Tomasz Waszczyk - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Docker Deep Dive. Zero to Docker in a single book - Third Edition
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Defensive Security Handbook. 2nd Edition
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Bezpieczeństwo osób i systemów IT z wykorzystaniem białego wywiadu
-
Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide. Keep up to date with ethical hacking trends and hone your skills with hands-on activities
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls
-
Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation
-
Modern Data Protection
-
The Cybersecurity Manager's Guide
-
Zbiór zadań z podstaw teoretycznych kryptografii i ochrony informacji
-
Platformy integracyjne Zagadnienia wybrane
-
97 Things Every SRE Should Know
-
Chmura Azure. Praktyczne wprowadzenie dla administratora. Implementacja, monitorowanie i zarządzanie ważnymi usługami i komponentami IaaS/PaaS
-
Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II
-
The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Duch w sieci. Moje przygody jako najbardziej poszukiwanego hakera wszech czasów
-
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale
-
Bezpieczeństwo informacyjne. Nowe wyzwania
-
Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux
-
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
Ukryta tożsamość. Jak się obronić przed utratą prywatności
-
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
Cyfrowe ślady. Jest się czego bać
-
Nowy malware. Jest się czego bać
-
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
Dziecko w sieci
-
Audyt bezpieczeństwa informacji w praktyce
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Joomla! Zabezpieczanie witryn
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Archiwizacja i odzyskiwanie danych
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Managing Security with Snort & IDS Tools
-
Security Warrior
-
Bezpieczeństwo w ASP.NET Core. Kurs video. Podstawy kryptografii
-
Blockchain. Kurs video. Cyfrowa ewolucja w świecie finansów
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting - Second Edition
-
Defense Evasion Techniques. A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Mastering Microsoft Defender for Office 365. Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting
-
Hack the Cybersecurity Interview. Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles - Second Edition
-
Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems
-
The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
-
Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
Bezpieczeństwo informacyjne
-
Windows Server 2003. Bezpieczeństwo sieci