Hacking
W kategorii Hacking zebrano publikacje dotyczące nie tylko hackerów, crackerów i ich technik działania, ale także opisujące różne aspekty bezpieczeństwa komputerów i danych na nich przechowywanych. Poznacie technikę przeprowadzania audytów bezpieczeństwa oraz sposoby zabezpieczania się przed atakami hackerów, programami szpiegującymi czy zwykłą plagą wirusów.
Nauczycie się chronić nie tylko poszczególne komputery ale całe sieci komputerowe przez opracowanie i wdrożenie odpowiedniej polityki bezpieczeństwa, poprawne użycie firewalli czy odpowiednie skonfigurowanie serwerów pracujących pod Waszym nadzorem, a także opanujecie sposoby bezpiecznego surfowania po internecie.
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Ebookpoint
-
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
OpenStack Cloud Security. Your OpenStack cloud storage contains all your vital computing resources and potentially sensitive data – secure it with this essential OpenStack tutorial
-
Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps
-
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
Learning Digital Identity
-
Testowanie bezpieczeństwa aplikacji internetowych. Receptury
-
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
OpenBSD. Tworzenie firewalli za pomocą PF
-
Web Application Security. 2nd Edition
-
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Packet Tracer for young intermediate admins
-
Packet Tracer for young advanced admins
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Bezpieczny Senior w Internecie
-
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
Bezpieczeństwo w chmurze
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Practical Cloud Security. 2nd Edition
-
Security Chaos Engineering
-
Hacking Kubernetes
-
Hacker Culture A to Z
-
Container Security. Fundamental Technology Concepts that Protect Containerized Applications
-
The Cybersecurity Manager's Guide
-
Practical Fraud Prevention
-
Data Governance: The Definitive Guide
-
97 Things Every Information Security Professional Should Know
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Practical Data Privacy
-
Network Security Assessment. Know Your Network. 3rd Edition
-
Practical Cloud Native Security with Falco
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
-
Modern Data Protection
-
97 Things Every SRE Should Know
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Secure Programming Cookbook for C and C++. Recipes for Cryptography, Authentication, Input Validation & More
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Building Internet Firewalls. 2nd Edition
-
Kali Linux. Testy penetracyjne
-
Cyberjutsu
-
Consul: Up and Running
-
Mastering Blockchain
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Linux Security Cookbook
-
Dziecko w sieci
-
Joomla! Zabezpieczanie witryn
-
Archiwizacja i odzyskiwanie danych
-
Profesjonalne tworzenie kopii zapasowych i odzyskiwanie danych
-
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Identity-Native Infrastructure Access Management
-
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition
-
Як не стати овочем. Інструкція з виживання в інфопросторі
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego
-
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing
-
Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Identity and Data Security for Web Development. Best Practices
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
Effective Monitoring and Alerting. For Web Operations
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Hacking: The Next Generation. The Next Generation
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Security Power Tools
-
Network Security Hacks. 2nd Edition
-
Computer Security Basics. 2nd Edition
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
RADIUS. Securing Public Access to Private Resources
-
Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń
-
Bezpieczeństwo urządzeń mobilnych. Receptury
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
-
Bezpieczeństwo w sieci
-
Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition
-
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Strategie cyberbezpieczeństwa współczesnego świata
-
System bezpieczeństwa w cyberprzestrzeni RP
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
Head First. Python. Легкий для сприйняття довідник
-
Head First. Програмування на JavaScript. Head First. Програмування на JavaScript
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals