eBooki
W kategorii eBooki znajdziesz książki w postaci elektronicznej, w formie PDF, ePub oraz mobi. Po zakupie e-booka będzie on dostępny w Bibliotece na koncie użytkownika. Książki przeczytasz na laptopie, tablecie, smartfonie lub czytniku ebooków (Kindle, Pocketbook, inkBOOK, Prestigio i innych). Więcej na temat wykorzystania i zabezpieczenia eBooków znajdziesz na stronie "Przewodnik po eBookach".
Ebooki dostępne w księgarni Ebookpoint
-
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Jak działa oprogramowanie? Tajemnice komputerowych mechanizmów szyfrowania, obrazowania, wyszukiwania i innych powszechnie używanych technologii
-
Jak pozostać anonimowym w sieci
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Kali Linux. Testy penetracyjne. Wydanie II
-
Kali Linux. Testy penetracyjne. Wydanie III
-
Kontenery. Bezpieczne wdrożenia. Podstawowe koncepcje i technologie
-
Metasploit. Receptury pentestera. Wydanie II
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Podstawy ochrony komputerów
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
-
Ukryta tożsamość. Jak się obronić przed utratą prywatności
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Bezpieczne programowanie. Aplikacje hakeroodporne
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Linux - bezpieczny komputer osobisty dla początkujących
-
Podstawy bezpieczeństwa w systemie Windows
-
Skanowanie sieci z Kali Linux. Receptury
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Identity-Native Infrastructure Access Management
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition
-
Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience