14. Urodziny Ebookpoint - Wielkie Jesienne Książkobranie / DODATKOWY DZIEŃ PROMOCJI!
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(71,91 zł najniższa cena z 30 dni)
29.90 zł
79.90 zł (-63%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(89,91 zł najniższa cena z 30 dni)
29.90 zł
99.90 zł (-70%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
Ashwin Pajankar, Richard Grimmett, Matthew Poole, Arush Kakkar
(233,10 zł najniższa cena z 30 dni)
29.90 zł
259.00 zł (-88%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
With Red Hat Enterprise Essentials you will run and operate Red Hat Linux 8 learn to securely administer a server or a system using Linux commands.-
- ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł (-84%) -
-
Promocja
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł (-84%) -
-
Promocja
Do you want to understand how to defend your organization and prevent vulnerabilities in your IoT ecosystem? The Practical Internet of Things Security book will show you how to do this effectively with the help of detailed explanations, examples, and expert tips.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(71,91 zł najniższa cena z 30 dni)
29.90 zł
79.90 zł (-63%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(143,10 zł najniższa cena z 30 dni)
29.90 zł
159.00 zł (-81%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(58,49 zł najniższa cena z 30 dni)
29.90 zł
64.99 zł (-54%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
Darla Nykamp, Joseph Anderson, Jayasree Nampalli, Mari Heiser, Timothy Speed
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł (-84%) -
-
Promocja
This practical guide will help developers working with networking technologies such as CSMA, P2P, Wi-Fi, Wi-Fi 6, and LTE to perform advanced network simulations using ns-3. This book provides a hands-on approach to evaluating useful test scenarios of wired, Wi-Fi, LTE networks in the context of real-time deployments and research activities.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.-
- PDF + ePub 29 pkt
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł (-69%) -
-
Promocja
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
With Mastering Veeam Backup and Replication you’ll learn how to install Veeam Backup & Replication 12 on your system, the Core Architecture enhancements, as well as about other enhancements. You’ll also gain an understanding of security, Object Storage direct, and CDP with Cloud Connect.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e-
- PDF + ePub 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Through this book, you’ll learn to administer core and advanced Windows Server and Infrastructure-as-a-Service workloads utilizing the available - on-premises, hybrid, and cloud technologies. All the skills you acquire will prepare you to ace the AZ-801: Configuring Windows Server Hybrid Advanced Services Exam.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
This book helps you set up your own virtual and portable forensic lab and guides on memory analysis and full forensic analysis using industry-recognized tools. You’ll explore malware and network artifact analyses and implement all the pillars of digital forensics such as acquisition, analysis, and presentation using cutting-edge tools.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
The MS-100 certification validates your knowledge of identity and security aspects of a Microsoft 365 tenant. With the help of this book, you’ll explore core features such as self-service password reset and Azure AD identity protection, enabling you to implement Azure AD identity and secure access easily.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This comprehensive guide will help you understand practical aspects of information systems auditing. It covers key areas such as governance and management of IT, information systems acquisition, development, implementation and information systems operations, business resilience, and the crucial topic of protecting information assets.-
- PDF + ePub 29 pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.-
- PDF + ePub 29 pkt
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł (-69%) -
-
Promocja
To przystępny i kompleksowy przewodnik po zagadnieniach bezpieczeństwa, skierowany do osób, które nie znają się na komputerach i informatyce. Kwestie cyberbezpieczeństwa przedstawiono tu krok po kroku, z minimalnym użyciem specjalistycznego języka. Opisano dziesiątki całkiem prostych sposobów pozwalających każdemu zabezpieczyć swoje urządzenia i da- PDF + ePub + Mobi
- Druk 14 pkt
(24,50 zł najniższa cena z 30 dni)
14.90 zł
49.00 zł (-70%) -
Promocja
Dzięki niej dowiesz się, jak skutecznie zrootować Twoje urządzenie i przejąć nad nim pełną kontrolę. To jest pierwszy i najważniejszy krok. Gdy go wreszcie uczynisz, świat pełen różnych wersji ROM-ów, modyfikacji i atrakcyjnych funkcjonalności stanie przed Tobą otworem. W trakcie lektury nauczysz się modyfikować wygląd i styl Twojego Androida, twor- PDF + ePub + Mobi
- Druk 19 pkt
(29,49 zł najniższa cena z 30 dni)
19.90 zł
59.00 zł (-66%) -
Promocja
Przestępcy, co raz częściej korzystają ze złośliwego oprogramowania (exploity, wirusy, rootkity itp.) w celu oszukania nieświadomego użytkownika, przeprowadzenia ataku typu odmowa usługi lub włamania się do jakiegoś systemu i wykradzenia informacji. Działanie oprogramowania tego typu można w pełni zrozumieć tylko poprzez inżynierię odwrotną. Inżyni- PDF + ePub + Mobi
- Druk 24 pkt
Inżynieria odwrotna w praktyce. Narzędzia i techniki
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse
(34,50 zł najniższa cena z 30 dni)
24.90 zł
69.00 zł (-64%) -
Promocja
Książka, którą trzymasz w dłoni, opisuje działanie różnych rodzajów oprogramowania. Autor w przystępny i interesujący sposób wyjaśnia trudne i złożone kwestie. Nie musisz być informatykiem ani znać podstaw programowania, aby zrozumieć procesy, które przebiegają w magicznie lśniących układach scalonych, skrytych pod obudową komputera czy smartfona.- PDF + ePub + Mobi
- Druk 14 pkt
(24,50 zł najniższa cena z 30 dni)
14.90 zł
49.00 zł (-70%) -
Promocja
Jeśli chcesz uwolnić się od oglądania czegoś, co atakuje cię przy każdym otwarciu przeglądarki internetowej, marzysz o tym, by uniknąć natrętnych e-maili od obcych osób, które w dodatku wyglądają jak wiadomości od kumpla, i potrzebujesz odrobiny luzu w wirtualnym świecie - ta książka ci pomoże. Dowiesz się z niej, jak skonfigurować przeglądarkę, by- PDF + ePub + Mobi
- Druk 9 pkt
(17,45 zł najniższa cena z 30 dni)
9.90 zł
34.90 zł (-72%) -
Promocja
Dzięki tej książce dowiesz się, jak zabezpieczyć swoją stronę, opartą o ten system, przed ich działaniem. Podręcznik w kompleksowy sposób opisuje wszystkie zagadnienia związane z bezpieczeństwem Joomla! — począwszy od wyboru firmy, na której serwerach umieścisz swoją stronę, a skończywszy na tworzeniu polityki reagowania na ataki.- PDF + ePub + Mobi
- Druk 9 pkt
(19,50 zł najniższa cena z 30 dni)
9.90 zł
39.00 zł (-75%) -
Promocja
Ta książka mówi o sprawach trudnych i niezwykle ważnych. Wszystkie komputery można zhakować, a kradzież danych to drobnostka w porównaniu z wrogim przejęciem jadącego samochodu, zakłóceniem pracy rozrusznika serca czy systemu kontroli krajowej sieci energetycznej. Poza konsekwencjami życia w świecie powszechnej sieci pokazano tu ukryte powiązania m- PDF + ePub + Mobi
- Druk 14 pkt
(19,95 zł najniższa cena z 30 dni)
14.90 zł
39.90 zł (-63%) -
Promocja
Jak obronić się przed atakiem? Wszystkie niezbędne informacje znajdziesz w tym wyjątkowym podręczniku. W trakcie lektury dowiesz się, jak działają hakerzy, jak wyszukują słabe punkty aplikacji oraz jak modyfikują jej kod. Ponadto nauczysz się utrudniać śledzenie kodu Twojej aplikacji oraz bezpiecznie usuwać pliki (tak, aby nie było możliwe ich odtw- PDF + ePub + Mobi
- Druk 19 pkt
(29,49 zł najniższa cena z 30 dni)
19.90 zł
59.00 zł (-66%) -
Promocja
Comprehensive guidance on evaluating cybersecurity, conducting risk assessments, and auditing IT systems for compliance across multiple platforms like AWS, Azure, and GCP.-
- PDF + ePub 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Dive into Microsoft Teams mastery with this comprehensive exam guide. From administration to security, collaboration, and troubleshooting, gain practical skills for exam success and real-world application.x-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This book covers threat management, investigation, automation, and integration with other security tools to fortify organizational cybersecurity defenses effectively.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Navigate the evolving software security landscape with Crafting Secure Software. This guide equips decision makers to understand and address risks, ensure compliance, and build a culture of security within development teams.-
- PDF + ePub 29 pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
Unveiling the future: Navigating AI's Intricate Intersection with International Law A Journey Beyond Hype and Governance KEY FEATURES Comprehensive overview of AI ethics and international law. Exploration of pragmatic approaches to AI governance. Navigation of global legal dynamics. Soft law recommendations for responsible AI development. D-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Everything you need to know to secure your IoT devices KEY FEATURES Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities that can affect IoT devices. Implement security measures to protect IoT devices from attack. DESCRIPTION The Internet of Things (IoT) is a rapidly growing-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Learn how to leverage DevSecOps to secure your modern enterprise in the cloud KEY FEATURES Explore DevSecOps principles, fundamentals, practices, and their application in AWS environments comprehensively and in-depth. Leverage AWS services and tools to enhance security within your DevSecOps pipeline, gaining deep insights. Implement DevSecOps-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Crack a ransomware by identifying and exploiting weaknesses in its design KEY FEATURES Get an overview of the current security mechanisms available to prevent ransomware digital extortion. Explore different techniques to analyze a ransomware attack. Understand how cryptographic libraries are misused by malware authors to code ransomwares. DES-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) KEY FEATURES Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
The definitive guide to installing and configuring IBM FileNet Information Management software KEY FEATURES Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboar-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
A comprehensive guide to Multi-Cloud Administration for Cloud professionals KEY FEATURES Get familiar with the various components involved in establishing a multi-cloud architecture. Acquire the skills to effectively manage multi-cloud environments. Establish guardrails and guidelines to ensure interoperability and security across multiple clo-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more KEY FEATURES Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advan-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments KEY FEATURES A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. D-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
This is an in-depth guide covering hacking techniques, security vulnerabilities, and countermeasures. Learn how to use tools like Kali Linux for ethical hacking, test for exploits, and secure systems.-
- PDF + ePub 29 pkt
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł (-84%) -
-
Promocja
ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is an enterprise IT risk management professional's dream. With its in-depth approach and various self-assessment exercises, this book arms you with knowledge of every single aspect of the certification, and is a fantastic career companion after you're certif-
- PDF + ePub 29 pkt
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł (-83%) -
-
Promocja
Burp Suite is an immensely powerful and popular tool for web application security testing. This book provides a collection of recipes that address vulnerabilities in web applications and APIs. It offers guidance on how to configure Burp Suite, make the most of its tools, and explore into its extensions.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
This book is a comprehensive guide to configuring and managing Microsoft Intune, a cloud-based endpoint management (MDM) tool. It covers everything from the initial setup and configuration to troubleshooting and automating tasks.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
This is a practical guide that enables SOC professionals to analyze the most common security appliance logs that exist in any environment.-
- PDF + ePub 29 pkt
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł (-83%) -
-
Promocja
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud environments running on AWS, Azure, and GCP. In addition to these, you will explore a number of practical strategies on how to manage the complexity, cost, and security risks involved when setting up vulnerable cloud lab environments.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Master automotive cybersecurity with this practical guide to ISO 21434 and UNECE regulations. Learn to integrate security into the development lifecycle, perform threat modeling, and implement cyber defenses to build secure, cyber-resilient vehicles.-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to th-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. This book covers the nuts and bolts of how to keep your organization safe by helping you understand the intricacies of mitigating risks, creating an implementation roadmap, ensuring continuous improvement, and beyond.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond.-
- PDF + ePub 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.-
- PDF + ePub 29 pkt
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł (-84%) -
-
Promocja
In an era plagued by hacking and security breaches, this book takes you through Kali Linux's latest version, addressing critical security concerns and finding hidden vulnerabilities as you learn penetration testing.-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Data Science for Malware Analysis is a guide to the synergy of cybersecurity and data science. You'll learn about malware lifecycle and data science techniques for improved detection and analysis. You'll decipher key regulations like GDPR and CCPA.-
- PDF + ePub 29 pkt
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł (-69%) -
-
Promocja
This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you'll be able to shift security toward the left, enabling you to merge security into coding in no time.-
- PDF + ePub 29 pkt
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł (-69%) -
-
Promocja
Implementing Palo Alto Prisma Access not only teaches you how and why to deploy Prisma Access, but also delves into component interaction. Discover how to leverage advanced configurations to optimize the user experience and tighten your security.-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Introduction to Kali Purple combines red and blue team tools in a single computing environment that allows both the setup and testing of a miniature security operations center, from setting up a SIEM environment to automation, all in one location.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify and fix vulnerabilities. From emerging threats to best practices, this book helps you defend and safeguard your APIs.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
The Essential Guide to Web3 serves as a gateway to the decentralized web—also known as the decentralized internet—to enable you to embark on an immersive journey into the fascinating world of Web3. With brief overviews of the blockchain and the Ethereum ecosystem at the outset, this book quickly immerses you in practical blockchain ap-
- PDF + ePub 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Learn the various aspects of Cyber Security concepts. Key Features Strengthens the foundations, as detailed explanation of the concepts are given. Simple language, crystal clear approach, straight forward comprehensible presentation. Adopting user-friendly classroom lecture style. The concepts are duly supported by several examples. Previous-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
A practical book that will help you defend against malicious activities Key Features Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out Learn how to choose, design and implement a cybersecurity program that best fits your needs Learn how to improve a cybersecurity program and accompanyi-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Step-by-step guide to learn Ripple and explore $155 trillion+ market on international remittance Key Features Know the inefficiencies of banks in international remittance and how Ripple can help Learn Ripples architecture and its product offerings such as xCurrent, xRapid, and xVia Acquire development skills on Ripples XRP ledger Understand and-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Secure your applications and development environments with Docker and Kubernetes Key Features Introducing Container platforms (Docker, Kubernetes, Swarm, OpenShift Discover how to manage high availability with Docker Swarm and Kubernetes Learn how Docker can manage the security in images and containers Discover how Docker can be integrated int-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Learn how to redesign NLP applications from scratch. Key Features Get familiar with the basics of any Machine Learning or Deep Learning application. Understand how does preprocessing work in NLP pipeline. Use simple PyTorch snippets to create basic building blocks of the network commonly used in NLP. Get familiar with the advanced embedding tec-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Learn to secure your personal data & reclaim your online privacy! Key Features Understand your cyber risk exposure by calculating your Privacy Score Improve your Privacy Score with easy-to-follow recommendations Different recommendations for different levels of expertise YOUR choice! An interactive book with inline QR code references for furth-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Learn how to build an end-to-end Web application security testing framework Description Hands-on Penetration Testing for Web Applications offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce applicati-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Step-by-step guide to learning the role of E-commerce in our economy Key Features Hands-on with the concept of E-Commerce and E-Business. Understand the know-how of working of E-Commerce framework. Learn the type of E-Payment system and its mechanism. Understanding Brand building and Digital Marketing methods. Description Electronic Commerce (E-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Getting familiar with cloud computing features from scratch to advanced. Description Cloud computing is a technology that allows you to store, access data and programs over the internet instead of the hard drive or a server. In this book, you will gain knowledge about the fundamentals of cloud computing. This book includes a detailed description-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features Real-case studies and true events on cyber crime incidents. Learn how to protect yourself from cyber threats and assist police for crime investigation. Coverage on financial frauds, social media crimes, mobile payment f-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Basic to Advance research on the concepts and design of Cloud computing Key Features Comprehensively gives clear picture of current state-of-the-art aspect of cloud computing by elaborating terminologies, models and other related terms. Enlightens all major players in Cloud Computing industry providing services in terms of SaaS, PaaS and IaaS.-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Prepare yourself for any type of audit and minimise security findings Key Features It follows a lifecycle approach to information security by understanding: Why we need Information security How we can implement How to operate securely and maintain a secure posture How to face audits Description This book is a guide for Network professiona-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Perform effective and efficient penetration testing in an enterprise scenario Key Features Understand the penetration testing process using a highly customizable modular framework. Exciting use-cases demonstrating every action of penetration testing on target systems. Equipped with proven techniques and best practices from seasoned pen-testing-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
More practical less theory Key Features In-depth practical demonstration with multiple examples of reverse engineering concepts. Provides a step-by-step approach to reverse engineering, including assembly instructions. Helps security researchers to crack application code and logic using reverse engineering open source tools. Reverse engineerin-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Exploring techniques and tools and best practices used in the real world. Key Features Explore private and public key-based solutions and their applications in the real world. Learn about security protocols implemented at various TCP/IP stack layers. Insight on types of ciphers, their modes, and implementation issues. Description Cryptography-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Identify vulnerabilities across applications, network and systems using simplified cybersecurity scripting Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. Includes powerful Python libraries to analyze the web-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
With Azure security, you can build a prosperous career in IT security. Key Features In-detail practical steps to fully grasp Azure Security concepts. Wide coverage of Azure Architecture, Azure Security services, and Azure Security implementation techniques. Covers multiple topics from other Azure certifications (AZ-303, AZ-304, and SC series).-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. Key Features Courseware and practice papers with solutions for C.E.H. v11. Includes hacking tools, social engineering techniques, and live exercises. Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing. Description The 'Certi-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Encyclopedia on Blockchain for beginners and experts alike Key Features Includes the basics of Blockchain Comparative study of public Blockchains (Ethereum, Hashgraph, Cardano, Algorand, Solana etc.) Comparison of interoperable Blockchains (Polkadot vs. Cosmos vs. Polygon). Comparison of private permissioned DLTs (Fabric vs. R3 Corda vs. Quoru-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Building and securely deploying container-based applications with Docker and Kubernetes using open source tools. Key Features Real-world examples of vulnerability analysis in Docker containers. Includes recommended practices for Kubernetes and Docker with real execution of commands. Includes essential monitoring tools for Docker containers and-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
An overview of the Healthcare Industry and Applications of the Blockchain Key Features Includes graphical representations and architecture schematics for healthcare processes powered by the blockchain technology. Real-world examples of how medical and pharma companies can use a blockchain in healthcare. Includes algorithms and procedures for sm-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Lead the digital transformation wave with Microsoft Teams Key Features Explore numerous business scenarios to gain a better grasp of Microsoft Dataverse for Teams Build your first app with step-by-step instructions and expand features with flows and bots. Find more about the application, environment, and licensing lifecycle management. Descrip-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Adopt distributed technology to deliver immutable data ownership solutions KEY FEATURES Understand how Blockchain is the backbone of bitcoin and smart contracts. Complete coverage across distributed systems, blockchain frameworks, smart contracts and wallet. Includes use-cases and current trends on the adoption of blockchain across different b-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
KEY FEATURES Learn how to defend industrial control systems from an attacking standpoint. Learn about industrial network protocols and threat hunting. Handling of tackle industrial cyber risks Develop offensive and defensive skills. DESCRIPTION In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Understand and Conduct Ethical Hacking and Security Assessments Key Features Practical guidance on discovering, assessing, and mitigating web, network, mobile, and wireless vulnerabilities. Experimentation with Kali Linux, Burp Suite, MobSF, Metasploit and Aircrack-suite. In-depth explanation of topics focusing on how to crack ethical hacking i-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Discover security posture, vulnerabilities, and blind spots ahead of the threat actor KEY FEATURES Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning, Secure Code Review, and bypas-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Security is a shared responsibility, and we must all own it KEY FEATURES Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components. Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams. Adopts a perspective of developing a Cybersecurity stra-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Start your journey in this exciting Android app development world KEY FEATURES Start your Kotlin adventure from the very fundamentals to sophisticated Android programming. Experience live coding of a video application, game design, and chat application. Explore the Android framework, app creation, testing, and publication to the Google Play st-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. Extensive coverage of Android and iO-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
A Guide to Enter the Journey of a Digital Forensic Investigator KEY FEATURES Provides hands-on training in a forensics lab, allowing learners to conduct their investigations and analysis. Covers a wide range of forensics topics such as web, email, RAM, and mobile devices. Establishes a solid groundwork in digital forensics basics including evi-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
Korzystając z tej strony zgadzasz się na używanie plików cookie, które są przechowywane na Twoim urządzeniu. Za pośrednictwem cookies zbieramy informacje, które mogą stanowić dane osobowe. Wykorzystujemy je w celach analitycznych, marketingowych oraz aby dostosować treści do Twoich preferencji i zainteresowań. Więcej informacji, w tym sposób zmiany ustawień znajdziesz w Polityce Prywatności.


