eBooki
W kategorii eBooki znajdziesz książki w postaci elektronicznej, w formie PDF, ePub oraz mobi. Po zakupie e-booka będzie on dostępny w Bibliotece na koncie użytkownika. Książki przeczytasz na laptopie, tablecie, smartfonie lub czytniku ebooków (Kindle, Pocketbook, inkBOOK, Prestigio i innych). Więcej na temat wykorzystania i zabezpieczenia eBooków znajdziesz na stronie "Przewodnik po eBookach".
Ebooki dostępne w księgarni Ebookpoint
-
Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Bezpieczeństwo systemów informatycznych firm i instytucji
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
Practical Data Privacy
-
Informatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym
-
Cyberwalka
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Inżynieria zabezpieczeń Tom I
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Nowoczesna kryptografia. Praktyczne wprowadzenie do szyfrowania
-
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Audyt bezpieczeństwa informacji w praktyce
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Bezpieczne programowanie. Aplikacje hakeroodporne
-
Bezpieczeństwo sieci w Pythonie. Rozwiązywanie problemów za pomocą skryptów i bibliotek. Wydanie II
-
Black Hat Python. Język Python dla hakerów i pentesterów
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Ransomware. Defending Against Digital Extortion
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II
-
Jak pozostać anonimowym w sieci
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Kali Linux. Testy penetracyjne. Wydanie II
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
-
Podstawy ochrony komputerów
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure