Douglas W. Hubbard, Richard Seiersen - książki
Tytuły autora: dostępne w księgarni Ebookpoint
-
Jak rabuję banki (i inne podobne miejsca)
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
System bezpieczeństwa w cyberprzestrzeni RP
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Cybersecurity w pytaniach i odpowiedziach
-
Computer Networks in Packet Tracer for advanced users
-
Computer Networks in Packet Tracer for beginners
-
Computer Networks in Packet Tracer for intermediate users
-
Packet Tracer for young advanced admins
-
Packet Tracer for young beginning admins
-
Packet Tracer for young intermediate admins
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Analiza śledcza urządzeń mobilnych. Teoria i praktyka
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
Ochrona cyberprzestrzeni Unii Europejskiej
-
Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing
-
Modern Data Protection
-
Bezpieczeństwo nowoczesnych aplikacji internetowych. Przewodnik po zabezpieczeniach
-
Amazon Web Services w akcji. Wydanie II
-
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
Atak na sieć okiem hakera. Wykrywanie i eksploatacja luk w zabezpieczeniach sieci
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 1
-
Bezpieczeństwo sieci komputerowych - Praktyczne przykłady i ćwiczenia w symulatorze Cisco Packet Tracer
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Cyberwojna. Metody działania hakerów
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Mroczne odmęty phishingu. Nie daj się złowić!
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Accumulo. Application Development, Table Design, and Best Practices
-
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Bezpieczny system w praktyce. Wyższa szkoła hackingu i testy penetracyjne
-
Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware
-
Jak pozostać anonimowym w sieci
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Cyfrowe ślady. Jest się czego bać
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Metasploit. Receptury pentestera. Wydanie II
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Nowy malware. Jest się czego bać
-
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
Effective Monitoring and Alerting. For Web Operations
-
125 sposobów na bezpieczeństwo sieci. Wydanie II
-
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
-
Cisza w sieci
-
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Network Security Hacks. 2nd Edition
-
Digital Identity
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Building Internet Firewalls. 2nd Edition
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Prometheus. Kurs video. Monitorowanie systemów i wykrywanie nieprawidłowości
-
Cybersecurity dla każdego. Kurs video. Bezpieczeństwo i prywatność danych, sieci i urządzeń
-
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II
-
Red Team Operator's Handbook. Gain invaluable insights into the art of offensive cybersecurity
-
Intelligence-Driven Incident Response. Outwitting the Adversary