eBooki
W kategorii eBooki znajdziesz książki w postaci elektronicznej, w formie PDF, ePub oraz mobi. Po zakupie e-booka będzie on dostępny w Bibliotece na koncie użytkownika. Książki przeczytasz na laptopie, tablecie, smartfonie lub czytniku ebooków (Kindle, Pocketbook, inkBOOK, Prestigio i innych). Więcej na temat wykorzystania i zabezpieczenia eBooków znajdziesz na stronie "Przewodnik po eBookach".
Ebooki dostępne w księgarni Ebookpoint
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Hacker Culture A to Z
-
Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Data Governance: The Definitive Guide
-
Modern Data Protection
-
Linux - bezpieczny komputer osobisty dla początkujących
-
Podstawy bezpieczeństwa w systemie Windows
-
Building an Anonymization Pipeline. Creating Safe Data
-
Container Security. Fundamental Technology Concepts that Protect Containerized Applications
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Threat Modeling
-
Platformy integracyjne Zagadnienia wybrane
-
97 Things Every SRE Should Know
-
Rootkity i Bootkity
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
97 Things Every Information Security Professional Should Know
-
Hacking Kubernetes
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Building Internet Firewalls. 2nd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Database Nation. The Death of Privacy in the 21st Century
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
ScreenOS Cookbook
-
Hacking: The Next Generation. The Next Generation
-
Snort Cookbook
-
Linux Security Cookbook
-
Managing Security with Snort & IDS Tools
-
Beautiful Security. Leading Security Experts Explain How They Think
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Security Monitoring
-
Practical UNIX and Internet Security. 3rd Edition
-
Security Warrior
-
Web Security, Privacy & Commerce. 2nd Edition
-
Accumulo. Application Development, Table Design, and Best Practices
-
Internet Forensics
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Programming .NET Security
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Security Power Tools
-
Security and Usability. Designing Secure Systems that People Can Use
-
Effective Monitoring and Alerting. For Web Operations
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Consul: Up and Running
-
Security Chaos Engineering
-
Identity-Native Infrastructure Access Management
-
Software Supply Chain Security
-
Zero Trust Networks. 2nd Edition
-
Hands-On Differential Privacy
-
Defensive Security Handbook. 2nd Edition
-
Digital Identity
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition
-
Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II