Bezpieczeństwo systemów
W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Ebookpoint
-
Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Rootkity i Bootkity
-
Platformy integracyjne Zagadnienia wybrane
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Building an Anonymization Pipeline. Creating Safe Data
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Mastering Vim. Build a software development environment with Vim and Neovim
-
Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems
-
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale
-
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Kotlin Quick Start Guide. Core features to get you ready for developing applications
-
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux
-
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
Enterprise Agility. Being Agile in a Changing World
-
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python
-
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
-
Lean Product Management. Successful products from fuzzy business ideas
-
TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js
-
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters
-
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
-
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0