Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Hands-On Differential Privacy
-
Zagrożenia cyberbezpieczeństwa i rozwój złośliwego oprogramowania. Poznaj strategie obrony przed współczesnymi niebezpieczeństwami. Wydanie II
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III
-
Prawdziwa głębia OSINT. Odkryj wartość danych Open Source Intelligence
-
Zero Trust Networks. 2nd Edition
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Hacker Culture A to Z
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Identity-Native Infrastructure Access Management
-
Bezpieczeństwo sieci firmowej. Kontrola ruchu wychodzącego
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Analiza śledcza urządzeń mobilnych. Teoria i praktyka
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Rootkity i Bootkity
-
Threat Modeling
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Enterprise Agility. Being Agile in a Changing World
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Bezpieczeństwo urządzeń mobilnych. Receptury
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Jak pozostać anonimowym w sieci
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Podstawy ochrony komputerów
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security and Usability. Designing Secure Systems that People Can Use
-
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
-
Cybersecurity Career Master Plan (Removed from sales). Proven techniques and effective tips to help you advance in your cybersecurity career