Imran Bashir - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
-
Pegasus. Jak chronić się przed szpiegami, scamem, phishingiem, kradzieżą tożsamości i oszustwami online
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Internet Rzeczy (IoT). Problemy cyberbezpieczeństwa
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Cybersecurity Research, Education and Management: University Perspective
-
Algorytmy kryptograficzne w Pythonie. Wprowadzenie
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Hacking Android. Click here to enter text
-
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
Przestępczość teleinformatyczna 2015
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security and Usability. Designing Secure Systems that People Can Use
-
Hackers & Painters. Big Ideas from the Computer Age
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV
-
Linux Shell Scripting for Hackers. Automate and scale your hacking process with bash scripting
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Usuwanie prywatnych danych z Internetu