14. Urodziny Ebookpoint - Wielkie Jesienne Książkobranie / DODATKOWY DZIEŃ PROMOCJI!
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(143,10 zł najniższa cena z 30 dni)
29.90 zł
159.00 zł (-81%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
Darla Nykamp, Joseph Anderson, Jayasree Nampalli, Mari Heiser, Timothy Speed
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
-
- PDF + ePub + Mobi 29 pkt
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł (-84%) -
-
Promocja
This practical guide will help developers working with networking technologies such as CSMA, P2P, Wi-Fi, Wi-Fi 6, and LTE to perform advanced network simulations using ns-3. This book provides a hands-on approach to evaluating useful test scenarios of wired, Wi-Fi, LTE networks in the context of real-time deployments and research activities.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.-
- PDF + ePub 29 pkt
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł (-69%) -
-
Promocja
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
With Mastering Veeam Backup and Replication you’ll learn how to install Veeam Backup & Replication 12 on your system, the Core Architecture enhancements, as well as about other enhancements. You’ll also gain an understanding of security, Object Storage direct, and CDP with Cloud Connect.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e-
- PDF + ePub 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
This book helps you set up your own virtual and portable forensic lab and guides on memory analysis and full forensic analysis using industry-recognized tools. You’ll explore malware and network artifact analyses and implement all the pillars of digital forensics such as acquisition, analysis, and presentation using cutting-edge tools.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
This comprehensive guide will help you understand practical aspects of information systems auditing. It covers key areas such as governance and management of IT, information systems acquisition, development, implementation and information systems operations, business resilience, and the crucial topic of protecting information assets.-
- PDF + ePub 29 pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.-
- PDF + ePub 29 pkt
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł (-69%) -
-
Promocja
To przystępny i kompleksowy przewodnik po zagadnieniach bezpieczeństwa, skierowany do osób, które nie znają się na komputerach i informatyce. Kwestie cyberbezpieczeństwa przedstawiono tu krok po kroku, z minimalnym użyciem specjalistycznego języka. Opisano dziesiątki całkiem prostych sposobów pozwalających każdemu zabezpieczyć swoje urządzenia i da- PDF + ePub + Mobi
- Druk 14 pkt
(24,50 zł najniższa cena z 30 dni)
14.90 zł
49.00 zł (-70%) -
Promocja
Książka, którą trzymasz w dłoni, opisuje działanie różnych rodzajów oprogramowania. Autor w przystępny i interesujący sposób wyjaśnia trudne i złożone kwestie. Nie musisz być informatykiem ani znać podstaw programowania, aby zrozumieć procesy, które przebiegają w magicznie lśniących układach scalonych, skrytych pod obudową komputera czy smartfona.- PDF + ePub + Mobi
- Druk 14 pkt
(24,50 zł najniższa cena z 30 dni)
14.90 zł
49.00 zł (-70%) -
Promocja
Jeśli chcesz uwolnić się od oglądania czegoś, co atakuje cię przy każdym otwarciu przeglądarki internetowej, marzysz o tym, by uniknąć natrętnych e-maili od obcych osób, które w dodatku wyglądają jak wiadomości od kumpla, i potrzebujesz odrobiny luzu w wirtualnym świecie - ta książka ci pomoże. Dowiesz się z niej, jak skonfigurować przeglądarkę, by- PDF + ePub + Mobi
- Druk 9 pkt
(17,45 zł najniższa cena z 30 dni)
9.90 zł
34.90 zł (-72%) -
Promocja
Ta książka mówi o sprawach trudnych i niezwykle ważnych. Wszystkie komputery można zhakować, a kradzież danych to drobnostka w porównaniu z wrogim przejęciem jadącego samochodu, zakłóceniem pracy rozrusznika serca czy systemu kontroli krajowej sieci energetycznej. Poza konsekwencjami życia w świecie powszechnej sieci pokazano tu ukryte powiązania m- PDF + ePub + Mobi
- Druk 14 pkt
(19,95 zł najniższa cena z 30 dni)
14.90 zł
39.90 zł (-63%) -
Promocja
Dive into Microsoft Teams mastery with this comprehensive exam guide. From administration to security, collaboration, and troubleshooting, gain practical skills for exam success and real-world application.x-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Everything you need to know to secure your IoT devices KEY FEATURES Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities that can affect IoT devices. Implement security measures to protect IoT devices from attack. DESCRIPTION The Internet of Things (IoT) is a rapidly growing-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) KEY FEATURES Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more KEY FEATURES Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advan-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments KEY FEATURES A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. D-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
This is an in-depth guide covering hacking techniques, security vulnerabilities, and countermeasures. Learn how to use tools like Kali Linux for ethical hacking, test for exploits, and secure systems.-
- PDF + ePub 29 pkt
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł (-84%) -
-
Promocja
This book is a comprehensive guide to configuring and managing Microsoft Intune, a cloud-based endpoint management (MDM) tool. It covers everything from the initial setup and configuration to troubleshooting and automating tasks.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond.-
- PDF + ePub 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.-
- PDF + ePub 29 pkt
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł (-84%) -
-
Promocja
API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify and fix vulnerabilities. From emerging threats to best practices, this book helps you defend and safeguard your APIs.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Learn the various aspects of Cyber Security concepts. Key Features Strengthens the foundations, as detailed explanation of the concepts are given. Simple language, crystal clear approach, straight forward comprehensible presentation. Adopting user-friendly classroom lecture style. The concepts are duly supported by several examples. Previous-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
A practical book that will help you defend against malicious activities Key Features Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out Learn how to choose, design and implement a cybersecurity program that best fits your needs Learn how to improve a cybersecurity program and accompanyi-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Learn how to redesign NLP applications from scratch. Key Features Get familiar with the basics of any Machine Learning or Deep Learning application. Understand how does preprocessing work in NLP pipeline. Use simple PyTorch snippets to create basic building blocks of the network commonly used in NLP. Get familiar with the advanced embedding tec-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Learn how to build an end-to-end Web application security testing framework Description Hands-on Penetration Testing for Web Applications offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce applicati-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Prepare yourself for any type of audit and minimise security findings Key Features It follows a lifecycle approach to information security by understanding: Why we need Information security How we can implement How to operate securely and maintain a secure posture How to face audits Description This book is a guide for Network professiona-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Perform effective and efficient penetration testing in an enterprise scenario Key Features Understand the penetration testing process using a highly customizable modular framework. Exciting use-cases demonstrating every action of penetration testing on target systems. Equipped with proven techniques and best practices from seasoned pen-testing-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Exploring techniques and tools and best practices used in the real world. Key Features Explore private and public key-based solutions and their applications in the real world. Learn about security protocols implemented at various TCP/IP stack layers. Insight on types of ciphers, their modes, and implementation issues. Description Cryptography-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Understand and Conduct Ethical Hacking and Security Assessments Key Features Practical guidance on discovering, assessing, and mitigating web, network, mobile, and wireless vulnerabilities. Experimentation with Kali Linux, Burp Suite, MobSF, Metasploit and Aircrack-suite. In-depth explanation of topics focusing on how to crack ethical hacking i-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Security is a shared responsibility, and we must all own it KEY FEATURES Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components. Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams. Adopts a perspective of developing a Cybersecurity stra-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. Extensive coverage of Android and iO-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark KEY FEATURES Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to-
- ePub + Mobi 35 pkt
(71,91 zł najniższa cena z 30 dni)
35.90 zł
79.90 zł (-55%) -
-
Promocja
The Microsoft 365 Security, Compliance, and Identity Administration is a comprehensive guide that helps you employ Microsoft 365's robust suite of features and empowers you to optimize your administrative tasks.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
With this new edition, get to grips with Keycloak in a hands-on way with the help of brilliant examples. Keycloak - Identity and Access Management for Modern Applications 2E teaches you how to secure new and existing applications.-
- PDF + ePub 29 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł (-77%) -
-
Promocja
Master detection engineering with this hands-on guide. Learn to build, test, and optimize security detections using real-world scenarios, open-source tools, and industry frameworks like MITRE ATT&CK.-
- PDF + ePub 29 pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
Reconnaissance for Ethical Hackers provides highly contextual real-world techniques used by threat actors, ethical hackers, and pentesters to collect valuable information about organizations that can be used for future attacks and operations. This book will help you develop the ethical hacking skills needed to successfully perform reconnaissance.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Attacking and Exploiting Modern Web Attacks will help you understand how to identify attack surfaces and detect vulnerabilities. This book takes a hands-on approach to implementation and associated methodologies and equips you with the knowledge and skills needed to effectively combat web attacks.-
- PDF + ePub 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Metasploit to narzędzie używane przez profesjonalistów do prowadzenia testów penetracyjnych. Jeżeli chcesz poznać najlepsze przepisy na jego wykorzystanie, to trafiłeś na doskonałą książkę! Zawiera ona ponad 80 receptur omawiających najbardziej skuteczne techniki testowania. W trakcie lektury dowiesz się, jak sprawnie skonfigurować Metasploit, omin- PDF + ePub + Mobi
- Druk 19 pkt
(29,49 zł najniższa cena z 30 dni)
19.90 zł
59.00 zł (-66%) -
Promocja
W książce Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać? znajdziesz niebanalne i kontrowersyjne informacje nie tylko na temat zabezpieczeń, ale także sposobów ich łamania, dzięki czemu zyskasz wiedzę, skąd może nadejść zagrożenie i w jaki sposób je rozpoznać. Dzięki temu podręcznikowi poznasz konkretne problemy i niedoskonałości syste- PDF + ePub + Mobi
- Druk 9 pkt
(19,50 zł najniższa cena z 30 dni)
9.90 zł
39.00 zł (-75%) -
Promocja
Trzymasz w ręku świetny przewodnik po mrocznym świecie phishingu. Opisano tu formy tego rodzaju ataków, przedstawiono sposoby rozpoznawania fałszywych wiadomości e-mail czy sklonowanych stron internetowych. Omówiono również socjotechniczne aspekty phishingu, dzięki czemu lepiej zrozumiesz psychologiczne mechanizmy rządzące postępowaniem ofiary. Po- PDF + ePub + Mobi
- Druk 14 pkt
Mroczne odmęty phishingu. Nie daj się złowić!
Christopher Hadnagy, Michele Fincher, Robin Dreeke (Foreword)
(19,50 zł najniższa cena z 30 dni)
14.90 zł
39.00 zł (-62%) -
Promocja
Praktyczna analiza pakietów to wyjątkowa książka poświęcona temu zaawansowanemu narzędziu. W trakcie lektury dowiesz się, jak przygotować je do pracy oraz jak przeprowadzić proste prace administracyjne z jego wykorzystaniem. Kolejne rozdziały to solidna dawka coraz bardziej zaawansowanej wiedzy. Tworzenie własnych filtrów, monitorowanie sieci w cza- PDF + ePub + Mobi
- Druk 19 pkt
(29,49 zł najniższa cena z 30 dni)
19.90 zł
59.00 zł (-66%) -
Promocja
Na samym początku zbudujesz własne laboratorium sieci bezprzewodowych, tak aby w domowym zaciszu testować różne techniki łamania zabezpieczeń protokołu WEP, WPA i WPA2. W trakcie lektury zdobędziesz wiedzę na temat metod przeprowadzania ataku na infrastrukturę sieci bezprzewodowej. Poznanie zagrożenia w praktyce pozwoli Ci zdobyć doświadczen- PDF + ePub + Mobi
- Druk 14 pkt
(24,50 zł najniższa cena z 30 dni)
14.90 zł
49.00 zł (-70%) -
Promocja
Niniejsza książka jest całościowym, a równocześnie bardzo praktycznym kompendium wiedzy o bezpieczeństwie aplikacji mobilnych. Uwzględniono tu problemy charakterystyczne dla platform iOS, Android i Windows Phone, dzięki czemu zaproponowanie najwłaściwszej strategii zabezpieczenia aplikacji jest o wiele prostsze. Wyjaśniono przyczyny podatności apli- PDF + ePub + Mobi
- Druk 39 pkt
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
(64,50 zł najniższa cena z 30 dni)
39.90 zł
129.00 zł (-69%) -
Promocja
Oto praktyczne wprowadzenie do Azure. Wyjaśniono tu wiele pojęć potrzebnych w pracy administratora, takich jak sieci wirtualne oraz koncepcja IaaS. Omówiono zasady pracy z Azure oraz pokazano, jak można przygotować platformę do wdrożenia własnego systemu. Od strony praktycznej przedstawiono tworzenie zaawansowanych usług w platformie Azure. Sporo m- PDF + ePub + Mobi
- Druk 29 pkt
(39,50 zł najniższa cena z 30 dni)
29.90 zł
79.00 zł (-62%) -
Promocja
Z różnych mediów napływają informacje o tym, że hakerzy (tzw. black hats) przeprowadzają ataki DDoS blokujące dostęp do ważnych usług, publikują wykradzione bazy danych, niszczą witryny internetowe, szantażują firmy i instytucje, okradają konta bankowe i infekują wiele urządzeń, skutecznie paraliżując ich działanie. Media wciąż donoszą o sensacyjn- PDF + ePub + Mobi
- Druk 14 pkt
(24,50 zł najniższa cena z 30 dni)
14.90 zł
49.00 zł (-70%) -
Promocja
Sam fakt, że trzymasz w rękach tę książkę, jest nie na rękę rządom i korporacjom. Z jej kart dowiesz się, jakie konkretnie dane o sobie generujesz, w jaki sposób są one zbierane i wykorzystywane przez agencje rządowe i największe firmy. Przeczytasz, jakie szkody dla świata wolności i demokracji płyną z masowej inwigilacji i jak bardzo destrukcyjne- PDF + ePub + Mobi
- Druk 19 pkt
(27,45 zł najniższa cena z 30 dni)
19.90 zł
54.90 zł (-64%) -
Promocja
This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concepts that will come in handy when making robust cybersecurity tools and custom exploits.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
In the era of network attacks and malware threat, it becomes important to have skills to investigate the attack evidence and vulnerabilities prevailing in the network. This book focuses on how to acquire and analyze the evidence, write a report and use the common tools in network forensics.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic forensics-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This book covers everything the reader needs to know to get pfSense up and running, as well as how to configure core pfSense services to both secure and optimize their networks, third party packages that extend the functionality of pfSense, and the basics of diagnostics and troubleshooting networks.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This book will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you will be-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best security-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to you. Yo-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
This book covers everything you need to set up a Kali Linux lab, the latest generation of the BackTrack Linux penetration testing and security auditing Linux distribution. Learn how to use the hundred tools Kali Linux has so you can manage security tasks such as penetration testing, forensics, and reverse engineering.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be able to determine the security state of the client's network and recommend remediations accordingly.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what the field is about, the book solves that problem. The book allows readers to train themselves as bug b-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Network automation is the process of efficiently automating the management and functionality of networks. Through practical use-cases and examples, this book introduces you to the popular tools such as Python, Ansible, Chef and more, that are used to automate a network.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Metasploit Bootcamp will enable readers to gain hands-on knowledge on Penetration testing with Metasploit in various environments using a boot camp style approach. The readers will learn about Scanning, fingerprinting and exploiting different software. They will also learn about testing on services like Databases, VOIP and other known and unknown s-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
With the ever-increasing amount of data flowing in today’s world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Technology plays an increasingly large role in our daily life and shows no signs of stopping. Now, more than ever, it is paramount that an investigator develops programming expertise to deal with increasingly large datasets. By leveraging the Python recipes explored throughout this book, we make the complex simple, quickly extracting relevant infor-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
The Junos automation toolkit is part of the standard Junos OS available on all switches, routers, and security devices running Junos OS. Junos automation simplifies complex configurations and reduces potential configuration errors.This book is a set of powerful recipes that will cover all you need to know about implementing Junos Automation to auto-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed for the present while keeping the future in mind. This book talks about how to design and implement enterprise ne-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
With ever-improving and ever-changing cyber threats, businesses need to be on their toes to ensure their safety. This comprehensive book takes you from understanding the basics of cyber security and industrial protocols to building robust industrial control systems. Through real-world scenarios, you will understand vulnerabilities and will be equip-
- PDF + ePub + Mobi 29 pkt
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł (-83%) -
-
Promocja
Security is a key ingredient when it comes to workloads deployed in cloud. Security is highest priority for any organization and it is considered job zero at AWS. Our book will dig deep into the achieving end to end automated security for all workloads deployed, running and stored in AWS cloud.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
This book will help you discover the powerful capabilities of Dapr by implementing a sample application with microservices leveraging all the building blocks. Throughout the book, you’ll find out how Dapr helps you simplify the creation of resilient and portable microservices.-
- PDF + ePub 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. By the end of this book, you’ll know how to analyze the traffic, find patterns of various offending tra-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Python’s latest updates feature numerous packages that can be used to perform critical missions. This Python networking and security book will help you to use Python packages to detect vulnerabilities in web apps and tackle networking challenges. You’ll explore a variety of techniques and tools for networking and security in Python.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This book covers the finer details of microcontrollers and low-powered embedded device programming with TinyGo. You'll work through a range of interactive and real-world embedded projects that will help you to build creative thinking and understand a variety of TinyGo features and capabilities for programming hardware and multiple input devices.-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
Whether you are a tester or a developer working with APIs, you'll be able to put your knowledge to work with this practical guide to using Postman. The book provides a hands-on approach to implementing and learning the associated methodologies that will have you up-and-running and productive in no time.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
The Cisco Certified CyberOps Associate 200-201 certification exam helps you gain the skills and knowledge needed to prevent, detect, analyze, and respond to cybersecurity incidents. This book offers complete up-to-date coverage of the 200-201 exam so you can confidently pass first time while getting hands-on cybersecurity experience.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Zscaler Cloud Security Essentials will show you how to leverage the power of Zscaler by jumping right into the design, deployment, and support of a customized Zscaler solution. You'll discover the capabilities of Zscaler through real-world deployment and explore Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) in detail.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
If you’re a designer working with Revit, this Autodesk Revit book will guide you through improving productivity and efficiency in your day-to-day tasks. With the help of this book, you'll be able to set up your Revit projects, explore Revit's core functionalities, use Dynamo for visual programming, and leverage Power BI to analyze BIM inform-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
This book focuses largely on different methodologies for connecting remote users, highlighting the benefits and drawbacks as well as step-by-step instructions. You’ll understand phishing prevention and log forwarding, and find a comprehensive section on troubleshooting common issues with the help of examples.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
This book is a technical reference that investigates, analyzes, and explains every part of the FastAPI framework and demonstrates the use of these parts by helping you solve problems. Some topics are experimental and original given the current development setups. Overall, the book is a recipe, blueprint, study, and reference combined into one.-
- PDF + ePub 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
With over 1000 practice questions, explanations of all 8 domains, and 2 full exams, this book is a fantastic exam prep solution. Take the CISSP exam (version May 2021) confidently with the help of mock questions and detailed solutions and validate your skills with the CISSP (ISC)2 certification.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
This second edition of Industrial Cybersecurity is a practical guide to implementing a comprehensive and solid security program for the ICS environment. This book shows anyone new to industrial security or professionals looking to extend their industrial security posture how to effectively monitor their ICS environment.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
Mastering Microsoft Endpoint Manager will teach you how to manage your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing a new and simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
This book explores how Nmap is one of the most robust tools for network discovery and security auditing. You’ll focus on how you can use it to perform hundreds of different tasks, from OS detection and port scanning to advanced fingerprinting and vulnerability exploitation.-
- PDF + ePub + Mobi 29 pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł (-80%) -
-
Promocja
With six new chapters, Deep Reinforcement Learning Hands-On Second edition is completely updated and expanded with the very latest reinforcement learning (RL) tools and techniques, providing you with an introduction to RL, as well as the hands-on ability to code intelligent learning agents to perform a range of practical tasks.-
- PDF + ePub + Mobi 29 pkt
(197,10 zł najniższa cena z 30 dni)
29.90 zł
219.00 zł (-86%) -
-
Promocja
Cyber Warfare – Truth, Tactics, and Strategies takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools and strategies presented for you to learn how to think about defendin-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
AWS Security Cookbook lists all the practical solutions to the common problems faced by individuals or organizations in securing their instances. Here readers will learn to troubleshoot security concerns and understand additional patterns and services for securing AWS infrastructure.-
- PDF + ePub + Mobi 29 pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
A new edition of the bestselling Pandas cookbook updated to pandas 1.x with new chapters on creating and testing, and exploratory data analysis. Recipes are written with modern pandas constructs. This book also covers EDA, tidying data, pivoting data, time-series calculations, visualizations, and more.-
- PDF + ePub + Mobi 29 pkt
(197,10 zł najniższa cena z 30 dni)
29.90 zł
219.00 zł (-86%) -
-
Promocja
Hands-On Restful Web Services with Go will help you in understanding the fundamentals of REST and enable you to quickly develop graceful API with the help of Golang's open-source tools and libraries. It can be a developer guide in general that covers all key aspects of API development and standard architecture patterns in application development.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10.-
- PDF + ePub + Mobi 29 pkt
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł (-67%) -
-
Promocja
Kubernetes is a widely used opensource orchestration platform for managing container applications. Developers are not yet aware of the pitfalls of a containerized environment. This book takes you through core security principles, best practices, and real-world use cases to learn mitigation or prevention strategies from known attacks and CVEs.-
- PDF + ePub + Mobi 29 pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł (-73%) -
-
Promocja
After prominent market leaders have been impacted by advanced cyber threats, network security has become a top priority in terms of successfully keeping attackers from breaching networks. This book will help you design a robust network security ecosystem that helps prevent traditional and new and evolving attacks.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
AWS is a very popular cloud service that many organizations are implementing into their infrastructure. AWS Penetration Testing is a comprehensive introduction for those who are new to AWS and Ethical hacking, that will have you up-to-speed in no time.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
This Learning Path focuses on showing you how to leverage the benefits of the cloud and create applications that are high in performance and availability. It teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud.-
- PDF + ePub + Mobi 29 pkt
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł (-83%) -
-
Promocja
Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.-
- PDF + ePub + Mobi 29 pkt
(80,91 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł (-82%) -
-
Promocja
Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.-
- PDF + ePub + Mobi 29 pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł (-75%) -
-
Promocja
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.-
- PDF + ePub + Mobi 29 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł (-78%) -
-
Promocja
Web Components are the set of APIs that helps you build standard UI functions that work across any browser, with any JavaScript framework. This practical guide will help you fulfill this promise through examples and best practices. It will help you implement the web components in your existing frontend application to let you fully realize the capab-
- PDF + ePub + Mobi 29 pkt
(58,49 zł najniższa cena z 30 dni)
29.90 zł
64.99 zł (-54%) -
Korzystając z tej strony zgadzasz się na używanie plików cookie, które są przechowywane na Twoim urządzeniu. Za pośrednictwem cookies zbieramy informacje, które mogą stanowić dane osobowe. Wykorzystujemy je w celach analitycznych, marketingowych oraz aby dostosować treści do Twoich preferencji i zainteresowań. Więcej informacji, w tym sposób zmiany ustawień znajdziesz w Polityce Prywatności.


