Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Ebookpoint
-
Promocja
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledger technology, cryptocurrencies, and blockchain platforms such as Ethereum, Solana, and Bitcoin. With updates on new concepts like privacy, scalability, and DeFi, this book will help keep your knowledge and skills up to date.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What-
- ePub + Mobi 186 pkt
(123,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.-
- PDF + ePub 98 pkt
(50,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
Crack a ransomware by identifying and exploiting weaknesses in its design KEY FEATURES Get an overview of the current security mechanisms available to prevent ransomware digital extortion. Explore different techniques to analyze a ransomware attack. Understand how cryptographic libraries are misused by malware authors to code ransomwares. DES-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
This book provides a security baseline to reduce the risk of future attacks. The chapters will teach you how to secure your Windows endpoint, protect devices with Microsoft Defender, and secure hybrid workloads using Azure Arc, enabling you to protect your infrastructure, network, and data with the help of SASE and the Zero Trust model.-
- PDF + ePub 98 pkt
(50,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
The book: “PACKET TRACER FOR YOUNG BEGINNING ADMINS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configu-
- PDF + ePub + Mobi 96 pkt
Packet Tracer for young beginning admins
Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek Smyczek
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title.-
- PDF + ePub + Mobi 96 pkt
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR ADVANCED USERS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations-
- PDF + ePub + Mobi 96 pkt
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja
The book: “PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors ha-
- PDF + ePub 96 pkt
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja
The book: “PACKET TRACER FOR YOUNG ADVANCED ADMINS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations were prepared-
- PDF + ePub 96 pkt
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of-
- PDF + ePub + Mobi 96 pkt
Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You'll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
The Executive’s Cybersecurity Program Handbook helps you perform internal assessments to drive strategic cybersecurity program development and evaluate risk within an organization. With this book, you’ll be able to build an incident response team and implement administrative and technical security controls.-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark KEY FEATURES Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
W książce omówiono zagadnienia dotyczące ochrony danych osobowych w różnych służbach mundurowych. Pozycja skierowana jest do wykładowców i studentów szkół wyższych o kierunku bezpieczeństwo wewnętrzne. Będzie również przydatna dla wszystkich osób zainteresowanych tematyką ochrony danych osobowych.- PDF + ePub + Mobi 100 pkt
-
Promocja
This book is a guide to help security professionals learn about the process of discovering and publishing vulnerabilities in software. They'll learn how to build and execute winning vulnerability research strategies and disclosure methods and find out exactly how to claim credit for their work by opening CVEs and sharing their research publicly.-
- PDF + ePub 89 pkt
(42,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.-
- PDF + ePub 85 pkt
(41,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
-
Promocja
The go-to guide for building non-fungible token projects on the Ethereum blockchain KEY FEATURES Get an in-depth understanding of digital assets and crypto-collectables. Learn to create, test, and launch an ERC-721 token contract on the Ethereum testnet. Uncover effective ways to market and promote your NFTs on social media platforms. DESCRIP-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
Combating Crime on the Dark Web gives you a deep understanding of how criminal elements operate on the dark web and how you can strategize and use various tools to disrupt those operations. If you’re looking to pave your way to an exciting and rewarding career in crime prevention, this book is a must-read.-
- PDF + ePub 85 pkt
(41,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
-
Promocja
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
DevSecOps in Practice with VMware Tanzu is a comprehensive learning reference covering the best-in-class tools that will aid in enhancing developer productivity, operational efficiency, and intrinsic security. This book will help you in laying out the easiest path to production for apps built to run in multi-cloud Kubernetes environments.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Zmieniająca się rzeczywistość administracyjna koreluje z wieloma obszarami, a wśród nich priorytetowe znaczenie ma bezpieczeństwo wewnętrzne. Zapewnianie i kształtowanie bezpieczeństwa wewnętrznego odbywa się w dużej mierze przez podmioty publiczne. Efektywność wykonywania przez nie zadań ma realny wpływ na eliminowanie lub neutralizowanie z -
Promocja
e_39t1/e_39t1.mp3 e_39t1Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve read this book, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives with ease.-
- PDF + ePub
- Audiobook MP3 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
A Guide to Enter the Journey of a Digital Forensic Investigator KEY FEATURES Provides hands-on training in a forensics lab, allowing learners to conduct their investigations and analysis. Covers a wide range of forensics topics such as web, email, RAM, and mobile devices. Establishes a solid groundwork in digital forensics basics including evi-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
e_39wb/e_39wb.mp3 e_39wbThis book will prepare cybersecurity professionals for the SC-100 exam while also helping them build a strong foundation for implementing the strategies they learn. A mixture of theoretical and practical knowledge, as well as practice questions and a mock exam will ensure you're confident to take the exam.-
- PDF + ePub
- Audiobook MP3 197 pkt
(101,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł (-10%) -
-
Promocja
e_39wq/e_39wq.mp3 e_39wqAs hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.-
- PDF + ePub
- Audiobook MP3 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
e_3a91/e_3a91.mp3 e_3a91This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, you’ll learn how cloud evolution affected identity strategy within the enterprise.-
- PDF + ePub
- Audiobook MP3 89 pkt
(42,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.-
- PDF + ePub 170 pkt
(82,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł (-10%) -
-
Promocja
This book not only helps you gain a deep understanding of crucial information security concepts, but also supercharges your preparation for the CISM exam through interactive practice questions, flashcards, and exam tips.-
- PDF + ePub 161 pkt
(82,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł (-10%) -
-
Promocja
Cyber anonymity is very essential as most devices, applications, and browsers collect information on every single activity that you perform in cyberspace. This book helps you understand the importance of cyber anonymity and you will learn techniques that will help you perform tasks without disclosing your information.-
- PDF + ePub 89 pkt
(42,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. Extensive coverage of Android and iO-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
The CompTIA Network+ Certification Guide makes the most complex Network+ concepts easy to understand despite having no prior knowledge. It offers exam tips in every chapter along with access to practical exercises and an exam checklist that map to the exam objectives. Moreover, it is the perfect study guide to help you confidently pass the CompTIA-
- PDF + ePub 152 pkt
(78,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł (-10%) -
-
Promocja
Digital transformation of enterprises and hybrid multi-cloud adoption pose many security challenges. This book presents useful security patterns that discuss the problem context and solution. You’ll receive clear guidance on implementation and best practices for securing infrastructure, protecting data and providing continuous security and c-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
This book will help you discover the powerful capabilities of Dapr by implementing a sample application with microservices leveraging all the building blocks. Throughout the book, you’ll find out how Dapr helps you simplify the creation of resilient and portable microservices.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
This guide to SASE services is for those implementing SD-WAN, SASE, cloud infrastructure, remote access, or integrating a multi-cloud strategy that may or may not include edge computing solutions. This book shows the past, present, and future of SASE and how you can learn today and prepare for the future.-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
e_3a8s/e_3a8s.mp3 e_3a8sThis comprehensive guide will aid the C-suite and executives in understanding the necessity of cyber resilience in their organizations, self-assess their role in supporting their company’s cybersecurity program, and provide practical takeaways and insights on navigating their working relationship with the other C-suite counterparts.-
- PDF + ePub
- Audiobook MP3 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
Network Protocols for Security Professionals is a comprehensive guide that will take you through the basics of network security and help you get to grips with the network, network devices, and traffic analysis-based attacks. The book covers practical ways to attack and defend network protocols.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Cybersecurity – Attack and Defense Strategies, Third Edition is a completely revised new edition of this bestselling book that covers the very latest security threats and defense strategies.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
Helm is a powerful open-source tool for automating application deployments on Kubernetes. Managing Kubernetes Resources Using Helm provides you with the ability to significantly reduce operational stress around application deployment and lifecycle management.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Malware analysis is a powerful investigation technique widely used in various information security areas including digital forensics and incident response processes. With the help of this book, you’ll be able to use practical examples and comprehensive insights to analyze any type of malware you may encounter within the modern world.-
- PDF + ePub 143 pkt
(73,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł (-10%) -
-
Promocja
Windows Server 2022 is Microsoft's latest version of the server OS. It brings significant improvements in security, secure connectivities, Azure hybrid capabilities, storage, and other vital features. This book covers all Windows Server 2022 administration fundamentals, giving you valuable insights into Microsoft's role-based certifications.-
- PDF + ePub 197 pkt
(101,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł (-10%) -
-
Promocja
Start your journey in this exciting Android app development world KEY FEATURES Start your Kotlin adventure from the very fundamentals to sophisticated Android programming. Experience live coding of a video application, game design, and chat application. Explore the Android framework, app creation, testing, and publication to the Google Play st-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
This book is a technical reference that investigates, analyzes, and explains every part of the FastAPI framework and demonstrates the use of these parts by helping you solve problems. Some topics are experimental and original given the current development setups. Overall, the book is a recipe, blueprint, study, and reference combined into one.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
While penetration testing is highly competitive, it’s easy to be stuck in a monotonous routine client after client. This book will provide hands-on experience with penetration testing while guiding you through the behind-the-scenes action along the way.-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Check Point Firewall Administration R81.10+ is for security administrators to develop the skills necessary for effective deployment and operation of Check Point firewalls or high availability clusters. This book will help you to improve network segmentation and implement airtight access control policies.-
- PDF + ePub 143 pkt
(73,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł (-10%) -
-
Promocja
Security is a shared responsibility, and we must all own it KEY FEATURES Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components. Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams. Adopts a perspective of developing a Cybersecurity stra-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
With this edition, you'll be able to secure your company's data and users in today's threat landscape. This book will help you to holistically approach the method of securing your Windows environment, with best practice recommendations, real-world scenarios, and by guiding you through implementing a zero-trust multi-layered approach.-
- PDF + ePub 161 pkt
(82,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł (-10%) -
-
Promocja
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces-
- ePub + Mobi 169 pkt
(112,90 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja
Learn Wireshark provides an overview of protocol analysis. You’ll become more confident in navigating the interface while examining protocols such as TCP, IP, and ICMP. The book features tips on how to use display and capture filters, save, export, and share captures, create graphs, and become more proficient in troubleshooting latency issue-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
e_3a8p/e_3a8p.mp3 e_3a8pThis book will take you through some key cybersecurity job roles and teach you the important technical and behavioral questions that will help you pass the interview, land the job, and grow in your cybersecurity career.-
- PDF + ePub
- Audiobook MP3 170 pkt
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
Ken Underhill, Mari Galloway, Christophe Foulon, Tia Hopkins
(87,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł (-10%) -
-
Promocja
Microsoft Defender for Cloud is an infrastructure management system that enhances security status and provides threat protection of hybrid workloads in the cloud. Microsoft Defender for Cloud Cookbook provides comprehensive coverage of Microsoft Defender for Cloud features and capabilities as well as hands-on and implementation guides and examples.-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin by creating your very first app from the get-go. You’ll learn how to use it as a means to explore and understand the Honeycode development environment and concepts.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
e_3a8y/e_3a8y.mp3 e_3a8yThis book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.-
- PDF + ePub
- Audiobook MP3 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.-
- PDF + ePub 107 pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
e_3a0u/e_3a0u.mp3 e_3a0uThis easy-to-follow guide is for network and security professionals who want to learn how to use Palo Alto's Next Generation Firewall, and how it can be leveraged to gain deep insight into the traffic, applications and threats that traverse your network.-
- PDF + ePub
- Audiobook MP3 197 pkt
(101,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł (-10%) -
-
Promocja
This book will focus right from scratch on how to set up an environment and perform reverse engineering on iOS and Android mobile apps. The book takes you on a journey of exploring the internals of mobile apps, how they are built, and how to take each piece apart while trying to understand the internal working of the apps.-
- PDF + ePub 89 pkt
(42,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam's objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.-
- PDF + ePub 197 pkt
(101,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł (-10%) -
-
Promocja
Discover security posture, vulnerabilities, and blind spots ahead of the threat actor KEY FEATURES Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning, Secure Code Review, and bypas-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
e_3a8v/e_3a8v.mp3 e_3a8vThis book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.-
- PDF + ePub
- Audiobook MP3 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Mastering Cyber Intelligence provides critical knowledge that will help you stay ahead of adversaries and proactively protect your organization against known and unknown cyber threats. You'll build the security skills required to conduct effective threat intelligence, integrate it into operations, and identify gaps in security postures.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Security is integrated into every cloud, but most users take cloud security for granted. Revised to cover product updates up to early 2022, this book will help you understand Microsoft Azure's shared responsibility model that can address any challenge, cybersecurity in the cloud, and how to design secure solutions in Microsoft Azure.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Understand and Conduct Ethical Hacking and Security Assessments Key Features Practical guidance on discovering, assessing, and mitigating web, network, mobile, and wireless vulnerabilities. Experimentation with Kali Linux, Burp Suite, MobSF, Metasploit and Aircrack-suite. In-depth explanation of topics focusing on how to crack ethical hacking i-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
Shellcode is code that is used to execute a command within software memory to take control of or exploit a target computer. Offensive Shellcode from Scratch helps you to understand what shellcode is, along with its components, the tools used to build shellcode, and how shellcode can be used within Linux and Windows.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
The evolving ransomware threat landscape brings new challenges to the security personnel of many organizations. The effects of human-operated attacks make practical security approaches the need of the hour as proper response and investigation are crucial. This book discusses how to use these approaches, focusing on real-world scenarios and tools.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
KEY FEATURES Learn how to defend industrial control systems from an attacking standpoint. Learn about industrial network protocols and threat hunting. Handling of tackle industrial cyber risks Develop offensive and defensive skills. DESCRIPTION In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
Memory forensics is a vital part of modern digital forensic examinations as threat actors have started using memory-based malware more often. This comprehensive guide focuses on the application of modern memory forensics techniques to detect hidden threats in memory and reconstruct user activity based on volatile data.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
Over the past two decades, the booming ecommerce and fintech industries have become a breeding ground for fraud. Organizations that conduct business online are constantly engaged in a cat-and-mouse game with these invaders. In this practical book, Gilit Saporta and Shoshana Maraney draw on their fraud-fighting experience to provide best practices,-
- ePub + Mobi 169 pkt
(112,90 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
This book is a guide to understanding new-age protocols and algorithms that are emerging for data protection in cybersecurity and information and communications technology (ICT) with the help of examples and use cases. You’ll begin by exploring classical cryptography and later progress to implementing algorithms for security and data privacy-
- PDF + ePub 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
e_39yf/e_39yf.mp3 e_39yfCompTIA Advanced Security Practitioner (CASP+) candidates need to stay up to date with the emerging technologies and threats in this fast-changing environment. This book helps you to apply CASP+ concepts, understand processes and methodologies, and discover industry best practices for achieving CASP+ certification.-
- PDF + ePub
- Audiobook MP3 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
W książce Ochrona cyberprzestrzeni Unii Europejskiej autorka analizuje działania podjęte przez Unię Europejską w ramach polityki ochrony cyberprzestrzeni przez UE jako obowiązku zabezpieczenia wspólnej przestrzeni bezpieczeństwa informacyjnego UE w obliczu współczesnych zagrożeń. Przeanalizowana została również aktualna strategia cyberbezpieczeństw- ePub + Mobi 67 pkt
(51,90 zł najniższa cena z 30 dni)
67.20 zł
84.00 zł (-20%) -
Promocja
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition provides you with an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers.-
- PDF + ePub 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
With this guide for developers, you'll learn how to build apps that use common cryptographic operations to improve security and respect user privacy. You'll understand how, when, and why to use safe, modern cryptographic algorithms and libraries in your code. You’ll learn using plenty of code samples in JavaScript for both Node.js and the br-
- PDF + ePub 98 pkt
(50,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
An overview of the Healthcare Industry and Applications of the Blockchain Key Features Includes graphical representations and architecture schematics for healthcare processes powered by the blockchain technology. Real-world examples of how medical and pharma companies can use a blockchain in healthcare. Includes algorithms and procedures for sm-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This book will take you through the latest version of Kali Linux to help you efficiently deal with crucial security aspects such as confidentiality, integrity, availability, and access control.-
- PDF + ePub 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
In this paper, we focus on those aspects of cybersecurity that are most relevant to universities, intending to provide academic communities with some knowledge that might be useful in their research, education and administration activities related to cybersecurity. The remaining part of the paper is organised as follows. In Section 2, we p(30,00 zł najniższa cena z 30 dni)
25.50 zł
30.00 zł (-15%) -
-
Promocja
Building and securely deploying container-based applications with Docker and Kubernetes using open source tools. Key Features Real-world examples of vulnerability analysis in Docker containers. Includes recommended practices for Kubernetes and Docker with real execution of commands. Includes essential monitoring tools for Docker containers and-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
This book will guide you in improving your security posture and building robust and predictable security operations. You'll learn to design processes for the changing landscape of security operations, from designing defensive architectures to passive defense, blue and purple teaming, threat intelligence agility, measuring business values, and more.-
- PDF + ePub 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
Veeam provides data protection for modern-day technical organizations. This book takes you through installation best practices, optimizations, and the 3-2-1-1-0 rule, before going on to examine repository and proxy-related topics and advanced concepts such as CDP, extended object storage support, Veeam ONE enhancement, and Orchestrator.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
A good security posture is essential for an organization's Microsoft 365 tenant. This book will help you to understand how you can design and implement Information Protection within Microsoft 365 to protect your digital estate, on-premises as well as on SaaS platforms.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Use Microsoft’s own intelligent security service that brings together cloud security and AI to protect your organization. Microsoft Sentinel in Action will help you to gain enough understanding to make the most of Azure services and secure your environment against modern cybersecurity threats.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
This book is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.-
- PDF + ePub 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!-
- PDF + ePub 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Zabezpieczenie cyfrowe jest ważną częścią reakcji na incydenty pośmiertne i gromadzenia dowodów. Cyfrowi śledczy gromadzą, przechowują i zarządzają dowodami cyfrowymi w celu wsparcia spraw cywilnych i karnych takich jak: badanie naruszenia zasad organizacyjnych; rozstrzyganie sporów czy analizowanie cyberataków. Książka Metody zabezpieczenia cyfro- ePub + Mobi 87 pkt
(66,90 zł najniższa cena z 30 dni)
87.20 zł
109.00 zł (-20%) -
Promocja
Encyclopedia on Blockchain for beginners and experts alike Key Features Includes the basics of Blockchain Comparative study of public Blockchains (Ethereum, Hashgraph, Cardano, Algorand, Solana etc.) Comparison of interoperable Blockchains (Polkadot vs. Cosmos vs. Polygon). Comparison of private permissioned DLTs (Fabric vs. R3 Corda vs. Quoru-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.-
- PDF + ePub 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
CISM is a globally recognized and much sought-after certification in the field of IT security. CISM Certification Guide is aligned with the latest edition of the CISM Review Manual and offers you complete, up-to-date coverage of CISM exam content so you can take the exam with confidence, fully equipped to pass the first time.-
- PDF + ePub + Mobi 206 pkt
(106,90 zł najniższa cena z 30 dni)
206.10 zł
229.00 zł (-10%) -
-
Promocja
Penetration Testing Azure for Ethical Hackers provides in-depth explanations of common security issues in Azure environments and tutorials on how to set up a pentesting lab and execute attacks on Azure assets. It will help you gain a deeper understanding of how Azure environments are configured, and more importantly, how they can be misconfigured.-
- PDF + ePub + Mobi 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps penetration testers set up persistence and facilitates lateral movement. This book is a one-of-a-kind resource that covers both the theoretical foundations and a range of privilege escalation techniques and tools for both Windows and Lin-
- PDF + ePub + Mobi 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Hands-On Dynamic Story Scripting with the ink Scripting Language shows you how to quickly move from learning the fundamentals of ink, the must-have narrative scripting language for games, to leveraging it to create everything from simple interactive stories to complex narrative-driven projects in Unity.-
- PDF + ePub + Mobi 98 pkt
(50,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
Security is a core component of any well-architected cloud environment and Azure is no different in this regard. With this book, you will learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environments and prepare to take the AZ-500 exam to validate your Azure security knowledge.-
- PDF + ePub + Mobi 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Internet jest wszędzie zajrzyj, poznaj wirtualny świat młodych i pytaj o wszystko! Obowiązkowa lektura dla rodziców dzieci w każdym wieku! Bo wszyscy jesteśmy online. Codziennie każdy z nas, niezależnie od wieku, spędza wiele czasu w Internecie. Młodzi ludzie dużo szybciej i sprawniej w nim buszują, a my rodzice, nauczyciele i opiekunowi- ePub + Mobi 27 pkt
(13,90 zł najniższa cena z 30 dni)
27.22 zł
34.90 zł (-22%) -
Promocja
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. Key Features Courseware and practice papers with solutions for C.E.H. v11. Includes hacking tools, social engineering techniques, and live exercises. Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing. Description The 'Certi-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Mart-
- ePub + Mobi 169 pkt
(112,90 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja
With Azure security, you can build a prosperous career in IT security. Key Features In-detail practical steps to fully grasp Azure Security concepts. Wide coverage of Azure Architecture, Azure Security services, and Azure Security implementation techniques. Covers multiple topics from other Azure certifications (AZ-303, AZ-304, and SC series).-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
This second edition of Industrial Cybersecurity is a practical guide to implementing a comprehensive and solid security program for the ICS environment. This book shows anyone new to industrial security or professionals looking to extend their industrial security posture how to effectively monitor their ICS environment.-
- PDF + ePub + Mobi 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Mastering Microsoft Endpoint Manager will teach you how to manage your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing a new and simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.-
- PDF + ePub + Mobi 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Identify vulnerabilities across applications, network and systems using simplified cybersecurity scripting Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. Includes powerful Python libraries to analyze the web-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by-
- ePub + Mobi 135 pkt
(89,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
-
Promocja
This book explores how Nmap is one of the most robust tools for network discovery and security auditing. You’ll focus on how you can use it to perform hundreds of different tasks, from OS detection and port scanning to advanced fingerprinting and vulnerability exploitation.-
- PDF + ePub + Mobi 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
e_3a0i/e_3a0i.mp3 e_3a0iCybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.-
- PDF + ePub + Mobi
- Audiobook MP3 80 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
(38,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł (-10%) -
-
Promocja
Blockchain technology continues to disrupt a wide variety of organizations, from small businesses to the Fortune 500. Today hundreds of blockchain networks are in production, including many built with Hyperledger Fabric. This practical guide shows developers how the latest version of this blockchain infrastructure provides an ideal foundation for d-
- ePub + Mobi 203 pkt
(135,90 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł (-15%) -
-
Promocja
Książka „Bezpieczny senior w Internecie” to poradnik, dedykowany nie tylko osobom starszym, ale również wszystkim czytelnikom bez względu na stopień zaawansowania informatycznego. Jest to kolejna pozycja po poprzednich tytułach naszego wydawnictwa: Smartfon, Laptop i Internet również dla seniora, które w podstawowy- PDF + ePub + Mobi 33 pkt
(33,25 zł najniższa cena z 30 dni)
33.75 zł
45.00 zł (-25%) -
Promocja
More practical less theory Key Features In-depth practical demonstration with multiple examples of reverse engineering concepts. Provides a step-by-step approach to reverse engineering, including assembly instructions. Helps security researchers to crack application code and logic using reverse engineering open source tools. Reverse engineerin-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
Perform effective and efficient penetration testing in an enterprise scenario Key Features Understand the penetration testing process using a highly customizable modular framework. Exciting use-cases demonstrating every action of penetration testing on target systems. Equipped with proven techniques and best practices from seasoned pen-testing-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja
Elastic security offers enhanced threat hunting capabilities to build active defense strategies. Complete with practical examples and tips, this easy-to-follow guide will help you enhance your security skills by leveraging the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting.-
- PDF + ePub + Mobi 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
Antivirus Bypass Techniques follows a unique approach that will help you explore the security landscape, understand the fundamentals of antivirus software, and put antivirus bypass techniques to use. This book will enable you to bypass antivirus software solutions in order to develop efficient antivirus software.-
- PDF + ePub + Mobi 98 pkt
(50,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja
This book focuses largely on different methodologies for connecting remote users, highlighting the benefits and drawbacks as well as step-by-step instructions. You’ll understand phishing prevention and log forwarding, and find a comprehensive section on troubleshooting common issues with the help of examples.-
- PDF + ePub + Mobi 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Get hands-on with practical ethical hacking from scratch using Python. With the help of step-by-step instructions and practical exercises, you'll develop tools that provide detailed insights into the ethical hacking thought process. This book also covers aspects of network and system hacking along with defense techniques.-
- PDF + ePub + Mobi 107 pkt
(54,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
If you’re a designer working with Revit, this Autodesk Revit book will guide you through improving productivity and efficiency in your day-to-day tasks. With the help of this book, you'll be able to set up your Revit projects, explore Revit's core functionalities, use Dynamo for visual programming, and leverage Power BI to analyze BIM inform-
- PDF + ePub + Mobi 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja
Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.-
- PDF + ePub + Mobi 134 pkt
(68,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja
e_39zn/e_39zn.mp3 e_39znBy taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the-
- PDF + ePub
- Audiobook MP3 116 pkt
(59,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja
Zscaler Cloud Security Essentials will show you how to leverage the power of Zscaler by jumping right into the design, deployment, and support of a customized Zscaler solution. You'll discover the capabilities of Zscaler through real-world deployment and explore Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) in detail.-
- PDF + ePub + Mobi 125 pkt
(64,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -


