Imran Bashir - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Bezpieczeństwo urządzeń mobilnych. Receptury
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Hacking Android. Click here to enter text
-
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
Przestępczość teleinformatyczna 2015
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
-
Android. Podręcznik hackera
-
Jak pozostać anonimowym w sieci
-
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Network Analysis using Wireshark Cookbook. This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud
-
Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness
-
BackTrack 5. Testy penetracyjne sieci WiFi
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone
-
Podstawy ochrony komputerów
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych
-
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security and Usability. Designing Secure Systems that People Can Use
-
Hackers & Painters. Big Ideas from the Computer Age
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Hakerzy i malarze. Wielkie idee ery komputerów
-
Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV
-
Usuwanie prywatnych danych z Internetu
-
Pożeracze danych
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort
-
Windows Server 2003. Bezpieczeństwo sieci