Hacking
W kategorii Hacking zebrano publikacje dotyczące nie tylko hackerów, crackerów i ich technik działania, ale także opisujące różne aspekty bezpieczeństwa komputerów i danych na nich przechowywanych. Poznacie technikę przeprowadzania audytów bezpieczeństwa oraz sposoby zabezpieczania się przed atakami hackerów, programami szpiegującymi czy zwykłą plagą wirusów.
Nauczycie się chronić nie tylko poszczególne komputery ale całe sieci komputerowe przez opracowanie i wdrożenie odpowiedniej polityki bezpieczeństwa, poprawne użycie firewalli czy odpowiednie skonfigurowanie serwerów pracujących pod Waszym nadzorem, a także opanujecie sposoby bezpiecznego surfowania po internecie.
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Ebookpoint
-
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
-
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Monitoring
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and
-
ScreenOS Cookbook
-
Security Power Tools
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Network Security Hacks. 2nd Edition
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
Essential PHP Security
-
Internet Forensics
-
Security and Usability. Designing Secure Systems that People Can Use
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Snort Cookbook
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Managing Security with Snort & IDS Tools
-
Hackers & Painters. Big Ideas from the Computer Age
-
Network Security Assessment. Know Your Network
-
Security Warrior
-
Secure Programming Cookbook for C and C++. Recipes for Cryptography, Authentication, Input Validation & More
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Java Security. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition
-
Bezpieczeństwo sieci w Linuksie. Wykrywanie ataków i obrona przed nimi za pomocą iptables, psad i fwsnort
-
Rootkity. Sabotowanie jądra systemu Windows
-
Niewidzialny w Sieci. Sztuka zacierania śladów