Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Ebookpoint
-
Promocja
This book will help you understand key security principles and how they are implemented with Spring Security. You'll also gain an in-depth understanding of Spring Security's new features applied to servlet and reactive Spring applications.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
Wireshark: A hackers guide to network insights KEY FEATURES Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. DESCRIPTION Ethical Hacking and Network Analysis with Wires-
- ePub + Mobi 98 pkt
(71,91 zł najniższa cena z 30 dni)
98.10 zł
99.90 zł (-2%) -
-
Promocja
Attacking and Exploiting Modern Web Attacks will help you understand how to identify attack surfaces and detect vulnerabilities. This book takes a hands-on approach to implementation and associated methodologies and equips you with the knowledge and skills needed to effectively combat web attacks.-
- PDF + ePub 134 pkt
(125,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledger technology, cryptocurrencies, and blockchain platforms such as Ethereum, Solana, and Bitcoin. With updates on new concepts like privacy, scalability, and DeFi, this book will help keep your knowledge and skills up to date.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Zabezpieczenie cyfrowe jest ważną częścią reakcji na incydenty pośmiertne i gromadzenia dowodów. Cyfrowi śledczy gromadzą, przechowują i zarządzają dowodami cyfrowymi w celu wsparcia spraw cywilnych i karnych takich jak: badanie naruszenia zasad organizacyjnych; rozstrzyganie sporów czy analizowanie cyberataków. Książka Metody zabezpieczenia cyfro- ePub + Mobi 87 pkt
(76,30 zł najniższa cena z 30 dni)
87.20 zł
109.00 zł (-20%) -
Promocja
Internet jest wszędzie zajrzyj, poznaj wirtualny świat młodych i pytaj o wszystko! Obowiązkowa lektura dla rodziców dzieci w każdym wieku! Bo wszyscy jesteśmy online. Codziennie każdy z nas, niezależnie od wieku, spędza wiele czasu w Internecie. Młodzi ludzie dużo szybciej i sprawniej w nim buszują, a my rodzice, nauczyciele i opiekunowi- ePub + Mobi 27 pkt
(24,90 zł najniższa cena z 30 dni)
27.22 zł
34.90 zł (-22%) -
Promocja
With Azure security, you can build a prosperous career in IT security. Key Features In-detail practical steps to fully grasp Azure Security concepts. Wide coverage of Azure Architecture, Azure Security services, and Azure Security implementation techniques. Covers multiple topics from other Azure certifications (AZ-303, AZ-304, and SC series).-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Exploring techniques and tools and best practices used in the real world. Key Features Explore private and public key-based solutions and their applications in the real world. Learn about security protocols implemented at various TCP/IP stack layers. Insight on types of ciphers, their modes, and implementation issues.. Description Cryptograph-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications.-
- PDF + ePub + Mobi 125 pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and-
- ePub + Mobi 126 pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł (-15%) -
-
Promocja
Publikacja dotyczy problemów związanych z kryptografią i uwierzytelnianiem użytkowników sieci Internet. Przedstawiono w niej mechanizmy podpisu elektronicznego z uwzględnieniem problemów dystrybucji klucza i przykłady rozwiązań uwierzytelniania oparte o analizę cech biometrycznych.Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
Andrzej Grzywak, Jerzy Klamka, Paweł Buchwald, Piotr Pikiewicz, Maciej Rostański, Marcin Sobota
(21,60 zł najniższa cena z 30 dni)
21.60 zł
27.00 zł (-20%) -
Promocja
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the-
- ePub + Mobi 126 pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł (-15%) -
-
Promocja
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine-
- ePub + Mobi 169 pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and r-
- ePub + Mobi 186 pkt
(177,65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth-
- ePub + Mobi 203 pkt
(194,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł (-15%) -
-
Promocja
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecyc-
- ePub + Mobi 203 pkt
(194,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł (-15%) -
-
Promocja
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh-
- ePub + Mobi 101 pkt
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł (-15%) -
-
Promocja
How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes?This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioner-
- ePub + Mobi 169 pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro-
- ePub + Mobi 152 pkt
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł (-15%) -
-
Promocja
As you move data to the cloud, you need to consider a comprehensive approach to data governance, along with well-defined and agreed-upon policies to ensure your organization meets compliance requirements. Data governance incorporates the ways people, processes, and technology work together to ensure data is trustworthy and can be used effectively.-
- ePub + Mobi 211 pkt
(211,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł (-15%) -
-
Promocja
Książka jest zbiorem zadań z rozwiązaniami z podstaw teoretycznych kryptografii i kryptograficznej ochrony informacji. Poszczególne rozdziały dotyczą różnych fragmentów tej dziedziny.(22,43 zł najniższa cena z 30 dni)
26.30 zł
31.00 zł (-15%) -
Promocja
Drugi tom niezwykle życzliwie przyjętej przez Czytelników serii Testowanie oprogramowania w praktyce to kontynuacja idei opisywania przez praktyków - dla praktyków - rzeczywistych wyzwań zawodowych w dziedzinie inżynierii jakości oprogramowania. Podobnie jak w przypadku części pierwszej, do opisania swoich doświadczeń z testowaniem zaproszeni zosta- ePub + Mobi 59 pkt
(47,20 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł (-20%) -
Promocja
W książce Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać? znajdziesz niebanalne i kontrowersyjne informacje nie tylko na temat zabezpieczeń, ale także sposobów ich łamania, dzięki czemu zyskasz wiedzę, skąd może nadejść zagrożenie i w jaki sposób je rozpoznać. Dzięki temu podręcznikowi poznasz konkretne problemy i niedoskonałości syste- PDF + ePub + Mobi
- Druk 21 pkt
(19,50 zł najniższa cena z 30 dni)
21.45 zł
39.00 zł (-45%) -
Promocja
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes-
- ePub + Mobi 169 pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti-
- ePub + Mobi 203 pkt
(194,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł (-15%) -
-
Promocja
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and-
- ePub + Mobi 169 pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Mart-
- ePub + Mobi 186 pkt
(177,65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service-
- ePub + Mobi 186 pkt
(177,65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security-
- ePub + Mobi 126 pkt
(118,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł (-15%) -
-
Promocja
Ta książka jest przeznaczona dla specjalistów ds. bezpieczeństwa, którzy chcą korzystać z języka C# do takich zadań jak fuzzowanie, skanowanie w poszukiwaniu luk zabezpieczeń i analiza złośliwego oprogramowania. Opisano tu zarówno podstawy języka C#, jak i jego dość zaawansowane funkcje. Przedstawiono szereg bibliotek dostępnych dla tego języka. Po- PDF + ePub + Mobi
- Druk 32 pkt
(29,49 zł najniższa cena z 30 dni)
32.45 zł
59.00 zł (-45%) -
Promocja
Z niniejszej książki dowiesz się, jak działa ten system operacyjny i jak z nim pracować jako administrator. Nauczysz się wykorzystywać przy tym najlepsze praktyki w branży. Poznasz sposób działania rozwiązania PowerVM, które jest jednym z najbardziej elastycznych, a jednocześnie najbardziej niezawodnych rozwiązań wirtualizacyjnych. Dowiesz się też,- PDF + ePub + Mobi
- Druk 48 pkt
(44,50 zł najniższa cena z 30 dni)
48.95 zł
89.00 zł (-45%) -
Promocja
Jeśli chcesz uwolnić się od oglądania czegoś, co atakuje cię przy każdym otwarciu przeglądarki internetowej, marzysz o tym, by uniknąć natrętnych e-maili od obcych osób, które w dodatku wyglądają jak wiadomości od kumpla, i potrzebujesz odrobiny luzu w wirtualnym świecie - ta książka ci pomoże. Dowiesz się z niej, jak skonfigurować przeglądarkę, by- PDF + ePub + Mobi
- Druk 19 pkt
(17,45 zł najniższa cena z 30 dni)
19.20 zł
34.90 zł (-45%) -
Promocja
Jak obronić się przed atakiem? Wszystkie niezbędne informacje znajdziesz w tym wyjątkowym podręczniku. W trakcie lektury dowiesz się, jak działają hakerzy, jak wyszukują słabe punkty aplikacji oraz jak modyfikują jej kod. Ponadto nauczysz się utrudniać śledzenie kodu Twojej aplikacji oraz bezpiecznie usuwać pliki (tak, aby nie było możliwe ich odtw- PDF + ePub + Mobi
- Druk 32 pkt
(29,49 zł najniższa cena z 30 dni)
32.45 zł
59.00 zł (-45%) -
Promocja
Książka Testowanie bezpieczeństwa aplikacji internetowych. Receptury to napisany zrozumiałym językiem podręcznik, dzięki któremu szybko poznasz mechanizmy testowania zabezpieczeń. Praktyczne przykłady zawarte w tym przewodniku sprawią, że szybko nauczysz się włączać systemy zabezpieczeń do standardowych procedur kontroli aplikacji. Bez problemu stw- PDF + ePub + Mobi
- Druk 26 pkt
(24,50 zł najniższa cena z 30 dni)
26.95 zł
49.00 zł (-45%) -
Promocja
Secure your applications and development environments with Docker and Kubernetes Key Features Introducing Container platforms (Docker, Kubernetes, Swarm, OpenShift Discover how to manage high availability with Docker Swarm and Kubernetes Learn how Docker can manage the security in images and containers Discover how Docker c-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Crack a ransomware by identifying and exploiting weaknesses in its design Key Features Get an overview of the current security mechanisms available to prevent ransomware digital extortion. Explore different techniques to analyze a ransomware attack. Understand how cryptographic libraries are misused by malware authors to code ransomwares. De-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
The definitive guide to installing and configuring IBM FileNet Information Management software Key Features Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboar-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the knowledge and tools necessary to navigate the complex landscape of password security with confidence.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitati-
- ePub + Mobi 245 pkt
(237,15 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł (-15%) -
-
Promocja
Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania oraz zwalczania niebezpiecznych zachowań w cyberprzestrzeni. Wyzwaniem badawczym stały się także relacje pomiędzy systemem cyberbezpieczeństwa a- PDF + ePub + Mobi 34 pkt
(34,80 zł najniższa cena z 30 dni)
34.80 zł
58.00 zł (-40%) -
Promocja
This book helps you build your own blockchains and production-grade decentralized apps on blockchains like Ethereum, Solana, NEAR, and Polkadot. You’ll explore best practices, code, and assets that can be used for scaffolding multiple projects.-
- PDF + ePub 98 pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.-
- PDF + ePub 170 pkt
(161,10 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł (-10%) -
-
Promocja
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What-
- ePub + Mobi 203 pkt
(194,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł (-15%) -
-
Promocja
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You’ll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark Key Features Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve read this book, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives with ease.-
- PDF + ePub
- Audiobook MP3 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Network Protocols for Security Professionals is a comprehensive guide that will take you through the basics of network security and help you get to grips with the network, network devices, and traffic analysis-based attacks. The book covers practical ways to attack and defend network protocols.-
- PDF + ePub 134 pkt
(125,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Start your journey in this exciting Android app development world Key Features Start your Kotlin adventure from the very fundamentals to sophisticated Android programming. Experience live coding of a video application, game design, and chat application. Explore the Android framework, app creation, testing, and publication to the Google Play st-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces-
- ePub + Mobi 186 pkt
(177,65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense Key Features Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.-
- PDF + ePub 125 pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Mastering Microsoft Endpoint Manager will teach you how to manage your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing a new and simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.-
- PDF + ePub + Mobi 134 pkt
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by-
- ePub + Mobi 143 pkt
(135,15 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł (-15%) -
-
Promocja
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your systems against threats.Contrary t-
- ePub + Mobi 186 pkt
(177,65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to h-
- ePub + Mobi 211 pkt
(211,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł (-15%) -
-
Promocja
Oto Franek Runtime - skompromitowany eks-komisarz, bezduszny detektyw, ekspert poszukiwań. Gdy komenda główna policji zostaje obrabowana, to Franek Runtime i jego niezwykłe umiejętności pozwolą schwytać winnych. W tym opowiadaniu kryminalnym dowiesz się jak korzystać z narzędzi algorytmicznych, aby rozwiązać sprawę. Franek Runtime binarnie przeszu- ePub + Mobi 51 pkt
(51,80 zł najniższa cena z 30 dni)
51.80 zł
74.00 zł (-30%) -
Promocja
Jak bezpieczna jest nasza sieć? Najlepszym sposobem znalezienia odpowiedzi na to pytanie jest zaatakowanie jej. Ocena bezpieczeństwa sieci pokazuje narzędzia i techniki, których używają profesjonalni analitycy zabezpieczeń do identyfikowania i oszacowania ryzyka w sieciach instytucji rządowych, wojskowych i komercyjnych. Dzięki wiedzy i umiejętnośc(56,30 zł najniższa cena z 30 dni)
55.66 zł
79.80 zł (-30%) -
Promocja
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious-
- ePub + Mobi 152 pkt
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł (-15%) -
-
Promocja
Learn the data skills necessary for turning large sequencing datasets into reproducible and robust biological findings. With this practical guide, you’ll learn how to use freely available open source tools to extract meaning from large complex biological data sets.At no other point in human history has our ability to understand life’s c-
- ePub + Mobi 152 pkt
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł (-15%) -
-
Promocja
-
- PDF + ePub + Mobi 85 pkt
(80,91 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
-
Promocja
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u-
- ePub + Mobi 169 pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every-
- ePub + Mobi 126 pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł (-15%) -
-
Promocja
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be-
- ePub + Mobi 211 pkt
(211,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł (-15%) -
-
Promocja
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is t-
- ePub + Mobi 160 pkt
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł (-15%) -
-
Promocja
Dzięki tej książce łatwiej zrozumiesz naturę botów i nauczysz się je projektować. Zamieszczono tu wiele informacji o pracy projektantów i programistów botów. Poza zagadnieniami teoretycznymi znajdziesz tu także sporo praktycznej wiedzy, wzbogaconej rzeczywistymi przykładami budowania użytecznych botów. Nauczysz się projektowania konwersacyjnych int- PDF + ePub + Mobi
- Druk 32 pkt
(29,49 zł najniższa cena z 30 dni)
32.45 zł
59.00 zł (-45%) -
Promocja
Metasploit to narzędzie używane przez profesjonalistów do prowadzenia testów penetracyjnych. Jeżeli chcesz poznać najlepsze przepisy na jego wykorzystanie, to trafiłeś na doskonałą książkę! Zawiera ona ponad 80 receptur omawiających najbardziej skuteczne techniki testowania. W trakcie lektury dowiesz się, jak sprawnie skonfigurować Metasploit, omin- PDF + ePub + Mobi
- Druk 32 pkt
(29,49 zł najniższa cena z 30 dni)
32.45 zł
59.00 zł (-45%) -
Promocja
To ważne, co Twoje dziecko robi w sieci. To, co ogląda, czyta, z kim rozmawia i ile czasu spędza w Internecie, ma duże znaczenie dla jego rozwoju, ale przede wszystkim dla jego bezpieczeństwa! Internet, który jest jedną z największych zdobyczy naszej cywilizacji, to cudowne okno na wielki świat -- na jego jasne, ale i ciemne strony…- PDF + ePub + Mobi
- Druk 16 pkt
(14,95 zł najniższa cena z 30 dni)
16.45 zł
29.90 zł (-45%) -
Promocja
Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne- Druk 81 pkt
(74,50 zł najniższa cena z 30 dni)
81.95 zł
149.00 zł (-45%) -
Promocja
Dzięki tej książce dowiesz się, jak zabezpieczyć swoją stronę, opartą o ten system, przed ich działaniem. Podręcznik w kompleksowy sposób opisuje wszystkie zagadnienia związane z bezpieczeństwem Joomla! — począwszy od wyboru firmy, na której serwerach umieścisz swoją stronę, a skończywszy na tworzeniu polityki reagowania na ataki.- PDF + ePub + Mobi
- Druk 21 pkt
(19,50 zł najniższa cena z 30 dni)
21.45 zł
39.00 zł (-45%) -
Promocja
Wszechstronne wprowadzenie do najważniejszych zagadnień dotyczących bezpieczeństwa danych i sprzętu.- PDF + ePub + Mobi
- Druk 21 pkt
(19,50 zł najniższa cena z 30 dni)
21.45 zł
39.00 zł (-45%) -
Promocja
Z tą książką przyjdzie Ci to bez trudu. Nauczysz się nie tylko tworzyć proste kopie, ale także właściwie zarządzać danymi, rekonstruować skasowane pliki i szyfrować te, których nie chcesz upubliczniać. Z drugiej strony poznasz sposoby trwałego usuwania plików z dysku, metody ich kompresowania oraz odpowiedniego przechowywania w archiwum. Dowiesz si- PDF + ePub + Mobi
- Druk 24 pkt
(22,45 zł najniższa cena z 30 dni)
24.70 zł
44.90 zł (-45%) -
Nowość Promocja
This comprehensive guide covers key topics such as Microsoft Entra ID implementation, authentication and access management, external user management, and hybrid identity solutions, providing practical insights and techniques for SC-300 exam success.-
- PDF + ePub 125 pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Nowość Promocja
This comprehensive exam guide is designed to transform you into an AWS networking expert, going beyond the ANS-C01 exam blueprint to maximize your impact in the field.-
- PDF + ePub 125 pkt
(100,08 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Nowość Promocja
This tailor-made study guide will equip you with the skills, knowledge, and confidence to pass the SnowPro Core Certification exam and apply what you have learned in your organization.-
- PDF + ePub 125 pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Description Quantum blockchain uses the power of quantum computing to solve issues like security and scalability that traditional blockchains face. With its ability to handle large data sets and solve complex problems much faster, it can greatly improve transaction speeds, security, and efficiency. This book begins by explaining the basics of bloc-
- ePub + Mobi 98 pkt
Quantum Blockchain
Dr. Mahendra Kumar Shrivas, Dr. Kamal Kant Hiran, Dr. Ashok Bhansali, Umesh Kumar Sahu
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
Description The cloud is ubiquitous. Everyone is rushing to the cloud or is already in the cloud, and both of these groups are concerned with cloud security. In this book, we will explain the concepts of security in a beginner friendly way, but also hint at the great expanse of knowledge that lies beyond. This book offers a detailed guide to cloud-
- ePub + Mobi 98 pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
This book shows you how to automate essential security tasks like vulnerability scanning, patch management, and threat intelligence gathering. Streamline your security workflows and enhance defense strategies with custom Python scripts.-
- PDF + ePub 125 pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Description Vulnerability Assessment and Penetration Testing (VAPT) combinations are a huge requirement for all organizations to improve their security posture. The VAPT process helps highlight the associated threats and risk exposure within the organization. This book covers practical VAPT technologies, dives into the logic of vulnerabilities, and-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Master the skills needed to secure AI ecosystems from evolving cyber threats. This course delves into the risks targeting AI systems, real-world case studies, and strategies for safeguarding LLMs, GenAI applications, and AI infrastructures. Build expertise in combating attacks and ensuring compliance in AI environments.-
- PDF + ePub 134 pkt
(125,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Explore critical strategies for defending against cyber threats, securing social media, and protecting home networks.-
- PDF + ePub 98 pkt
Surviving A Cyberattack. A Comprehensive Guide to Digital Security for Families and Businesses
Mercury Learning and Information, Todd G. Shipley, Art Bowker
(109,00 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki 1) TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów spo- PDF + ePub + Mobi 93 pkt
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska, Agnieszka Brzostek, Sylwia Gliwa
(93,00 zł najniższa cena z 30 dni)
93.00 zł
155.00 zł (-40%) -
Promocja
This book is a comprehensive guide to using Ghidra for malware analysis, reverse engineering, and vulnerability detection. It covers everything from basic usage to advanced topics such as Ghidra plug-ins, kernel debugging, and binary diffing.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware. This book is a comprehensive-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
This book covers everything from basic scripting to advanced techniques for reconnaissance, exploitation, and integration with AI. You'll master essential skills to automate tasks, analyze data, and enhance cybersecurity assessments.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Description "Mastering the Red Hat Certified Engineer (RHCE) Exam" is a comprehensive guide designed for IT professionals and system administrators aspiring to achieve RHCE certification. This book is an essential resource for mastering Red Hat Enterprise Linux (RHEL) skills and advancing careers in Linux administration. This book is designed to g-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Learn all about Microsoft Defender for Identity in depth and master the art of securing digital identities against emerging threats with hands-on guidance to elevate your cybersecurity skills to new heights.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Learn the various aspects of Cyber Security concepts. Key Features Strengthens the foundations, as detailed explanation of the concepts are given. Simple language, crystal clear approach, straight forward comprehensible presentation. Adopting user-friendly classroom lecture style. The concepts are duly supported by several examples.-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
A practical book that will help you defend against malicious activities Key Features Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out Learn how to choose, design and implement a cybersecurity program that best fits your needs Learn how to improve a cybersecurity progra-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Step-by-step guide to learn Ripple and explore $155 trillion+ market on international remittance Key Features Know the inefficiencies of banks in international remittance and how Ripple can help Learn Ripples architecture and its product offerings such as xCurrent, xRapid, and xVia Acquire development skills on Ripples XRP ledger-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Learn how to redesign NLP applications from scratch. Key Features Get familiar with the basics of any Machine Learning or Deep Learning application. Understand how does preprocessing work in NLP pipeline. Use simple PyTorch snippets to create basic building blocks of the network commonly used in NLP. Get familiar with the advanced em-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Learn to secure your personal data & reclaim your online privacy! Key Features Understand your cyber risk exposure by calculating your Privacy Score Improve your Privacy Score with easy-to-follow recommendations Different recommendations for different levels of expertise YOUR choice! An interactive book with inline QR code r-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Step-by-step guide to learning the role of E-commerce in our economy Key Features Hands-on with the concept of E-Commerce and E-Business. Understand the know-how of working of E-Commerce framework. Learn the type of E-Payment system and its mechanism. Understanding Brand building and Digital Marketing methods. Description-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Getting familiar with cloud computing features from scratch to advanced. Description Cloud computing is a technology that allows you to store, access data and programs over the internet instead of the hard drive or a server. In this book, you will gain knowledge about the fundamentals of cloud computing. This book includes a detailed descript-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features Real-case studies and true events on cyber crime incidents. Learn how to protect yourself from cyber threats and assist police for crime investigation. Coverage on financial frauds, social media crimes, mobile payment f-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Prepare yourself for any type of audit and minimise security findings Key Features It follows a lifecycle approach to information security by understanding: Why we need Information security How we can implement How to operate securely and maintain a secure posture How to face audits Description This book is a guide for Net-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Master the CNAPP lifecycle with this comprehensive guide that will teach you how to plan, deploy, and operationalize cloud security using Microsoft Defender for Cloud, enhancing your security posture across multicloud environments.-
- PDF + ePub 125 pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Ace the SC-100 exam with this essential guide, covering advanced cloud security strategies, zero-trust architecture, and GRC evaluations. Benefit from real-world examples and practice exams questions to ensure certification success.-
- PDF + ePub 125 pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
This book offers in-depth coverage and practical insights for effectively securing AWS environments, encompassing key services, compliance, and best practices.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Embark on a dynamic journey through command shells with this hands-on manual. From the Linux staple Bash to rising stars like Z shell and PowerShell, master their power for Linux, macOS, and Unix.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) Key Features Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
A comprehensive guide to Multi-Cloud Administration for Cloud professionals Key Features Get familiar with the various components involved in establishing a multi-cloud architecture. Acquire the skills to effectively manage multi-cloud environments. Establish guardrails and guidelines to ensure interoperability and security across multiple clo-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more Key Features Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advanc-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments Key Features A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. D-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Description In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It-
- ePub + Mobi 58 pkt
(53,91 zł najniższa cena z 30 dni)
58.49 zł
64.99 zł (-10%) -
-
Promocja
This book equips network professionals with the skills to monitor, analyze, and optimize network infrastructures using specific tools. With advanced techniques, you'll learn how to build tailored observability solutions for your needs.-
- PDF + ePub 125 pkt
Modern Network Observability. A hands-on approach using open source tools such as Telegraf, Prometheus, and Grafana
David Flores, Christian Adell, Josh VanDeraa, Eric Chou, Damien Garros
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,-
- ePub + Mobi 58 pkt
(53,91 zł najniższa cena z 30 dni)
58.49 zł
64.99 zł (-10%) -
-
Promocja
Everything you need to know to secure your IoT devices Key Features Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities that can affect IoT devices. Implement security measures to protect IoT devices from attack. Description The Internet of Things (IoT) is a rapidly growing-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Learn how to leverage DevSecOps to secure your modern enterprise in the cloud Key Features Explore DevSecOps principles, fundamentals, practices, and their application in AWS environments comprehensively and in-depth. Leverage AWS services and tools to enhance security within your DevSecOps pipeline, gaining deep insights. Implement DevSecOps-
- ePub + Mobi 76 pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł (-10%) -
-
Promocja
Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
This hands-on guide to understanding Snort 3 and its evolution covers everything from installation to configuration based on available resources and expected detection rates. The book dives into various key modules using practical examples.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
This book is a valuable resource that offers practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.-
- PDF + ePub 116 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
This latest edition of Practical Hardware Pentesting features even more practical advice on how to pentest various devices, from IoT to simpler hardware. As you progress through the chapters, you'll quickly learn the most common attack techniques, as well as ways to secure embedded systems and build more secure devices.-
- ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -