Hacking
W kategorii Hacking zebrano publikacje dotyczące nie tylko hackerów, crackerów i ich technik działania, ale także opisujące różne aspekty bezpieczeństwa komputerów i danych na nich przechowywanych. Poznacie technikę przeprowadzania audytów bezpieczeństwa oraz sposoby zabezpieczania się przed atakami hackerów, programami szpiegującymi czy zwykłą plagą wirusów.
Nauczycie się chronić nie tylko poszczególne komputery ale całe sieci komputerowe przez opracowanie i wdrożenie odpowiedniej polityki bezpieczeństwa, poprawne użycie firewalli czy odpowiednie skonfigurowanie serwerów pracujących pod Waszym nadzorem, a także opanujecie sposoby bezpiecznego surfowania po internecie.
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Ebookpoint
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
Enterprise Agility. Being Agile in a Changing World
-
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python
-
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Lean Product Management. Successful products from fuzzy business ideas
-
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js
-
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition
-
Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach
-
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters
-
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity
-
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Java Programming for Beginners. Learn the fundamentals of programming with Java
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Mastering AWS Security. Create and maintain a secure cloud ecosystem
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
DevOps Bootcamp. The fastest way to learn DevOps
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Practical OneOps. Implement DevOps with ease
-
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
Troubleshooting OpenVPN. Click here to enter text
-
Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition