Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Ebookpoint
-
Promocja Promocja 2za1
This book covers the fundamentals of Windows 365 and Azure Virtual Desktop, addressing endpoint security challenges. You’ll also explore advanced security measures for virtual environments.-
- PDF + ePub 125 pkt
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
This book will help you understand key security principles and how they are implemented with Spring Security. You'll also gain an in-depth understanding of Spring Security's new features applied to servlet and reactive Spring applications.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja Promocja 2za1
Introduction to Kali Purple combines red and blue team tools in a single computing environment that allows both the setup and testing of a miniature security operations center, from setting up a SIEM environment to automation, all in one location.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Master Kali Linux and become an ethical hacker Key Features Beginner-friendly step-by-step instruction. Hands-on labs and practical exercises. Covers essential tools and techniques. Description This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, expl-
- ePub + Mobi 89 pkt
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
As technology continues to advance and more business is conducted online, the potential attack surface increases exponentially and the need for strong application security measures become more and more crucial. This goes double for any organization that handles sensitive personal or financial information which is usually subject to government regul-
- ePub + Mobi 143 pkt
(29,90 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł (-15%) -
-
Promocja Promocja 2za1
Strengthening networks, redefining security: ELK Stack leading the charge Key Features This book provides a thorough examination of zero trust network architecture, ELK Stack, and Elastic Security, encompassing foundational principles and practical deployment strategies. Readers gain practical insights into building resilient zero trust network-
- ePub + Mobi 89 pkt
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja 2za1
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki 1) STRATEGIE CYBERBEZPIECZEŃSTWA WSPÓŁCZESNEGO ŚWIATA Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko,- PDF + ePub + Mobi 92 pkt
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna Badźmirowska-Masłowska
-
Promocja 2za1
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI - Pakiet 2 książki 1) MODELE ROZWIĄZAŃ PRAWNYCH W SYSTEMIE CYBERBEZPIECZEŃSTWA RP Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania- PDF + ePub + Mobi 103 pkt
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Sylwia Gliwa
-
Promocja Promocja 2za1
The book is designed for a practical approach to learning, with examples based on scenarios. It covers possible OSINT blueprints from the beginning to an advanced level Key Features Learn about OSINT and how to set up an OSINT environment for investigations. Master techniques for tracking fraud SMS and investigating emails. Explore reverse ima-
- ePub + Mobi 89 pkt
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja 2za1
SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO - Pakiet 2 książki 1) BEZPIECZEŃSTWO NARODOWE. TEORIA I PRAKTYKA Najnowsza książka profesora Waldemara Kitlera to z pewnością jego opus vitae. Być może spośród wielu znakomitych monografii naukowych, które napisał, podsumowuje jego wielki dorobek naukowy w zakresie polskiej myśli o be- PDF + ePub + Mobi 100 pkt
-
Promocja Promocja 2za1
This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes?This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioner-
- ePub + Mobi 160 pkt
(29,90 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł (-15%) -
-
Promocja Promocja 2za1
Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitati-
- ePub + Mobi 228 pkt
(29,90 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł (-15%) -
-
Promocja 2za1
Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania oraz zwalczania niebezpiecznych zachowań w cyberprzestrzeni. Wyzwaniem badawczym stały się także relacje pomiędzy systemem cyberbezpieczeństwa a- PDF + ePub + Mobi 58 pkt
-
Promocja Promocja 2za1
Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów społecznościowych, które umożliwiają organizacjom terrorystycznym docieranie do odbiorców na masową skalę, przy czym kr- PDF + ePub + Mobi 9 pkt
(24,90 zł najniższa cena z 30 dni)
9.90 zł
50.00 zł (-80%) -
Promocja Promocja 2za1
This book helps you build your own blockchains and production-grade decentralized apps on blockchains like Ethereum, Solana, NEAR, and Polkadot. You’ll explore best practices, code, and assets that can be used for scaffolding multiple projects.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja Promocja 2za1
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
Ready to become a cloud security champion? This practical guide, written by a seasoned cybersecurity and AWS cloud consultant, equips you with the tools and strategies you need to achieve secure, compliant, and cost-effective AWS operations.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja 2za1
Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działan- PDF + ePub + Mobi 39 pkt
-
Promocja Promocja 2za1
Fortify your mobile world: Discover cutting-edge techniques for mobile security testing KEY FEATURES Learn basic and advanced penetration testing with mobile devices. Learn how to install, utilize, and make the most of Kali NetHunter. Design and follow your cybersecurity career path. DESCRIPTION Mobile devices are vital in our lives, so secu-
- ePub + Mobi 89 pkt
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja 2za1
Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji- PDF + ePub + Mobi 58 pkt
System bezpieczeństwa w cyberprzestrzeni RP
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska
-
Promocja Promocja 2za1
Facing cyber threats and compliance challenges? Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies to defend against cyber threats and secure cloud, hybrid, and on-premises environments.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.-
- PDF + ePub 152 pkt
(29,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł (-10%) -
-
Promocja Promocja 2za1
This practical guide to implementing DeFi in your projects guides you through building full-stack DeFi solutions with popular tools and teaches you how to leverage blockchain technologies to manage crypto assets.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja Promocja 2za1
JaagoTeens cyber safety guide KEY FEATURES Making digital payments without being scammed and losing your money. Learning how to file a complaint with the cyber police if something goes wrong. Get some easy tips to ensure that your kids stay safe on the internet. DESCRIPTION This book is a step-by-step guide that handholds you through all the-
- ePub + Mobi 89 pkt
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
Whether you're a beginner or a seasoned security professional, this practical guide will equip you with the knowledge and skills to build a robust, proactive, and resilient security posture for your organization with Microsoft's XDR and SIEM.-
- PDF + ePub 143 pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł (-10%) -
-
Promocja Promocja 2za1
Learn to decode the Cyber Mysteries by Mastering Network Forensics KEY FEATURES Master all essential network forensics topics with in-depth coverage. Learn from real-world examples and detailed case studies. Gain hands-on experience with network forensic tools and techniques. DESCRIPTION Network forensics is a rapidly growing field with a hi-
- ePub + Mobi 89 pkt
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth-
- ePub + Mobi 186 pkt
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja Promocja 2za1
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.-
- PDF + ePub 71 pkt
(29,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes-
- ePub + Mobi 160 pkt
(29,90 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł (-15%) -
-
Promocja Promocja 2za1
The comprehensive yet concise guide offers secure practices for handling sensitive data payloads, including credentials, certificates, and tokens, enabling secure access to and from your organization's resources for apps running on Kubernetes.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
This comprehensive guide covers a range of topics in cloud security with a practical focus on providing valuable insights and skills to enable you to secure multi-cloud environments effectively.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Wireshark: A hackers guide to network insights KEY FEATURES Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. DESCRIPTION Ethical Hacking and Network Analysis with Wires-
- ePub + Mobi 89 pkt
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you'll be able to shift security toward the left, enabling you to merge security into coding in no time.-
- PDF + ePub 85 pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
-
Promocja Promocja 2za1
Unveiling the future: Navigating AI's Intricate Intersection with International Law A Journey Beyond Hype and Governance KEY FEATURES Comprehensive overview of AI ethics and international law. Exploration of pragmatic approaches to AI governance. Navigation of global legal dynamics. Soft law recommendations for responsible AI development. D-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
The Essential Guide to Web3 serves as a gateway to the decentralized web—also known as the decentralized internet—to enable you to embark on an immersive journey into the fascinating world of Web3. With brief overviews of the blockchain and the Ethereum ecosystem at the outset, this book quickly immerses you in practical blockchain ap-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja Promocja 2za1
The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja Promocja 2za1
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Learn how to leverage DevSecOps to secure your modern enterprise in the cloud KEY FEATURES Explore DevSecOps principles, fundamentals, practices, and their application in AWS environments comprehensively and in-depth. Leverage AWS services and tools to enhance security within your DevSecOps pipeline, gaining deep insights. Implement DevSecOps-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, gr-
- ePub + Mobi 135 pkt
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
-
Promocja Promocja 2za1
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.-
- PDF + ePub 170 pkt
(29,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł (-10%) -
-
Promocja Promocja 2za1
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud environments running on AWS, Azure, and GCP. In addition to these, you will explore a number of practical strategies on how to manage the complexity, cost, and security risks involved when setting up vulnerable cloud lab environments.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure-
- ePub + Mobi 135 pkt
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
-
Promocja Promocja 2za1
Attacking and Exploiting Modern Web Attacks will help you understand how to identify attack surfaces and detect vulnerabilities. This book takes a hands-on approach to implementation and associated methodologies and equips you with the knowledge and skills needed to effectively combat web attacks.-
- PDF + ePub 134 pkt
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja Promocja 2za1
Reconnaissance for Ethical Hackers provides highly contextual real-world techniques used by threat actors, ethical hackers, and pentesters to collect valuable information about organizations that can be used for future attacks and operations. This book will help you develop the ethical hacking skills needed to successfully perform reconnaissance.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
The definitive guide to installing and configuring IBM FileNet Information Management software KEY FEATURES Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboar-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.-
- PDF + ePub 134 pkt
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja Promocja 2za1
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) KEY FEATURES Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.-
- PDF + ePub 85 pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
-
Promocja Promocja 2za1
A comprehensive guide to Kubernetes, Service Mesh, and Zero-Trust principles KEY FEATURES Delve into security practices that guarantee resilience and secure deployments. Discover strategies for managing Kubernetes clusters, enhancing performance, and achieving high availability and scalability. Acquire a conceptual understanding of the challen-
- ePub + Mobi 89 pkt
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
Hacking jest w tym tomie rozpatrywany z różnych perspektyw, jako: przestępstwo, incydent cyberbezpieczeństwa, eksplorowanie i modyfikowanie systemów technicznych, społecznych i biologicznych, a najogólniej - jako przełamywanie zabezpieczeń.(203,15 zł najniższa cena z 30 dni)
198.37 zł
239.00 zł (-17%) -
Promocja Promocja 2za1
Through this book, you’ll learn to administer core and advanced Windows Server and Infrastructure-as-a-Service workloads utilizing the available - on-premises, hybrid, and cloud technologies. All the skills you acquire will prepare you to ace the AZ-801: Configuring Windows Server Hybrid Advanced Services Exam.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti-
- ePub + Mobi 186 pkt
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja Promocja 2za1
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.-
- PDF + ePub 85 pkt
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
-
Promocja Promocja 2za1
This practical guide will help developers working with networking technologies such as CSMA, P2P, Wi-Fi, Wi-Fi 6, and LTE to perform advanced network simulations using ns-3. This book provides a hands-on approach to evaluating useful test scenarios of wired, Wi-Fi, LTE networks in the context of real-time deployments and research activities.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledger technology, cryptocurrencies, and blockchain platforms such as Ethereum, Solana, and Bitcoin. With updates on new concepts like privacy, scalability, and DeFi, this book will help keep your knowledge and skills up to date.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What-
- ePub + Mobi 186 pkt
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja Promocja 2za1
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja Promocja 2za1
Crack a ransomware by identifying and exploiting weaknesses in its design KEY FEATURES Get an overview of the current security mechanisms available to prevent ransomware digital extortion. Explore different techniques to analyze a ransomware attack. Understand how cryptographic libraries are misused by malware authors to code ransomwares. DES-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
This book provides a security baseline to reduce the risk of future attacks. The chapters will teach you how to secure your Windows endpoint, protect devices with Microsoft Defender, and secure hybrid workloads using Azure Arc, enabling you to protect your infrastructure, network, and data with the help of SASE and the Zero Trust model.-
- PDF + ePub 98 pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł (-10%) -
-
Promocja Promocja 2za1
The book: “PACKET TRACER FOR YOUNG BEGINNING ADMINS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configu-
- PDF + ePub + Mobi 96 pkt
Packet Tracer for young beginning admins
Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek Smyczek
(70,95 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja Promocja 2za1
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title.-
- PDF + ePub + Mobi 96 pkt
(70,95 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja Promocja 2za1
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR ADVANCED USERS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations-
- PDF + ePub + Mobi 96 pkt
(70,95 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja Promocja 2za1
The book: “PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors ha-
- PDF + ePub 96 pkt
(70,95 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja Promocja 2za1
The book: “PACKET TRACER FOR YOUNG ADVANCED ADMINS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations were prepared-
- PDF + ePub 96 pkt
(70,95 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja Promocja 2za1
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of-
- PDF + ePub + Mobi 96 pkt
Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(70,95 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł (-25%) -
-
Promocja Promocja 2za1
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
The Executive’s Cybersecurity Program Handbook helps you perform internal assessments to drive strategic cybersecurity program development and evaluate risk within an organization. With this book, you’ll be able to build an incident response team and implement administrative and technical security controls.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark KEY FEATURES Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja 2za1
W książce omówiono zagadnienia dotyczące ochrony danych osobowych w różnych służbach mundurowych. Pozycja skierowana jest do wykładowców i studentów szkół wyższych o kierunku bezpieczeństwo wewnętrzne. Będzie również przydatna dla wszystkich osób zainteresowanych tematyką ochrony danych osobowych.- PDF + ePub + Mobi 100 pkt
-
Promocja Promocja 2za1
This book is a guide to help security professionals learn about the process of discovering and publishing vulnerabilities in software. They'll learn how to build and execute winning vulnerability research strategies and disclosure methods and find out exactly how to claim credit for their work by opening CVEs and sharing their research publicly.-
- PDF + ePub 89 pkt
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.-
- PDF + ePub 85 pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
-
Promocja Promocja 2za1
The go-to guide for building non-fungible token projects on the Ethereum blockchain KEY FEATURES Get an in-depth understanding of digital assets and crypto-collectables. Learn to create, test, and launch an ERC-721 token contract on the Ethereum testnet. Uncover effective ways to market and promote your NFTs on social media platforms. DESCRIP-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
Combating Crime on the Dark Web gives you a deep understanding of how criminal elements operate on the dark web and how you can strategize and use various tools to disrupt those operations. If you’re looking to pave your way to an exciting and rewarding career in crime prevention, this book is a must-read.-
- PDF + ePub 85 pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł (-10%) -
-
Promocja Promocja 2za1
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
DevSecOps in Practice with VMware Tanzu is a comprehensive learning reference covering the best-in-class tools that will aid in enhancing developer productivity, operational efficiency, and intrinsic security. This book will help you in laying out the easiest path to production for apps built to run in multi-cloud Kubernetes environments.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
e_39t1/e_39t1.mp3 e_39t1Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve read this book, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives with ease.-
- PDF + ePub
- Audiobook MP3 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
A Guide to Enter the Journey of a Digital Forensic Investigator KEY FEATURES Provides hands-on training in a forensics lab, allowing learners to conduct their investigations and analysis. Covers a wide range of forensics topics such as web, email, RAM, and mobile devices. Establishes a solid groundwork in digital forensics basics including evi-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
e_39wb/e_39wb.mp3 e_39wbThis book will prepare cybersecurity professionals for the SC-100 exam while also helping them build a strong foundation for implementing the strategies they learn. A mixture of theoretical and practical knowledge, as well as practice questions and a mock exam will ensure you're confident to take the exam.-
- PDF + ePub
- Audiobook MP3 197 pkt
(29,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł (-10%) -
-
Promocja Promocja 2za1
e_39wq/e_39wq.mp3 e_39wqAs hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.-
- PDF + ePub
- Audiobook MP3 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
e_3a91/e_3a91.mp3 e_3a91This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, you’ll learn how cloud evolution affected identity strategy within the enterprise.-
- PDF + ePub
- Audiobook MP3 89 pkt
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.-
- PDF + ePub 170 pkt
(29,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł (-10%) -
-
Promocja Promocja 2za1
Cyber anonymity is very essential as most devices, applications, and browsers collect information on every single activity that you perform in cyberspace. This book helps you understand the importance of cyber anonymity and you will learn techniques that will help you perform tasks without disclosing your information.-
- PDF + ePub 89 pkt
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. Extensive coverage of Android and iO-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
The CompTIA Network+ Certification Guide makes the most complex Network+ concepts easy to understand despite having no prior knowledge. It offers exam tips in every chapter along with access to practical exercises and an exam checklist that map to the exam objectives. Moreover, it is the perfect study guide to help you confidently pass the CompTIA-
- PDF + ePub 152 pkt
(29,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł (-10%) -
-
Promocja Promocja 2za1
Digital transformation of enterprises and hybrid multi-cloud adoption pose many security challenges. This book presents useful security patterns that discuss the problem context and solution. You’ll receive clear guidance on implementation and best practices for securing infrastructure, protecting data and providing continuous security and c-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
This guide to SASE services is for those implementing SD-WAN, SASE, cloud infrastructure, remote access, or integrating a multi-cloud strategy that may or may not include edge computing solutions. This book shows the past, present, and future of SASE and how you can learn today and prepare for the future.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
This book will help you discover the powerful capabilities of Dapr by implementing a sample application with microservices leveraging all the building blocks. Throughout the book, you’ll find out how Dapr helps you simplify the creation of resilient and portable microservices.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
e_3a8s/e_3a8s.mp3 e_3a8sThis comprehensive guide will aid the C-suite and executives in understanding the necessity of cyber resilience in their organizations, self-assess their role in supporting their company’s cybersecurity program, and provide practical takeaways and insights on navigating their working relationship with the other C-suite counterparts.-
- PDF + ePub
- Audiobook MP3 134 pkt
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł (-10%) -
-
Promocja Promocja 2za1
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
Network Protocols for Security Professionals is a comprehensive guide that will take you through the basics of network security and help you get to grips with the network, network devices, and traffic analysis-based attacks. The book covers practical ways to attack and defend network protocols.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
Cybersecurity – Attack and Defense Strategies, Third Edition is a completely revised new edition of this bestselling book that covers the very latest security threats and defense strategies.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
Start your journey in this exciting Android app development world KEY FEATURES Start your Kotlin adventure from the very fundamentals to sophisticated Android programming. Experience live coding of a video application, game design, and chat application. Explore the Android framework, app creation, testing, and publication to the Google Play st-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
Security is a shared responsibility, and we must all own it KEY FEATURES Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components. Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams. Adopts a perspective of developing a Cybersecurity stra-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
Check Point Firewall Administration R81.10+ is for security administrators to develop the skills necessary for effective deployment and operation of Check Point firewalls or high availability clusters. This book will help you to improve network segmentation and implement airtight access control policies.-
- PDF + ePub 143 pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł (-10%) -
-
Promocja Promocja 2za1
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces-
- ePub + Mobi 169 pkt
(29,90 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja Promocja 2za1
Learn Wireshark provides an overview of protocol analysis. You’ll become more confident in navigating the interface while examining protocols such as TCP, IP, and ICMP. The book features tips on how to use display and capture filters, save, export, and share captures, create graphs, and become more proficient in troubleshooting latency issue-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
e_3a8p/e_3a8p.mp3 e_3a8pThis book will take you through some key cybersecurity job roles and teach you the important technical and behavioral questions that will help you pass the interview, land the job, and grow in your cybersecurity career.-
- PDF + ePub
- Audiobook MP3 170 pkt
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
Ken Underhill, Mari Galloway, Christophe Foulon, Tia Hopkins
(29,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł (-10%) -
-
Promocja Promocja 2za1
Microsoft Defender for Cloud is an infrastructure management system that enhances security status and provides threat protection of hybrid workloads in the cloud. Microsoft Defender for Cloud Cookbook provides comprehensive coverage of Microsoft Defender for Cloud features and capabilities as well as hands-on and implementation guides and examples.-
- PDF + ePub 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.-
- PDF + ePub 107 pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin by creating your very first app from the get-go. You’ll learn how to use it as a means to explore and understand the Honeycode development environment and concepts.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
e_3a0u/e_3a0u.mp3 e_3a0uThis easy-to-follow guide is for network and security professionals who want to learn how to use Palo Alto's Next Generation Firewall, and how it can be leveraged to gain deep insight into the traffic, applications and threats that traverse your network.-
- PDF + ePub
- Audiobook MP3 197 pkt
(29,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł (-10%) -
-
Promocja Promocja 2za1
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
This book will focus right from scratch on how to set up an environment and perform reverse engineering on iOS and Android mobile apps. The book takes you on a journey of exploring the internals of mobile apps, how they are built, and how to take each piece apart while trying to understand the internal working of the apps.-
- PDF + ePub 89 pkt
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł (-10%) -
-
Promocja Promocja 2za1
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam's objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.-
- PDF + ePub 197 pkt
(29,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł (-10%) -
-
Promocja Promocja 2za1
Discover security posture, vulnerabilities, and blind spots ahead of the threat actor KEY FEATURES Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning, Secure Code Review, and bypas-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
e_3a8v/e_3a8v.mp3 e_3a8vThis book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.-
- PDF + ePub
- Audiobook MP3 116 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł (-10%) -
-
Promocja Promocja 2za1
Mastering Cyber Intelligence provides critical knowledge that will help you stay ahead of adversaries and proactively protect your organization against known and unknown cyber threats. You'll build the security skills required to conduct effective threat intelligence, integrate it into operations, and identify gaps in security postures.-
- PDF + ePub 125 pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł (-10%) -
-
Promocja Promocja 2za1
Understand and Conduct Ethical Hacking and Security Assessments Key Features Practical guidance on discovering, assessing, and mitigating web, network, mobile, and wireless vulnerabilities. Experimentation with Kali Linux, Burp Suite, MobSF, Metasploit and Aircrack-suite. In-depth explanation of topics focusing on how to crack ethical hacking i-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
KEY FEATURES Learn how to defend industrial control systems from an attacking standpoint. Learn about industrial network protocols and threat hunting. Handling of tackle industrial cyber risks Develop offensive and defensive skills. DESCRIPTION In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used-
- ePub + Mobi 71 pkt
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł (-10%) -
-
Promocja Promocja 2za1
Memory forensics is a vital part of modern digital forensic examinations as threat actors have started using memory-based malware more often. This comprehensive guide focuses on the application of modern memory forensics techniques to detect hidden threats in memory and reconstruct user activity based on volatile data.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja Promocja 2za1
Over the past two decades, the booming ecommerce and fintech industries have become a breeding ground for fraud. Organizations that conduct business online are constantly engaged in a cat-and-mouse game with these invaders. In this practical book, Gilit Saporta and Shoshana Maraney draw on their fraud-fighting experience to provide best practices,-
- ePub + Mobi 169 pkt
(29,90 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Promocja Promocja 2za1
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.-
- PDF + ePub 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -


