eBooki
W kategorii eBooki znajdziesz książki w postaci elektronicznej, w formie PDF, ePub oraz mobi. Po zakupie e-booka będzie on dostępny w Bibliotece na koncie użytkownika. Książki przeczytasz na laptopie, tablecie, smartfonie lub czytniku ebooków (Kindle, Pocketbook, inkBOOK, Prestigio i innych). Więcej na temat wykorzystania i zabezpieczenia eBooków znajdziesz na stronie "Przewodnik po eBookach".
Ebooki dostępne w księgarni Ebookpoint
-
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II
-
Archiwizacja i odzyskiwanie danych
-
Google hacking. Jak szukać w Google, aby zarabiać pieniądze, budować biznes i ułatwić sobie pracę
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition
-
Head First. Python. Легкий для сприйняття довідник
-
Head First. Програмування на JavaScript. Head First. Програмування на JavaScript
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Cyberbezpieczeństwo. Jak chronić się przed phishingiem, cyberstalkingiem, cardingiem, ransomware, hakowaniem, malware, cyberstalkingiem, kradzieżą tożsamości
-
Zaprojektuj bota. Tworzenie interfejsów konwersacyjnych
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Internet Rzeczy (IoT). Problemy cyberbezpieczeństwa
-
Computer Security Basics. 2nd Edition
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Network Security Hacks. 2nd Edition
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Linux Security Cookbook
-
Managing Security with Snort & IDS Tools
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Hadoop Security. Protecting Your Big Data Platform
-
Security Monitoring
-
Practical UNIX and Internet Security. 3rd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Security Warrior
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
Web Security, Privacy & Commerce. 2nd Edition
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Sharing Big Data Safely. Managing Data Security
-
Essential PHP Security
-
Programming .NET Security
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Security Power Tools
-
Security and Usability. Designing Secure Systems that People Can Use
-
Hackers & Painters. Big Ideas from the Computer Age
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Network Security Assessment. Know Your Network
-
Java Security. 2nd Edition
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking