eBooki
W kategorii eBooki znajdziesz książki w postaci elektronicznej, w formie PDF, ePub oraz mobi. Po zakupie e-booka będzie on dostępny w Bibliotece na koncie użytkownika. Książki przeczytasz na laptopie, tablecie, smartfonie lub czytniku ebooków (Kindle, Pocketbook, inkBOOK, Prestigio i innych). Więcej na temat wykorzystania i zabezpieczenia eBooków znajdziesz na stronie "Przewodnik po eBookach".
Ebooki dostępne w księgarni Ebookpoint
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Network Analysis using Wireshark Cookbook. This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
-
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques
-
Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition
-
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition
-
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Rust for Blockchain Application Development. Learn to build decentralized applications on popular blockchain technologies using Rust
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
-
Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition
-
Mastering AWS Security. Strengthen your cloud environment using AWS security features coupled with proven strategies - Second Edition
-
Head First. Python. Легкий для сприйняття довідник
-
Head First. Програмування на JavaScript. Head First. Програмування на JavaScript
-
CCSP (ISC)2 Certified Cloud Security Professional Exam Guide. Build your knowledge to pass the CCSP exam with expert guidance
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
-
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
-
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Mastering Blockchain
-
Ochrona danych osobowych. Poradnik dla przedsiębiorców
-
Packet Tracer for young beginning admins
-
Linux - bezpieczny komputer osobisty dla początkujących
-
Podstawy bezpieczeństwa w systemie Windows
-
Cyberbezpieczeństwo. Jak chronić się przed phishingiem, cyberstalkingiem, cardingiem, ransomware, hakowaniem, malware, cyberstalkingiem, kradzieżą tożsamości
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
Nowy malware. Jest się czego bać
-
Cyfrowe ślady. Jest się czego bać
-
Skanowanie sieci z Kali Linux. Receptury
-
Computer Networks in Packet Tracer for intermediate users
-
Computer Networks in Packet Tracer for advanced users
-
Packet Tracer for young intermediate admins
-
Packet Tracer for young advanced admins
-
Computer Networks in Packet Tracer for beginners
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Identity-Native Infrastructure Access Management
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV
-
Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition
-
Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience