Prasenjit Sarkar, Prasenjit Sarkar - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Internet Rzeczy
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
-
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Kliknij tutaj, aby zabić wszystkich. Bezpieczeństwo i przetrwanie w hiperpołączonym świecie
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Atak na sieć okiem hakera. Wykrywanie i eksploatacja luk w zabezpieczeniach sieci
-
Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie
-
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Bezpieczeństwo sieci komputerowych - Praktyczne przykłady i ćwiczenia w symulatorze Cisco Packet Tracer
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Ocena bezpieczeństwa sieci wyd. 3
-
Praktyczna analiza pakietów. Wykorzystanie narzędzia Wireshark do rozwiązywania problemów związanych z siecią. Wydanie III
-
Dane i Goliat. Ukryta bitwa o Twoje dane i kontrolę nad światem
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Troubleshooting OpenVPN. Click here to enter text
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
Penetration Testing: A Survival Guide. A Survival Guide
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Network Security Assessment. Know Your Network. 3rd Edition
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Ransomware. Defending Against Digital Extortion
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis
-
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
Skanowanie sieci z Kali Linux. Receptury
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance
-
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
Jak pozostać anonimowym w sieci
-
Ethernet. Biblia administratora
-
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
Cyfrowe ślady. Jest się czego bać
-
Metasploit. Receptury pentestera. Wydanie II
-
Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Nowy malware. Jest się czego bać
-
Audyt bezpieczeństwa informacji w praktyce
-
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud
-
Intelligence-Driven Incident Response. Outwitting the Adversary
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
Bezpieczeństwo informacyjne