BPB is Asia's largest publishers of Computer & IT books. For the last 63 years BPB has been a friend, philosopher and guide for programmers, developers, hardware technicians, IT Professionals who have made things happen in the IT World.
Wydawnictwo BPB Publications
Tytuły książek(ebooki,audiobooki) wydawnictwa: BPB Publications
-
Promocja
Master Python 3 to develop your offensive arsenal tools and exploits for ethical hacking and red teaming Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. This edition includes network protocol cracking, brute- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Master Kali Linux and become an ethical hacker Key Features Beginner-friendly step-by-step instruction. Hands-on labs and practical exercises. Covers essential tools and techniques. Description This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, expl- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Description This simple, well organized book provides the theory as well as the practical aspects of computer network. It covers the pillars of a computer network, like transmission, data transfer, and communication. It covers foundational concepts, explaining the OSI and TCP/IP models, digital transmission, interfaces, modems, and media character- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) Key Features Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments Key Features A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. D- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Description Unlock the power of AWS and elevate your cloud expertise with "Mastering AWS for Cloud Professionals." This comprehensive guide illuminates the path to cloud mastery, offering a blend of theoretical knowledge and practical expertise. Dive deep into Amazon Web Services (AWS), exploring its vast potential to revolutionize business operati- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Build decentralized applications using Blockchains core technology Key Features Explore the engineering mechanism of Blockchain, Cryptocurrency, and Ethereum. Know-how of peer-to-peer networks, IPFS, and decentralised databases. Explore the working of DApps and build your own blockchain app. Description Blockchain is a revolutionary- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
A Game Changer for WFH Practitioners Key Features Get to know the challenges and benefits of VoIP. Explore in-depth coverage on methodologies of the VoIP system. Includes the VoIP economic model, technology model, and in-practices. Description VoIP Telephony and You introduces you to new and advanced ways of communicating over traditional tel- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Prepare yourself for any type of audit and minimise security findings Key Features It follows a lifecycle approach to information security by understanding: Why we need Information security How we can implement How to operate securely and maintain a secure posture How to face audits Description This book is a guide for Net- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość
Wireshark: A hackers guide to network insights Key Features Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. Description Ethical Hacking and Network Analysis with Wires- ePub + Mobi 84 pkt
-
Nowość
Identify vulnerabilities across applications, network and systems using simplified cybersecurity scripting Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. Includes powerful Python libraries to analyze the we- ePub + Mobi 84 pkt
-
Nowość
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. Key Features Courseware and practice papers with solutions for C.E.H. v11. Includes hacking tools, social engineering techniques, and live exercises. Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing.. Description The 'Ce- ePub + Mobi 84 pkt
-
Nowość
Learn, Master & Ace VMware Network Virtualization Exam #2V0-642 with hands-on knowledge Key Features Get your grips on the basics of NSX-V network virtualization platform Explore NSX core components along with a detailed compare and contrast of its benefits and implementation In-depth practical demonstration of network function virtualisation- ePub + Mobi 84 pkt
-
Nowość
Building trust among customers and service providers in the zero trust environment. Key Features Visual demonstration of Blockchain fundamentals and concepts of Bitcoin. Easy understanding of Bitcoin internals with the help of Python and its procedural language features. Includes questions and programming exercises to help readers test their s- ePub + Mobi 84 pkt
-
Nowość
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks Key Features Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. Extensive coverage of Android and iO- ePub + Mobi 84 pkt
-
Nowość
Automate Your Network Configuration, Management, and Operation Tasks with Python Key Features Get familiar with the basics of network automation. Understand how to automate various network devices like Routers, Switches, Servers, and Firewalls. Learn how to create customized scripts to manage multiple devices using Python. Description Python- ePub + Mobi 84 pkt
-
Nowość
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark Key Features Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to- ePub + Mobi 84 pkt
-
Nowość
Description Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future at- ePub + Mobi 84 pkt
-
Nowość
Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett- ePub + Mobi 84 pkt