BPB is Asia's largest publishers of Computer & IT books. For the last 63 years BPB has been a friend, philosopher and guide for programmers, developers, hardware technicians, IT Professionals who have made things happen in the IT World.
Wydawnictwo BPB Publications
Tytuły książek(ebooki,audiobooki) wydawnictwa: BPB Publications
-
Promocja
Take your career to the next level by becoming an ISC2 certified cloud security professional (CCSP) Key Features Prepares you to crack the ISC2 CCSP exam successfully. Provides you with concrete knowledge and skills to secure your organizations cloud. Covers all six domains of the CCSP exam in detail for a clear understanding of cloud security- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Learn to decode the Cyber Mysteries by Mastering Network Forensics Key Features Master all essential network forensics topics with in-depth coverage. Learn from real-world examples and detailed case studies. Gain hands-on experience with network forensic tools and techniques. Description Network forensics is a rapidly growing field with a hig- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Fortify your mobile world: Discover cutting-edge techniques for mobile security testing Key Features Learn basic and advanced penetration testing with mobile devices. Learn how to install, utilize, and make the most of Kali NetHunter. Design and follow your cybersecurity career path. Description Mobile devices are vital in our lives, so secu- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Description This book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,- ePub + Mobi 48 pkt
(58,49 zł najniższa cena z 30 dni)
48.74 zł
64.99 zł (-25%) -
Promocja
Everything you need to know to secure your IoT devices Key Features Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities that can affect IoT devices. Implement security measures to protect IoT devices from attack. Description The Internet of Things (IoT) is a rapidly growing- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Learn how to leverage DevSecOps to secure your modern enterprise in the cloud Key Features Explore DevSecOps principles, fundamentals, practices, and their application in AWS environments comprehensively and in-depth. Leverage AWS services and tools to enhance security within your DevSecOps pipeline, gaining deep insights. Implement DevSecOps- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
The definitive guide to installing and configuring IBM FileNet Information Management software Key Features Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboar- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
A comprehensive guide to Multi-Cloud Administration for Cloud professionals Key Features Get familiar with the various components involved in establishing a multi-cloud architecture. Acquire the skills to effectively manage multi-cloud environments. Establish guardrails and guidelines to ensure interoperability and security across multiple clo- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more Key Features Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advanc- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Secure your applications and development environments with Docker and Kubernetes Key Features Introducing Container platforms (Docker, Kubernetes, Swarm, OpenShift Discover how to manage high availability with Docker Swarm and Kubernetes Learn how Docker can manage the security in images and containers Discover how Docker c- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Learn to secure your personal data & reclaim your online privacy! Key Features Understand your cyber risk exposure by calculating your Privacy Score Improve your Privacy Score with easy-to-follow recommendations Different recommendations for different levels of expertise YOUR choice! An interactive book with inline QR code r- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Learn how to build an end-to-end Web application security testing framework Description Hands-on Penetration Testing for Web Applications offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce appli- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Step-by-step guide to learning the role of E-commerce in our economy Key Features Hands-on with the concept of E-Commerce and E-Business. Understand the know-how of working of E-Commerce framework. Learn the type of E-Payment system and its mechanism. Understanding Brand building and Digital Marketing methods. Description- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features Real-case studies and true events on cyber crime incidents. Learn how to protect yourself from cyber threats and assist police for crime investigation. Coverage on financial frauds, social media crimes, mobile payment f- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość
Perform effective and efficient penetration testing in an enterprise scenario Key Features Understand the penetration testing process using a highly customizable modular framework. Exciting use-cases demonstrating every action of penetration testing on target systems. Equipped with proven techniques and best practices from seasoned pen-testing- ePub + Mobi 84 pkt
-
Nowość
Exploring techniques and tools and best practices used in the real world. Key Features Explore private and public key-based solutions and their applications in the real world. Learn about security protocols implemented at various TCP/IP stack layers. Insight on types of ciphers, their modes, and implementation issues.. Description Cryptograph- ePub + Mobi 84 pkt
-
Nowość
With Azure security, you can build a prosperous career in IT security. Key Features In-detail practical steps to fully grasp Azure Security concepts. Wide coverage of Azure Architecture, Azure Security services, and Azure Security implementation techniques. Covers multiple topics from other Azure certifications (AZ-303, AZ-304, and SC series).- ePub + Mobi 84 pkt
-
Nowość
Building and securely deploying container-based applications with Docker and Kubernetes using open source tools. Key Features Real-world examples of vulnerability analysis in Docker containers. Includes recommended practices for Kubernetes and Docker with real execution of commands. Includes essential monitoring tools for Docker containers and- ePub + Mobi 84 pkt
-
Nowość
Lead the digital transformation wave with Microsoft Teams Key Features Explore numerous business scenarios to gain a better grasp of Microsoft Dataverse for Teams Build your first app with step-by-step instructions and expand features with flows and bots. Find more about the application, environment, and licensing lifecycle management. Descri- ePub + Mobi 84 pkt
-
Nowość
Key Features Learn how to defend industrial control systems from an attacking standpoint. Learn about industrial network protocols and threat hunting. Handling of tackle industrial cyber risks Develop offensive and defensive skills. Description In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be use- ePub + Mobi 84 pkt
-
Nowość
Understand and Conduct Ethical Hacking and Security Assessments Key Features Practical guidance on discovering, assessing, and mitigating web, network, mobile, and wireless vulnerabilities. Experimentation with Kali Linux, Burp Suite, MobSF, Metasploit and Aircrack-suite. In-depth explanation of topics focusing on how to crack ethical hackin- ePub + Mobi 84 pkt
-
Nowość
Discover security posture, vulnerabilities, and blind spots ahead of the threat actor Key Features Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks. Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning, Secure Code Review, and bypas- ePub + Mobi 84 pkt
-
Nowość
Knowing your threat actors together with your weaknesses and the technology will master your defense Key Features Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin- ePub + Mobi 84 pkt
-
Nowość
Security is a shared responsibility, and we must all own it Key Features Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components. Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams. Adopts a perspective of developing a Cybersecurity str- ePub + Mobi 84 pkt
-
Nowość
Description Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future at- ePub + Mobi 84 pkt
-
Nowość
Description In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It- ePub + Mobi 64 pkt
-
Promocja
Description AWS, a leading cloud platform, demands effective security measures. This certification guide is your key to mastering AWS security best practices and passing the AWS Certified Security Specialty exam. This guide covers AWS cloud security, from basic concepts like shared responsibility and risk assessment to advanced topics like infrast- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%)