Douglas W. Hubbard, Richard Seiersen - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
-
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Cyberwojna. Metody działania hakerów
-
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Testy penetracyjne dla zaawansowanych. Hakowanie najlepiej zabezpieczonych sieci na świecie
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Praktyczna inżynieria wsteczna. Metody, techniki i narzędzia
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Przestępczość teleinformatyczna 2015
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Accumulo. Application Development, Table Design, and Best Practices
-
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
-
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
Podstawy kryptografii. Wydanie III
-
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
Jak pozostać anonimowym w sieci
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Cyfrowe ślady. Jest się czego bać
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Metasploit. Receptury pentestera. Wydanie II
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Nowy malware. Jest się czego bać
-
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
Dziecko w sieci
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress
-
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Effective Monitoring and Alerting. For Web Operations
-
125 sposobów na bezpieczeństwo sieci. Wydanie II
-
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Archiwizacja i odzyskiwanie danych
-
Testowanie bezpieczeństwa aplikacji internetowych. Receptury
-
Cisza w sieci
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Network Security Hacks. 2nd Edition
-
Digital Identity
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Practical UNIX and Internet Security. 3rd Edition
-
Building Internet Firewalls. 2nd Edition
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Prometheus. Kurs video. Monitorowanie systemów i wykrywanie nieprawidłowości
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Blockchain i kryptowaluty. Kurs video. Zdecentralizowane finanse od podstaw
-
Blockchain. Kurs video. Cyfrowa ewolucja w świecie finansów
-
Blockchain. Kurs video. Smart kontrakty i aplikacje zdecentralizowane w praktyce
-
Testowanie w Angularze. Kurs video. Karma i Jasmine
-
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
-
Intelligence-Driven Incident Response. Outwitting the Adversary
-
Usuwanie prywatnych danych z Internetu
-
Metasploit Penetration Testing Cookbook. Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it's ideal for Metaspoilt veterans and newcomers alike. - Second Edition
-
W obronie wolności