Bezpieczeństwo systemów
W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Ebookpoint
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Java Programming for Beginners. Learn the fundamentals of programming with Java
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
DevOps Bootcamp. The fastest way to learn DevOps
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Practical OneOps. Implement DevOps with ease
-
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Accumulo. Application Development, Table Design, and Best Practices
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Effective Monitoring and Alerting. For Web Operations
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Monitoring
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
Computer Security Basics. 2nd Edition
-
Internet Forensics
-
Security and Usability. Designing Secure Systems that People Can Use
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Snort Cookbook
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Managing Security with Snort & IDS Tools
-
Security Warrior
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
RADIUS. Securing Public Access to Private Resources
-
Web Security, Privacy & Commerce. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Building Internet Firewalls. 2nd Edition
-
Rootkity. Sabotowanie jądra systemu Windows