eBooki
W kategorii eBooki znajdziesz książki w postaci elektronicznej, w formie PDF, ePub oraz mobi. Po zakupie e-booka będzie on dostępny w Bibliotece na koncie użytkownika. Książki przeczytasz na laptopie, tablecie, smartfonie lub czytniku ebooków (Kindle, Pocketbook, inkBOOK, Prestigio i innych). Więcej na temat wykorzystania i zabezpieczenia eBooków znajdziesz na stronie "Przewodnik po eBookach".
Ebooki dostępne w księgarni Ebookpoint
-
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
125 sposobów na bezpieczeństwo sieci. Wydanie II
-
Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition
-
Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation
-
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing
-
Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
-
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Bezpieczeństwo systemów informatycznych. Zasady i praktyka. Wydanie IV. Tom 2
-
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness
-
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
Ransomware. Defending Against Digital Extortion
-
Network Security Assessment. Know Your Network. 3rd Edition
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Troubleshooting OpenVPN. Click here to enter text
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
The Cybersecurity Manager's Guide
-
Modern Data Protection
-
Monitorowanie aktywności użytkowników systemów komputerowych
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Digital Identity
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Network Security Assessment. Know Your Network
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Building Internet Firewalls. 2nd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Database Nation. The Death of Privacy in the 21st Century
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Network Security Hacks. 2nd Edition
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
ScreenOS Cookbook
-
Hacking: The Next Generation. The Next Generation
-
Snort Cookbook
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Managing Security with Snort & IDS Tools
-
Beautiful Security. Leading Security Experts Explain How They Think
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Security Monitoring
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Security Warrior
-
Web Security, Privacy & Commerce. 2nd Edition
-
Accumulo. Application Development, Table Design, and Best Practices
-
Internet Forensics
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Security Power Tools
-
Effective Monitoring and Alerting. For Web Operations
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Practical Cloud Native Security with Falco
-
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting
-
Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners