14. Urodziny Ebookpoint - Wielkie Jesienne Książkobranie / DODATKOWY DZIEŃ PROMOCJI!
-
Nowość Promocja
Jeśli chodzi o cyberbezpieczeństwo, żadna firma nie jest bezpieczna. Pytanie, które należy sobie zadać, nie brzmi: czy zostaniemy zaatakowani? Odpowiedź na nie jest bowiem oczywista: tak, zostaniecie zaatakowani. Właściwe pytania są takie: Skąd będziemy wiedzieć, że zostaliśmy zaatakowani? Co wówczas zrobimy?- PDF + ePub + Mobi
- Druk 37 pkt
(39,50 zł najniższa cena z 30 dni)
37.89 zł
79.00 zł (-52%) -
Nowość Promocja
Książka, którą trzymasz w rękach, powstała z potrzeby zebrania w jednym miejscu najważniejszych zagadnień dotyczących sieci komputerowych i przedstawienia tej wiedzy w formie przystępnych odpowiedzi na konkretne pytania. Ten praktyczny przewodnik krok po kroku przeprowadzi Cię przez fundamenty działania współczesnych sieci komputerowych z uwzględni- PDF + ePub + Mobi
- Druk 39 pkt
(44,50 zł najniższa cena z 30 dni)
39.90 zł
89.00 zł (-55%) -
Promocja
Z tą książką krok po kroku zagłębisz się w metody OSINT, a także powiązane z nim zagadnienia natury prawnej i etycznej. Poznasz sposoby gromadzenia i analizowania informacji z wykorzystaniem wyszukiwarek, portali społecznościowych i innych zasobów internetowych. Zrozumiesz wagę anonimowości i technik gwarantujących bezpieczne poruszanie się po siec- PDF + ePub + Mobi
- Druk 31 pkt
(33,50 zł najniższa cena z 30 dni)
31.90 zł
67.00 zł (-52%) -
Promocja
Ta książka jest kompleksowym przewodnikiem po ciemnej stronie cyberbezpieczeństwa ― zapewni Ci wiedzę i umiejętności niezbędne do skutecznego zwalczania złośliwego oprogramowania. Nauczysz się poruszać wśród zawiłości związanych z tworzeniem złośliwego oprogramowania, a także dobrze poznasz techniki i strategie stosowane przez cyberprzestępcó- PDF + ePub + Mobi
- Druk 39 pkt
(44,50 zł najniższa cena z 30 dni)
39.90 zł
89.00 zł (-55%) -
Promocja
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’ll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities,-
- ePub + Mobi 29 pkt
(143,65 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul GrahamWe are living in the computer age, in a world increasingly designed and engineered by computer programmers and soft-
- ePub + Mobi 29 pkt
(55,24 zł najniższa cena z 30 dni)
29.90 zł
64.99 zł (-54%) -
-
Promocja
Jak bezpieczna jest nasza sieć? Najlepszym sposobem znalezienia odpowiedzi na to pytanie jest zaatakowanie jej. Ocena bezpieczeństwa sieci pokazuje narzędzia i techniki, których używają profesjonalni analitycy zabezpieczeń do identyfikowania i oszacowania ryzyka w sieciach instytucji rządowych, wojskowych i komercyjnych. Dzięki wiedzy i umiejętnośc(67,83 zł najniższa cena z 30 dni)
36.90 zł
79.80 zł (-54%) -
Promocja
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each-
- ePub + Mobi 29 pkt
(92,65 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Seria Krótki kurs to popularnonaukowe książki wydawane przez Oxford University Press, które w przystępny sposób przedstawiają szereg tematów z niemal każdej dziedziny. Omawiając z entuzjazmem fakty, analizy, perspektywy i nowe koncepcje autorzy-eksperci sprawiają, że tematy trudne stają się przystępne w lekturze. Krótki kurs. Kryptografia: o napi- ePub + Mobi 25 pkt
(35,20 zł najniższa cena z 30 dni)
25.90 zł
44.00 zł (-41%) -
Promocja
Real IT World to cykl publikacji przygotowanych przez specjalistów dla specjalistów, omawiający aktualne i ważne zagadnienia, hot tematy, nowe trendy, praktyczne case study, najważniejsze problemy i innowacje w świecie IT. Jest to odpowiedź na szybko zmieniający się rynek. Każdy numer tworzony jest przez wybitnych ekspertów-praktyków, którzy szybko- ePub + Mobi 31 pkt
(43,20 zł najniższa cena z 30 dni)
31.90 zł
54.00 zł (-41%) -
Promocja
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books-
- ePub + Mobi 29 pkt
(109,65 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is-
- ePub + Mobi 29 pkt
(92,65 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be-
- ePub + Mobi 29 pkt
(203,15 zł najniższa cena z 30 dni)
29.90 zł
239.00 zł (-87%) -
-
Promocja
Książka „Bezpieczny senior w Internecie” to poradnik, dedykowany nie tylko osobom starszym, ale również wszystkim czytelnikom bez względu na stopień zaawansowania informatycznego. Jest to kolejna pozycja po poprzednich tytułach naszego wydawnictwa: Smartfon, Laptop i Internet również dla seniora, które w podstawowy- PDF + ePub + Mobi 24 pkt
(33,55 zł najniższa cena z 30 dni)
24.90 zł
45.00 zł (-45%) -
Promocja
Remember the dawn of the internet or the advent of mobile computing and social media? Yet another digital revolution is now underway. Like its predecessors, blockchains are about to transform the way we live, work, and play, while disrupting entrenched industries and shattering conventional business models.This practical guide takes you past the hy-
- ePub + Mobi 29 pkt
(118,15 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX pl-
- ePub + Mobi 29 pkt
(186,15 zł najniższa cena z 30 dni)
29.90 zł
219.00 zł (-86%) -
-
Promocja
Najlepsze praktyki Nie ma tygodnia, byśmy nie usłyszeli o kolejnym wycieku danych klientów, przechwyconych numerach kart kredytowych lub kradzieży tożsamości. Znalezienie właściwego kompromisu pomiędzy wygodą użytkowania a bezpieczeństwem aplikacji lub witryny może być niezwykle trudne. Ta praktyczna książka pokazuje podejście nastawione na wyniki,(58,91 zł najniższa cena z 30 dni)
31.90 zł
69.30 zł (-54%) -
Promocja
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other informatio-
- ePub + Mobi 29 pkt
(84,92 zł najniższa cena z 30 dni)
29.90 zł
99.90 zł (-70%) -
-
Promocja
Wraz z rozwojem cyfryzacji, w tym m.in. intensywnego rozwoju Internetu Rzeczy, rośnie znaczenie automatyzacji procesów biznesowych oraz użycia inteligentnych systemów wspomagania decyzji z wykorzystaniem metod sztucznej inteligencji i technik zaawansowanej analizy danych. Ten bezsprzecznie ważny trend rozwojowy implikuje istotne zagrożenia i ryzyka- ePub + Mobi 37 pkt
(51,20 zł najniższa cena z 30 dni)
37.89 zł
64.00 zł (-41%) -
Promocja
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You’ll learn how to help protect your app no matter where it ru-
- ePub + Mobi 29 pkt
(143,65 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
Internet jest wszędzie zajrzyj, poznaj wirtualny świat młodych i pytaj o wszystko! Obowiązkowa lektura dla rodziców dzieci w każdym wieku! Bo wszyscy jesteśmy online. Codziennie każdy z nas, niezależnie od wieku, spędza wiele czasu w Internecie. Młodzi ludzie dużo szybciej i sprawniej w nim buszują, a my rodzice, nauczyciele i opiekunowi- ePub + Mobi 14 pkt
(27,22 zł najniższa cena z 30 dni)
14.90 zł
34.90 zł (-57%) -
Promocja
-
- PDF + ePub + Mobi 29 pkt
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
Christopher Duffy, Mohit Raj, Cameron Buchanan, Andrew Mabbitt, Terry Ip, Dave Mound, Benjamin May
(260,10 zł najniższa cena z 30 dni)
29.90 zł
289.00 zł (-90%) -
-
Promocja
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how you-
- ePub + Mobi 29 pkt
(143,65 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
This book will provide you with practical recipes to manage the build system using CMake. You will be taken through a series of task-based examples that demonstrate how to employ the CMake toolbox to build portable and modular code and to minimize the code complexity of the build infrastructure.-
- PDF + ePub + Mobi 29 pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
Use Microsoft’s own intelligent security service that brings together cloud security and AI to protect your organization. Microsoft Sentinel in Action will help you to gain enough understanding to make the most of Azure services and secure your environment against modern cybersecurity threats.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical solutions that you can implement right away.Id-
- ePub + Mobi 29 pkt
(72,24 zł najniższa cena z 30 dni)
29.90 zł
84.99 zł (-65%) -
-
Promocja
Cyberatak to dzisiaj jedno z poważniejszych zagrożeń dla biznesu, a przygotowanie firmy do ataku hakerów, który nieuchronnie nastąpi, to jedno z największych wyzwań dla kadry zarządzającej. Mimo że o cyberbezpieczeństwie mówi się dużo, komunikaty, które docierają do typowego menedżera, trudno przełożyć na konkretne działania zarządcze. Książka Zdą- ePub + Mobi 18 pkt
(50,62 zł najniższa cena z 30 dni)
18.90 zł
64.90 zł (-71%) -
Promocja
Wśród zagrożeń w cyberprzestrzeni szczególnie groźne jest zagrożenie cyberprzemocy – zagrożenie, które nie zawsze się dostrzega i wielokrotnie wręcz lekceważy, a które coraz częściej dotyka nas wszystkich. Najogólniej ujmując, cyberprzemoc możemy sprowadzić do prześladowania, zastraszania, szantażowania, nęk(21,25 zł najniższa cena z 30 dni)
14.90 zł
25.00 zł (-40%) -
Promocja
W skrypcie omówiono zagrożenia informacji i systemów teleinformatycznych, takich jak oprogramowanie złośliwe, cyberprzestępstwa i cyberterroryzm. Zaprezentowano różnorodne metody ochrony informacji przed zagrożeniami w cyberprzestrzeni, dzieląc je na metody administracyjno-organizacyjne, prawne i normalizacyjne, techniczne oraz fizyczne. Omówiono s(28,90 zł najniższa cena z 30 dni)
19.90 zł
34.00 zł (-41%) -
Promocja
Informacja jest strategicznym i biznesowym zasobem państwa i organizacji - dobrem i osiągnięciem, gwarantem postępu i rozwoju, ale niestety poza dobrem niesie ze sobą różnorodne zagrożenia. Powodem zdobywania i upowszechniania wiedzy na temat zagrożeń jest potrzeba budowy nowoczesnych metod, sposobów i narzędzi przeciwdziałających zagrożeniom i des(27,20 zł najniższa cena z 30 dni)
19.90 zł
32.00 zł (-38%) -
Promocja
Monografię można podzielić na dwie zasadnicze części. Pierwsza cześć obejmuje problematykę dotyczącą wyzwań Przemysłu 4.0, a właściwie jego kluczowego elementu, czyli Internetu Rzeczy (IoT). W tej części scharakteryzowano systemy i opisano modele IoT, przedstawiono wizje architektury IoT, zidentyfikowano problem wiarygodności IoT oraz przedstawiono(24,65 zł najniższa cena z 30 dni)
17.90 zł
29.00 zł (-38%) -
Promocja
Mastering Kali Linux for Advanced Penetration Testing, Third Edition will guide you through proven techniques to test your infrastructure security using Kali Linux. From selecting the most effective tools to carrying out advanced pentesting in highly secure environments, this book will help you gain the expertise you need to advance in your career.-
- PDF + ePub + Mobi 29 pkt
(179,10 zł najniższa cena z 30 dni)
29.90 zł
199.00 zł (-85%) -
-
Promocja
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and r-
- ePub + Mobi 29 pkt
(169,14 zł najniższa cena z 30 dni)
29.90 zł
199.00 zł (-85%) -
-
Promocja
Understanding the history of the Deep Web, its current state, and its possible evolution, can help you, the reader; better understand the dangers and risks that exist out there. This book helps you access the Deep Web and the Dark Net and also protect yourself while browsing the Deep Web.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition provides you with an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers.-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Be-
- ePub + Mobi 29 pkt
(109,65 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence-
- ePub + Mobi 29 pkt
(80,73 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł (-69%) -
-
Promocja
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can d-
- ePub + Mobi 29 pkt
(109,65 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to h-
- ePub + Mobi 29 pkt
(203,15 zł najniższa cena z 30 dni)
29.90 zł
239.00 zł (-87%) -
-
Promocja
In Understanding Software, Max Kanat-Alexander, Technical Lead for Code Health at Google, brings you his writings and thoughts so that your code and your life as a developer can be healthy, avoid complexity, and embrace simplicity. Why make life hard when making software can be simple?-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of e-
- ePub + Mobi 29 pkt
(135,15 zł najniższa cena z 30 dni)
29.90 zł
159.00 zł (-81%) -
-
Promocja
Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów społecznościowych, które umożliwiają organizacjom terrorystycznym docieranie do odbiorców na masową skalę, przy czym kr- PDF + ePub + Mobi 24 pkt
(25,00 zł najniższa cena z 30 dni)
24.90 zł
50.00 zł (-50%) -
Promocja
In this paper, we focus on those aspects of cybersecurity that are most relevant to universities, intending to provide academic communities with some knowledge that might be useful in their research, education and administration activities related to cybersecurity. The remaining part of the paper is organised as follows. In Section 2, we p(25,50 zł najniższa cena z 30 dni)
18.90 zł
30.00 zł (-37%) -
-
Promocja
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all t-
- ePub + Mobi 29 pkt
(67,92 zł najniższa cena z 30 dni)
29.90 zł
79.90 zł (-63%) -
-
Promocja
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is t-
- ePub + Mobi 29 pkt
(143,65 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows y-
- ePub + Mobi 29 pkt
(169,14 zł najniższa cena z 30 dni)
29.90 zł
199.00 zł (-85%) -
-
Promocja
Web Applications are the core of any business today, and the need for specialized Application Security experts is increasing these days. Using this book, you will be able to learn Application Security testing and understand how to analyze a web application, conduct a web intrusion test, and a network infrastructure test.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption fo-
- ePub + Mobi 29 pkt
(109,65 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Prezentowana praca stanowi próbę omówienia skuteczności środków teleinformatycznych jako instrumentów polityki zagranicznej państw. W przeprowadzonej analizie, biorącej pod uwagę zarówno aspekty rywalizacji, jak i współpracy rządów w cyberprzestrzeni, wykorzystano elementy teorii polityki zagraniczne(43,68 zł najniższa cena z 30 dni)
6.90 zł
54.60 zł (-87%) -
Promocja
Lean Product Management is a handy guide for product managers and anyone embarking on new product development. This book will help readers to align their product strategy by identifying the most viable product, setting up and measuring time-bound metrics, developing a clear product roadmap, and eliminating waste.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with Insigh-
- PDF + ePub + Mobi 29 pkt
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Until recently, learning CoreDNS required reading the code or combing through the skimpy documentation on the website. No longer. With this practical book, developers and operators working with Docker or Linux containers will learn how to use this standard DNS server with Kubernetes.John Belamaric, senior staff software engineer at Google, and Cric-
- ePub + Mobi 29 pkt
(169,14 zł najniższa cena z 30 dni)
29.90 zł
199.00 zł (-85%) -
-
Promocja
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone-
- ePub + Mobi 29 pkt
(118,15 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Mart-
- ePub + Mobi 29 pkt
(169,14 zł najniższa cena z 30 dni)
29.90 zł
199.00 zł (-85%) -
-
Promocja
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a f-
- ePub + Mobi 29 pkt
(92,65 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
As you move data to the cloud, you need to consider a comprehensive approach to data governance, along with well-defined and agreed-upon policies to ensure your organization meets compliance requirements. Data governance incorporates the ways people, processes, and technology work together to ensure data is trustworthy and can be used effectively.-
- ePub + Mobi 29 pkt
(203,15 zł najniższa cena z 30 dni)
29.90 zł
239.00 zł (-87%) -
-
Promocja
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help-
- ePub + Mobi 29 pkt
(186,15 zł najniższa cena z 30 dni)
29.90 zł
219.00 zł (-86%) -
-
Promocja
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro-
- ePub + Mobi 29 pkt
(143,65 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious-
- ePub + Mobi 29 pkt
(143,65 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is-
- ePub + Mobi 29 pkt
(80,73 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł (-69%) -
-
Promocja
e_39wq/e_39wq.mp3 e_39wqAs hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.-
- PDF + ePub
- Audiobook MP3 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth-
- ePub + Mobi 29 pkt
(186,15 zł najniższa cena z 30 dni)
29.90 zł
219.00 zł (-86%) -
-
Promocja
In recent years, the C# and .NET ecosystem has grown so explosively that it's nearly impossible to keep up. This collection of programming challenges helps you explore some of the less-traveled byways of programming concepts in general and C# in particular.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
This book is a guide to understanding new-age protocols and algorithms that are emerging for data protection in cybersecurity and information and communications technology (ICT) with the help of examples and use cases. You’ll begin by exploring classical cryptography and later progress to implementing algorithms for security and data privacy-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Security is integrated into every cloud, but most users take cloud security for granted. Revised to cover product updates up to early 2022, this book will help you understand Microsoft Azure's shared responsibility model that can address any challenge, cybersecurity in the cloud, and how to design secure solutions in Microsoft Azure.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every-
- ePub + Mobi 29 pkt
(118,15 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject-
- ePub + Mobi 29 pkt
(109,65 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad-
- ePub + Mobi 29 pkt
(109,65 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecyc-
- ePub + Mobi 29 pkt
(186,15 zł najniższa cena z 30 dni)
29.90 zł
219.00 zł (-86%) -
-
Promocja
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administ-
- ePub + Mobi 29 pkt
(143,65 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by-
- ePub + Mobi 29 pkt
(135,15 zł najniższa cena z 30 dni)
29.90 zł
159.00 zł (-81%) -
-
Promocja
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Python is the major programming language for network programming. This Learning Path shows you how to use the power and beauty of Python to complete numerous real-world tasks related to programming, monitoring, and administering networks.-
- PDF + ePub + Mobi 29 pkt
Python Network Programming. Conquer all your networking challenges with the powerful Python language
Abhishek Ratan, Eric Chou, Pradeeban Kathiravelu, Dr. M. O. Faruque Sarker
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł (-83%) -
-
Promocja
This book is for Python developers to implement various components of end-to-end decentralized applications such as cryptocurrencies, smart contracts, wallet and more. You will use the example-based approach using various libraries from Python ecosystem to build efficient and powerful blockchain applications at work or projects.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Serverless architectures allow you to build and run applications and services without having to manage the infrastructure. Many companies have adopted this architecture to save cost and improve scalability. This book will help you design serverless architectures for your applications with AWS and Python.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Bitcoin is a cryptocurrency that’s changing the face of online payments. This book will help you understand everything related to Bitcoin architecture. By the end, you’ll be able to mine Bitcoins, accept Bitcoin payments, and work with the basics of Blockchain technology to create simple distributed ledgers.-
- PDF + ePub + Mobi 29 pkt
(71,91 zł najniższa cena z 30 dni)
29.90 zł
79.90 zł (-63%) -
-
Promocja
Nowadays, configuring a network and automating security protocols are quite difficult to implement. However, using Python makes it easy to automate this whole process. This book explains the process of using Python for building networks, detecting network errors, and performing different security protocols using Python Scripting.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
QGIS is a desktop geographic information system that facilitates data viewing, editing, and analysis. Based on version QGIS 2.18, this book will teach you how to write Python code that works with spatial data to automate geoprocessing tasks in QGIS.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Microsoft .NET has always been the preferred framework for developing Enterprise applications that target the Windows platform. However, the release of .NET Core empowers senior developers and enterprise architects to think out of the box, and use .NET Core to design and develop robust applications that target multiple platforms.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Software architecture or creating a blueprint design for a particular software application is not a walk in the park. The two biggest challenges in software architecture are keeping architecture in sync, first, with the requirements as they are uncovered or evolve and, next, with the implementation as it gets built and evolves.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
This book is an all-purpose toolkit for your programming career. It is split up into three main topic areas: Coder Skills, Freelancer Skills, and Career Skills to help you identify and answer the key questions and stumbling blocks that programmers encounter. It is a comprehensive guide containing more than 50 insights and methodologies that you can-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Imagine creating and testing Java EE applications on Apache Tomcat Server or Wildfly Application Server in minutes along with deploying and managing Java applications swiftly. Sounds too good to be true? But you have a reason to cheer as such scenarios are only possible by leveraging Docker and Kubernetes.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Penetration testing is the use of tools and code to attack a system in order to assess its vulnerabilities to external threats. Python allows pen testers to create their own tools.This book provides quick Python recipes to let defense analysts work on their own on the path to discovering, and recovering from, vulnerabilities.-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Accessible and fun to read, this practical book contains a collection of stories of organizations using blockchain technology in practice. Through deep research and firsthand interviews, authors Sir John Hargrave and Evan Karnoupakis show you how leading-edge organizations have worked to integrate blockchain into their businesses.You'll start by ex-
- ePub + Mobi 29 pkt
(135,15 zł najniższa cena z 30 dni)
29.90 zł
159.00 zł (-81%) -
-
Promocja
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti-
- ePub + Mobi 29 pkt
(186,15 zł najniższa cena z 30 dni)
29.90 zł
219.00 zł (-86%) -
-
Promocja
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manag-
- ePub + Mobi 29 pkt
(118,15 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service-
- ePub + Mobi 29 pkt
(169,14 zł najniższa cena z 30 dni)
29.90 zł
199.00 zł (-85%) -
-
Promocja
Azure Sentinel is an intelligent security service from Azure where Microsoft's main focus on developing sentinel is to integrate and bring together cloud security and artificial intelligence into effect. Here readers will gain enough understanding to make the most of Azure services to secure their environment from modern cybersecurity threats.-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Blockchain technology continues to disrupt a wide variety of organizations, from small businesses to the Fortune 500. Today hundreds of blockchain networks are in production, including many built with Hyperledger Fabric. This practical guide shows developers how the latest version of this blockchain infrastructure provides an ideal foundation for d-
- ePub + Mobi 29 pkt
(203,15 zł najniższa cena z 30 dni)
29.90 zł
239.00 zł (-87%) -
-
Promocja
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security-
- ePub + Mobi 29 pkt
(118,15 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Blockchain has the potential to change the world and has become the hottest field in the tech sector now. Blockchain for Business is a comprehensive guide that enables you to fully understand the far-reaching applications beyond Bitcoin and empowers you to make fully-informed decisions.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. Learn blockchain from first concepts to algorithms explained in Python.-
- PDF + ePub + Mobi 29 pkt
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Functional programming is a very powerful programming paradigm that can help us to write better code. This book presents essential functional and reactive programming concepts in a simplified manner using Typescript.-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoints and create robust defense strategies.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Microsoft Azure has numerous effective solutions but the biggest challenge that architects and administrators face is implementing these solutions appropriately. This Learning Path focuses on various scenarios that will help overcome the challenge of implementing Azure solutions while helping you prepare for the Microsoft Architect exam.-
- PDF + ePub + Mobi 29 pkt
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, Namit Tanasseri, Rahul Rai
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł (-83%) -
-
Promocja
The serverless architecture allows you to build and run applications and services without having to manage the infrastructure which saves cost and improves scalability. In this book, you will learn to harness serverless technology to reduce production time, minimize cost and have the freedom to customize your code, without hindering functionality.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
IoT and Blockchain are not limited to certain industries or use cases. Almost any business with a network and IoT device can reduce costs, improve business efficiency, and remove single points of failure in networks by implementing Blockchain. This book will help you implement an end-to-end Blockchain and IoT solution using best practices.-
- PDF + ePub + Mobi 29 pkt
(76,49 zł najniższa cena z 30 dni)
29.90 zł
84.99 zł (-65%) -
-
Promocja
Unreal Engine VR Quick Start Guide introduces designers to the guidelines and design processes necessary to build interactive VR experiences. Learn to use User Experience design techniques and Blueprint programming to create virtual reality gameplay for HTC Vive, Oculus Rift, PSVR, and Windows Mixed Reality headsets.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Mastering Distributed Tracing provides comprehensive coverage of the tracing field. Solve problems through code instrumentation with open standards, and learn how to profile complex systems. The book will also prepare you to operate and enhance your own tracing infrastructure.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get started with executing an application penetration test and be sure of the results.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This Learning Path is your easy reference to explore and build blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Starting with the basics of blockchain, this Learning Path teaches you all that you need to know to develop your own private and public blockchain networks.-
- PDF + ePub + Mobi 29 pkt
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
Salman A. Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł (-83%) -
-
Promocja
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.-
- PDF + ePub + Mobi 29 pkt
(179,10 zł najniższa cena z 30 dni)
29.90 zł
199.00 zł (-85%) -
-
Promocja
Kotlin has been the buzzword among developers ever since the release of new features in Kotlin 1.1. With Google's announcement of introducing first class support for Kotlin in their Android ecosystem, it's high time that Kotlin is realized as a mainstream language. Microservices aids in designing scalable, easy-to-maintain web applications. If you-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Microservices are a hot trend in the development world right now. Many enterprises have adopted this approach to achieve agility and the continuous delivery of applications to gain a competitive advantage. This book will take you through the different design patterns at different stages of the microservice application development process, along wit-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Penetration testing is highly competitive, and it’s easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
pfSense is open source router/firewall software based on FreeBSD. This book shows how to install and customize pfSense in a variety of scenarios, providing many concrete examples.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
pfSense is the world's most trusted open source network security solution. In this book, you’ll learn about pfSense, all of its key features, how you can install and deploy it, as well as the different tasks you can perform.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Customizing networks and controlling the traffic flow is becoming a must for all the modern solutions, even if these solutions exist on Azure, on-premises or a combination of both.In this book, you will learn all Azure networking solutions and spanning them across Azure and On-premises, and how to build a highly available environment by them.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Kubernetes provides a means to describe what your application needs and how it should run by orchestrating containers on your behalf to operate your software across a single, dozens, or hundreds of machines. Originally created and open sourced from Google, you can use their technology to help run, test, and scale your applications regardless of whi-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices , modern operating systems and help you secure high security environments.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Agile software development helps to minimize the risk of failure in product development, as it enables you to quickly adapt to the changing environment and the varying needs of your customers, by improving your communication and collaboration skills.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
AWS is currently the market leader in the public cloud market.With the increasing global interest in leveraging cloud infrastructure, AWS Cloud from Amazon offers a cutting-edge platform for architecting, building, and deploying web-scale cloud applications. This book will help you in performing these tasks easily.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Python's built-in unittest module is showing it's age; hard to extend, debug and track what's going on. The pytest framework overcomes these problems and simplifies testing your Python software. Many users love to use pytest and the improvement in their testing shows! This book is the ideal introduction to pytest, teaching you how to write tests of-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Ethereum is an open-source, public, Blockchain-based distributed computing platform, and operating system featuring smart contract functionality which builds decentralized applications. If you want to get started with Ethereum and Solidity or you are among the many developers already working with this platform, this book is your one-stop guide.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
Korzystając z tej strony zgadzasz się na używanie plików cookie, które są przechowywane na Twoim urządzeniu. Za pośrednictwem cookies zbieramy informacje, które mogą stanowić dane osobowe. Wykorzystujemy je w celach analitycznych, marketingowych oraz aby dostosować treści do Twoich preferencji i zainteresowań. Więcej informacji, w tym sposób zmiany ustawień znajdziesz w Polityce Prywatności.


