczeństwami. Wydanie II
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III
-
Prawdziwa głębia OSINT. Odkryj wartość danych Open Source Intelligence
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Zero Trust Networks. 2nd Edition
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Pegasus. Jak chronić się przed szpiegami, scamem, phishingiem, kradzieżą tożsamości i oszustwami online
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Hacker Culture A to Z
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Identity-Native Infrastructure Access Management
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Bezpieczeństwo sieci firmowej. Kontrola ruchu wychodzącego
-
10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques
-
Internet. Hacking
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition
-
Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
-
Analiza śledcza urządzeń mobilnych. Teoria i praktyka
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
Internet Rzeczy (IoT). Problemy cyberbezpieczeństwa
-
Practical Cloud Native Security with Falco
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Practical Fraud Prevention
-
Cybersecurity Research, Education and Management: University Perspective
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Algorytmy kryptograficzne w Pythonie. Wprowadzenie
-
Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects
-
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Kryptografia. W teorii i praktyce
-
Rootkity i Bootkity
-
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
-
Threat Modeling
-
Blockchain Success Stories
-
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition
-
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Zastosowania technologii Blockchain
-
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Enterprise Agility. Being Agile in a Changing World
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture