BPB Publications [IT -30%]
-
Promocja
Description The building blocks of any large-scale distributed system such as an AI cluster are compute, storage, and network. The network infrastructure connects all the components enabling data transfer, communication, and coordination between compute nodes, storage devices, and AI applications. The network is also the slowest component among the-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Master Python 3 to develop your offensive arsenal tools and exploits for ethical hacking and red teaming KEY FEATURES Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. This edition includes network protocol cracking, brute-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
The book is designed for a practical approach to learning, with examples based on scenarios. It covers possible OSINT blueprints from the beginning to an advanced level Key Features Learn about OSINT and how to set up an OSINT environment for investigations. Master techniques for tracking fraud SMS and investigating emails. Explore reverse ima-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Master Kali Linux and become an ethical hacker Key Features Beginner-friendly step-by-step instruction. Hands-on labs and practical exercises. Covers essential tools and techniques. Description This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, expl-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description This book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Unveiling the future: Navigating AI's Intricate Intersection with International Law A Journey Beyond Hype and Governance KEY FEATURES Comprehensive overview of AI ethics and international law. Exploration of pragmatic approaches to AI governance. Navigation of global legal dynamics. Soft law recommendations for responsible AI development. D-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Everything you need to know to secure your IoT devices KEY FEATURES Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities that can affect IoT devices. Implement security measures to protect IoT devices from attack. DESCRIPTION The Internet of Things (IoT) is a rapidly growing-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Learn how to leverage DevSecOps to secure your modern enterprise in the cloud KEY FEATURES Explore DevSecOps principles, fundamentals, practices, and their application in AWS environments comprehensively and in-depth. Leverage AWS services and tools to enhance security within your DevSecOps pipeline, gaining deep insights. Implement DevSecOps-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Crack a ransomware by identifying and exploiting weaknesses in its design KEY FEATURES Get an overview of the current security mechanisms available to prevent ransomware digital extortion. Explore different techniques to analyze a ransomware attack. Understand how cryptographic libraries are misused by malware authors to code ransomwares. DES-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
A comprehensive guide to Kubernetes, Service Mesh, and Zero-Trust principles KEY FEATURES Delve into security practices that guarantee resilience and secure deployments. Discover strategies for managing Kubernetes clusters, enhancing performance, and achieving high availability and scalability. Acquire a conceptual understanding of the challen-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) KEY FEATURES Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
The definitive guide to installing and configuring IBM FileNet Information Management software KEY FEATURES Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboar-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
A comprehensive guide to Multi-Cloud Administration for Cloud professionals KEY FEATURES Get familiar with the various components involved in establishing a multi-cloud architecture. Acquire the skills to effectively manage multi-cloud environments. Establish guardrails and guidelines to ensure interoperability and security across multiple clo-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more KEY FEATURES Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advan-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments KEY FEATURES A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. D-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Learn the various aspects of Cyber Security concepts. Key Features Strengthens the foundations, as detailed explanation of the concepts are given. Simple language, crystal clear approach, straight forward comprehensible presentation. Adopting user-friendly classroom lecture style. The concepts are duly supported by several examples. Previous-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
A practical book that will help you defend against malicious activities Key Features Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out Learn how to choose, design and implement a cybersecurity program that best fits your needs Learn how to improve a cybersecurity program and accompanyi-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Step-by-step guide to learn Ripple and explore $155 trillion+ market on international remittance Key Features Know the inefficiencies of banks in international remittance and how Ripple can help Learn Ripples architecture and its product offerings such as xCurrent, xRapid, and xVia Acquire development skills on Ripples XRP ledger Understand and-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Secure your applications and development environments with Docker and Kubernetes Key Features Introducing Container platforms (Docker, Kubernetes, Swarm, OpenShift Discover how to manage high availability with Docker Swarm and Kubernetes Learn how Docker can manage the security in images and containers Discover how Docker can be integrated int-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Learn how to redesign NLP applications from scratch. Key Features Get familiar with the basics of any Machine Learning or Deep Learning application. Understand how does preprocessing work in NLP pipeline. Use simple PyTorch snippets to create basic building blocks of the network commonly used in NLP. Get familiar with the advanced embedding tec-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Learn to secure your personal data & reclaim your online privacy! Key Features Understand your cyber risk exposure by calculating your Privacy Score Improve your Privacy Score with easy-to-follow recommendations Different recommendations for different levels of expertise YOUR choice! An interactive book with inline QR code references for furth-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Learn how to build an end-to-end Web application security testing framework Description Hands-on Penetration Testing for Web Applications offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce applicati-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Step-by-step guide to learning the role of E-commerce in our economy Key Features Hands-on with the concept of E-Commerce and E-Business. Understand the know-how of working of E-Commerce framework. Learn the type of E-Payment system and its mechanism. Understanding Brand building and Digital Marketing methods. Description Electronic Commerce (E-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Getting familiar with cloud computing features from scratch to advanced. Description Cloud computing is a technology that allows you to store, access data and programs over the internet instead of the hard drive or a server. In this book, you will gain knowledge about the fundamentals of cloud computing. This book includes a detailed description-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features Real-case studies and true events on cyber crime incidents. Learn how to protect yourself from cyber threats and assist police for crime investigation. Coverage on financial frauds, social media crimes, mobile payment f-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Basic to Advance research on the concepts and design of Cloud computing Key Features Comprehensively gives clear picture of current state-of-the-art aspect of cloud computing by elaborating terminologies, models and other related terms. Enlightens all major players in Cloud Computing industry providing services in terms of SaaS, PaaS and IaaS.-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Prepare yourself for any type of audit and minimise security findings Key Features It follows a lifecycle approach to information security by understanding: Why we need Information security How we can implement How to operate securely and maintain a secure posture How to face audits Description This book is a guide for Network professiona-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Wireshark: A hackers guide to network insights KEY FEATURES Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. DESCRIPTION Ethical Hacking and Network Analysis with Wires-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Perform effective and efficient penetration testing in an enterprise scenario Key Features Understand the penetration testing process using a highly customizable modular framework. Exciting use-cases demonstrating every action of penetration testing on target systems. Equipped with proven techniques and best practices from seasoned pen-testing-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
More practical less theory Key Features In-depth practical demonstration with multiple examples of reverse engineering concepts. Provides a step-by-step approach to reverse engineering, including assembly instructions. Helps security researchers to crack application code and logic using reverse engineering open source tools. Reverse engineerin-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Exploring techniques and tools and best practices used in the real world. Key Features Explore private and public key-based solutions and their applications in the real world. Learn about security protocols implemented at various TCP/IP stack layers. Insight on types of ciphers, their modes, and implementation issues. Description Cryptography-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Identify vulnerabilities across applications, network and systems using simplified cybersecurity scripting Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. Includes powerful Python libraries to analyze the web-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
With Azure security, you can build a prosperous career in IT security. Key Features In-detail practical steps to fully grasp Azure Security concepts. Wide coverage of Azure Architecture, Azure Security services, and Azure Security implementation techniques. Covers multiple topics from other Azure certifications (AZ-303, AZ-304, and SC series).-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. Key Features Courseware and practice papers with solutions for C.E.H. v11. Includes hacking tools, social engineering techniques, and live exercises. Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing. Description The 'Certi-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Building and securely deploying container-based applications with Docker and Kubernetes using open source tools. Key Features Real-world examples of vulnerability analysis in Docker containers. Includes recommended practices for Kubernetes and Docker with real execution of commands. Includes essential monitoring tools for Docker containers and-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Lead the digital transformation wave with Microsoft Teams Key Features Explore numerous business scenarios to gain a better grasp of Microsoft Dataverse for Teams Build your first app with step-by-step instructions and expand features with flows and bots. Find more about the application, environment, and licensing lifecycle management. Descrip-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
KEY FEATURES Learn how to defend industrial control systems from an attacking standpoint. Learn about industrial network protocols and threat hunting. Handling of tackle industrial cyber risks Develop offensive and defensive skills. DESCRIPTION In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Understand and Conduct Ethical Hacking and Security Assessments Key Features Practical guidance on discovering, assessing, and mitigating web, network, mobile, and wireless vulnerabilities. Experimentation with Kali Linux, Burp Suite, MobSF, Metasploit and Aircrack-suite. In-depth explanation of topics focusing on how to crack ethical hacking i-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Discover security posture, vulnerabilities, and blind spots ahead of the threat actor KEY FEATURES Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning, Secure Code Review, and bypas-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Security is a shared responsibility, and we must all own it KEY FEATURES Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components. Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams. Adopts a perspective of developing a Cybersecurity stra-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Start your journey in this exciting Android app development world KEY FEATURES Start your Kotlin adventure from the very fundamentals to sophisticated Android programming. Experience live coding of a video application, game design, and chat application. Explore the Android framework, app creation, testing, and publication to the Google Play st-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. Extensive coverage of Android and iO-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
A Guide to Enter the Journey of a Digital Forensic Investigator KEY FEATURES Provides hands-on training in a forensics lab, allowing learners to conduct their investigations and analysis. Covers a wide range of forensics topics such as web, email, RAM, and mobile devices. Establishes a solid groundwork in digital forensics basics including evi-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark KEY FEATURES Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to-
-
ebook
55 pkt
(71,91 zł najniższa cena z 30 dni)
55.93 zł
79.90 zł (-30%) -
-
Promocja
Description Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future at-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware. This book is a comprehensive-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Vulnerability Assessment and Penetration Testing (VAPT) combinations are a huge requirement for all organizations to improve their security posture. The VAPT process helps highlight the associated threats and risk exposure within the organization. This book covers practical VAPT technologies, dives into the logic of vulnerabilities, and-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description The cloud is ubiquitous. Everyone is rushing to the cloud or is already in the cloud, and both of these groups are concerned with cloud security. In this book, we will explain the concepts of security in a beginner friendly way, but also hint at the great expanse of knowledge that lies beyond. This book offers a detailed guide to cloud-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cloud computing is transforming the way businesses and individuals operate, offering scalability, flexibility, and efficiency. Cloud Computing for Everyone provides a structured and practical approach to understanding cloud technology, from foundational concepts to advanced applications. The book also covers service models, deployment s-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description In the ever-evolving landscape of Cloud technology, every project demands a robust, high-performance, scalable and secure foundation. Whether you're deploying traditional Virtual Machines or pioneering modern Artificial Intelligence solutions, a well designed Azure Networking infrastructure is critical for success. This book simplifies-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web applications, including online banking, mobile payments, and e-commerce applications. Covering a diverse array of topics, this book provides a comprehe-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Social engineering can be the most dangerous and effective type of hacking because the human component is notoriously the weakest link in the security chain. This Social Engineering Cookbook encompasses a blend of theoretical and practical knowledge that focuses on psychological manipulation of people to gain confidential information an-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Information security leadership demands a holistic understanding of governance, risk, and technical implementation. This book is your roadmap to mastering information security leadership and achieving the coveted EC-Council CCISO certification. This book bridges the gap between technical expertise and executive management, equipping you-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Designing a scalable Unity project requires more than just codingit demands thoughtful planning, structured architecture, and adherence to best practices. This book is your ultimate guide to building modular and maintainable Unity projects using C# and proven game architecture techniques. This book provides the tools and knowledge you n-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Take your career to the next level by becoming an ISC2 certified cloud security professional (CCSP) KEY FEATURES Prepares you to crack the ISC2 CCSP exam successfully. Provides you with concrete knowledge and skills to secure your organizations cloud. Covers all six domains of the CCSP exam in detail for a clear understanding of cloud security-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Learn to decode the Cyber Mysteries by Mastering Network Forensics KEY FEATURES Master all essential network forensics topics with in-depth coverage. Learn from real-world examples and detailed case studies. Gain hands-on experience with network forensic tools and techniques. DESCRIPTION Network forensics is a rapidly growing field with a hi-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Your practical handbook for securing cloud-native applications KEY FEATURES An overview of security in cloud-native applications, such as modern architectures, containers, CI/CD pipeline, and so on. Using automation, such as infrastructure as code and policy as code, to achieve security at scale. Implementing security, from encryption and secr-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
JaagoTeens cyber safety guide KEY FEATURES Making digital payments without being scammed and losing your money. Learning how to file a complaint with the cyber police if something goes wrong. Get some easy tips to ensure that your kids stay safe on the internet. DESCRIPTION This book is a step-by-step guide that handholds you through all the-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Fortify your mobile world: Discover cutting-edge techniques for mobile security testing KEY FEATURES Learn basic and advanced penetration testing with mobile devices. Learn how to install, utilize, and make the most of Kali NetHunter. Design and follow your cybersecurity career path. DESCRIPTION Mobile devices are vital in our lives, so secu-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description GKE simplifies deploying and managing containerized applications, a crucial skill in today's cloud-native landscape. This book guides you from foundational concepts to practical implementation, preparing you to effectively use GKE for scalable and reliable deployments. The book begins with an introduction to containerization and Kubern-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Microsoft Defender for Endpoint is a powerful tool for securing your environment, and this book is your practical guide to using it effectively. Written by an engineer who works hands-on with the daily challenges of IT infrastructure, it covers everything from on-prem data centers to cloud platforms like AWS, Azure, and GCP, across Wind-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description CompTIA Advanced Security Practitioner (CASP+) is a vendor-neutral security certification. It validates advanced-level core technical skills, including active management of security engineering, operations, incidents, handling enterprise-level risk assessments, and IT governance. This book navigates the critical domains of the CASP+ ex-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cyber threats are evolving unprecedentedly, making CyberSecurity defense a crucial skill for professionals and organizations. This book is a comprehensive guide designed to equip readers with the knowledge, strategies, and best practices to secure digital assets, mitigate risks, and build resilient security frameworks. It covers the fu-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Unlock the power of eBPF, the revolutionary Linux kernel technology transforming observability, networking, and security. This book serves as your comprehensive resource to master this cutting-edge technology, whether you are a beginner exploring its potential or a seasoned professional seeking in-depth knowledge. Embark on a structure-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description In today's ever-expanding digital world, cyber threats are constantly evolving, and organizations are struggling to keep pace. Managing the Cyber Risk equips CISOs and security professionals with the knowledge and strategies necessary to build a robust defense against these ever-present dangers. This comprehensive guide takes you on a-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description In today's interconnected world, organizations face increasing challenges in managing the complex landscape of information security, risk, and compliance. This book provides a practical framework for navigating these challenges, enabling professionals to establish and maintain robust systems that protect sensitive data, adhere to regula-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Digital forensics is a key technology of the interconnected era, allowing investigators to recover, maintain, and examine digital evidence of cybercrime. With ever-increasingly sophisticated digital threats, the applications of digital forensics increase across industries, aiding law enforcement, business security, and judicial processe-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Golang has emerged as a powerful language for networking, known for its efficiency and concurrency, making it ideal for building resilient and scalable network applications. This book is designed to equip networking professionals with the Golang skills needed to navigate this dynamic landscape, providing a practical guide from fundament-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description The book aims to familiarize the readers with network traffic analysis technologies, giving a thorough understanding of the differences between active and passive network traffic analysis, and the advantages and disadvantages of each methodology. It has a special focus on network flow traffic analysis which, due to its scalability, priv-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description In an era where telecommunication networks form the backbone of our digital society, this book provides a definitive resource for understanding and implementing robust security measures across various generations of telecom infrastructure. From the fundamental security challenges of 1G networks to the complex threat landscape of 5G, thi-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Network administrators are crucial in safeguarding data through cybersecurity, optimizing cloud resources, and ensuring secure remote connections, vital for maintaining seamless IT infrastructures. CompTIA Network+ Certification has become the industry standard for validating essential networking skills, making it crucial for IT profess-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have become everyday news. This book offers concepts and practical insights for setting up and managing a security operations center. You will understand why SOCs are essential in the current cyber landscape, how to build one from scratch, and-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description As organizations rapidly migrate to cloud environments, robust cloud security is no longer optionalit is paramount. The Practical Cloud Security Handbook is your essential guide to navigating this complex landscape, empowering you to secure digital assets effectively and confidently in the era of distributed systems and cloud-native arc-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Understanding how systems are secured and how they can be breached is critical for robust cybersecurity in an interconnected digital world. The book offers a clear, practical roadmap for mastering ethical hacking techniques, enabling you to identify and fix vulnerabilities before malicious actors can exploit them. This book guides you-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidden intrusions and subtle attack behaviors that evade traditional tools. Cyber threats are evolving faster than ever. It is used by modern attackers as an advanced technique to infiltrate systems, evade detection, and exploit vulnerabilitie-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description SRE is a set of principles and practices that apply a software engineers approach and help IT operations. The role of the site reliability engineer (SRE) is to bridge the gap between development and operations, ensuring that systems are not only robust but also performant. SRE aims to deliver a highly scalable and reliable software syst-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cloud computing has become the backbone of modern computing. Cloud is the driving force for innovation in all industries and sectors. Any new technology, invention, or advancement can be directly or indirectly contributed to the cloud. Amazon Web Services (AWS) is the pioneer and the worlds largest public cloud provider with the highest-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cloud platforms like Google Cloud are essential for delivering scalable and reliable systems, but with increased speed comes greater security risk. As threats grow more complex, securing cloud-native workloads has become a vital skill for developers, engineers, and security teams alike. This book provides a hands-on guide to securing r-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description There has been a rise in demand for cybersecurity professionals who can identify vulnerabilities proactively in applications and infrastructure and offer their skills and expertise in the form of remedial actions to plug these vulnerabilities. CPENT is one such examination testing the skills and expertise of a penetration testing profes-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description The adoption of the Cloud brings many security challenges. Securing identities, data, and workloads while trying to stay on the right side of compliance regulations has become a priority for organizations. Mastering Azure Security is your essential handbook for defending applications and data against a complex threat landscape. Startin-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description As organizations increasingly migrate to cloud and multi-cloud infrastructures, cloud auditing has emerged as a critical discipline that bridges traditional compliance expectations with the complex, dynamic nature of cloud services. Unlike conventional IT audits, cloud auditing requires a specialized understanding of virtualized resourc-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description In an era defined by data-driven decision-making and AI-powered systems, safeguarding personal information has become both a legal mandate and a business imperative. As India embraces its own comprehensive data protection law, the Digital Personal Data Protection (DPDP) Act, 2023, organizations must adapt swiftly to meet rising expectat-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description For thousands of years, education has been shaped by technology, from clay tablets and hornbooks to the printing press and now to digital learning platforms and remote education systems. As artificial intelligence becomes more embedded in our daily lives, its role in education continues to explode. AI tools offer personalized instructio-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description The role of the IT team spans the full lifecycle of assets. It begins with the procurement and onboarding of IT resources, followed by configuration, governance, and identification of critical infrastructure. To ensure operational continuity, the IT team should establish robust backups, monitor system thresholds, and execute strategic c-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cyber threats are more complicated than ever, from zero-day exploits to advanced persistent threats. To keep digital assets safe from a constantly changing attack landscape, there is a huge need for skilled cybersecurity defenders, also known as the blue team. This book is a step-by-step guide to joining the front lines of defense. You-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description As modern infrastructures become increasingly automated, non-human identities, such as service accounts, API tokens, and automation agents, are emerging as critical security assets. Securing these identities is essential to protecting cloud-native environments, automated workflows, and machine-to-machine interactions from breaches, data-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description The technology landscape is changing fast; whether it is cloud computing, Zero Trust, AI, or the upcoming innovations of quantum computing. AI is already disrupting businesses and even everyday life. A successful security professional at any level of experience would need three key skills, namely functional acumen, business acumen, and-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description In the cyber world, securing the cloud is critical to an organizations business success. This book is about equipping the readers with the required knowledge and skills to perform a penetration test against an Azure infrastructure. Within this book, the readers will develop a detailed understanding of what Azure is and how its core comp-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Cybercrime is no longer a distant threat; it is a daily reality that affects people, businesses, and governments in today's hyper-connected world. It is important for everyone in every field to know how these attacks happen and how to protect themselves from them, from social media scams to advanced network intrusions. This book takes-
-
ebook
69 pkt
(85,49 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description AWS has revolutionized the technology landscape by providing on-demand and pay-as-you-go IT services. Builders can experiment at unprecedented scale and speed, delivering innovative business outcomes and enhanced value to customers. Businesses are moving more of their applications to AWS to take advantage of the cloud. The book begins-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description Security has become inseparable from the way modern organizations operate. Cloud platforms, mobile devices, and highly connected systems have changed how technology is built, and with that change comes a very different set of risks. As digital ecosystems expand, security engineering is no longer optional; it has become a core discipline-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description As digital services move to cloud, mobile, and online platforms, cybersecurity and cyber law have become inseparable. Technical controls reduce risk, while legal and ethical frameworks define what is acceptable, accountable, and defensible when incidents occur. This book starts with computing, networks, and cyber ethics, then builds co-
-
ebook
69 pkt
(85,49 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description In the cybersecurity landscape, traditional perimeter-based solutions are no longer enough to combat increasingly sophisticated attacks. The CompTIA Cybersecurity Analyst (CySA+) certification is a globally recognized, vendor-neutral credential that validates an individual's knowledge and skills in the area of cybersecurity analysis and-
-
ebook
69 pkt
(85,49 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description DevSecOps is the essential evolution of modern software delivery. This book is your definitive roadmap for mastering the shift, moving beyond theory to implement an automated continuous paradigm that drives measurable business value through VSM, SLAs, and KPIs for any large-scale organization. The book systematically guides you through-
-
ebook
69 pkt
(85,49 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Nowość Promocja
Description The most influential libraries in modern AI, Hugging Face Diffusers has become one of the key powering breakthroughs in text-to-image generation, reinforcement learning, and large-scale inference pipelines. This book bridges theory and real-world implementation, enabling readers to translate complex AI concepts into scalable, production-
-
ebook
69 pkt
(85,49 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Nowość Promocja
Description In the dynamic digital landscape, the importance of secure software cannot be overstated. This book is a complete, easy-to-follow roadmap for creating safety in every single step of the development process. The book starts with a foundational analysis of the state of secure software, establishing the groundwork for strategic planning a-
-
ebook
69 pkt
(85,49 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -
-
Promocja
Description AWS, a leading cloud platform, demands effective security measures. This certification guide is your key to mastering AWS security best practices and passing the AWS Certified Security Specialty exam. This guide covers AWS cloud security, from basic concepts like shared responsibility and risk assessment to advanced topics like infrast-
-
ebook
69 pkt
(89,91 zł najniższa cena z 30 dni)
69.93 zł
99.90 zł (-30%) -


