BPB is Asia's largest publishers of Computer & IT books. For the last 63 years BPB has been a friend, philosopher and guide for programmers, developers, hardware technicians, IT Professionals who have made things happen in the IT World.
Wydawnictwo BPB Publications
Tytuły książek(ebooki,audiobooki) wydawnictwa: BPB Publications
-
Promocja
Master Python 3 to develop your offensive arsenal tools and exploits for ethical hacking and red teaming Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. This edition includes network protocol cracking, brute- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Master Kali Linux and become an ethical hacker Key Features Beginner-friendly step-by-step instruction. Hands-on labs and practical exercises. Covers essential tools and techniques. Description This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, expl- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) Key Features Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Promocja
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments Key Features A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. D- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość Promocja
Prepare yourself for any type of audit and minimise security findings Key Features It follows a lifecycle approach to information security by understanding: Why we need Information security How we can implement How to operate securely and maintain a secure posture How to face audits Description This book is a guide for Net- ePub + Mobi 67 pkt
(76,49 zł najniższa cena z 30 dni)
67.43 zł
89.90 zł (-25%) -
Nowość
Wireshark: A hackers guide to network insights Key Features Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. Description Ethical Hacking and Network Analysis with Wires- ePub + Mobi 84 pkt
-
Nowość
Identify vulnerabilities across applications, network and systems using simplified cybersecurity scripting Key Features Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. Includes powerful Python libraries to analyze the we- ePub + Mobi 84 pkt
-
Nowość
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. Key Features Courseware and practice papers with solutions for C.E.H. v11. Includes hacking tools, social engineering techniques, and live exercises. Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing.. Description The 'Ce- ePub + Mobi 84 pkt
-
Nowość
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks Key Features Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. Extensive coverage of Android and iO- ePub + Mobi 84 pkt
-
Nowość
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark Key Features Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to- ePub + Mobi 84 pkt
-
Nowość
Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett- ePub + Mobi 84 pkt