O. - ebooki
Tytuły autora: O. dostępne w księgarni Helion
-
Promocja
This comprehensive guide will help you understand practical aspects of information systems auditing. It covers key areas such as governance and management of IT, information systems acquisition, development, implementation and information systems operations, business resilience, and the crucial topic of protecting information assets.-
- PDF + ePub pkt
(143,10 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
Informatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym Wydawnictwo: Wyższa Szkoła Policji w Szczytnie(44,80 zł najniższa cena z 30 dni)
44.80 zł
56.00 zł(-20%) -
Promocja
The MS-100 certification validates your knowledge of identity and security aspects of a Microsoft 365 tenant. With the help of this book, you’ll explore core features such as self-service password reset and Azure AD identity protection, enabling you to implement Azure AD identity and secure access easily.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Najlepsze praktyki dotyczące korzystania z kryptografii Schematy i objaśnienia algorytmów kryptograficznych Książka pomaga w zrozumieniu technik kryptograficznych stosowanych w popularnych narzędziach, strukturach i protokołach, dzięki czemu Czytelnik łatwiej będzie mógł dokonać właściwych wyborów zabezpieczeń dla swoich systemów i aplikacji. Pub- ePub + Mobi pkt
(72,80 zł najniższa cena z 30 dni)
83.20 zł
104.00 zł(-20%) -
Promocja
Hacking jest w tym tomie rozpatrywany z różnych perspektyw, jako: przestępstwo, incydent cyberbezpieczeństwa, eksplorowanie i modyfikowanie systemów technicznych, społecznych i biologicznych, a najogólniej - jako przełamywanie zabezpieczeń.(195,98 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Promocja
Through this book, you’ll learn to administer core and advanced Windows Server and Infrastructure-as-a-Service workloads utilizing the available - on-premises, hybrid, and cloud technologies. All the skills you acquire will prepare you to ace the AZ-801: Configuring Windows Server Hybrid Advanced Services Exam.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
With Mastering Veeam Backup and Replication you’ll learn how to install Veeam Backup & Replication 12 on your system, the Core Architecture enhancements, as well as about other enhancements. You’ll also gain an understanding of security, Object Storage direct, and CDP with Cloud Connect.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.-
- PDF + ePub pkt
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
With .NET MAUI for C# Developers, you’ll learn to create cross-platform apps for iOS, Android, Windows, and Mac by writing the code once and leveraging the application to automatically produce native code for each. With the help of this book, you’ll be well prepared to build commercial MAUI programs that integrate into the overall .NE-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What-
- ePub + Mobi pkt
(194,65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of-
- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title.-
- PDF + ePub + Mobi pkt
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
The book: “PACKET TRACER FOR YOUNG BEGINNING ADMINS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configu-
- PDF + ePub + Mobi pkt
Packet Tracer for young beginning admins
Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek Smyczek
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
The book: “PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors ha-
- PDF + ePub pkt
(19,90 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You'll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
The Executive’s Cybersecurity Program Handbook helps you perform internal assessments to drive strategic cybersecurity program development and evaluate risk within an organization. With this book, you’ll be able to build an incident response team and implement administrative and technical security controls.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark KEY FEATURES Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
This book is a guide to help security professionals learn about the process of discovering and publishing vulnerabilities in software. They'll learn how to build and execute winning vulnerability research strategies and disclosure methods and find out exactly how to claim credit for their work by opening CVEs and sharing their research publicly.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
The go-to guide for building non-fungible token projects on the Ethereum blockchain KEY FEATURES Get an in-depth understanding of digital assets and crypto-collectables. Learn to create, test, and launch an ERC-721 token contract on the Ethereum testnet. Uncover effective ways to market and promote your NFTs on social media platforms. DESCRIP-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Combating Crime on the Dark Web gives you a deep understanding of how criminal elements operate on the dark web and how you can strategize and use various tools to disrupt those operations. If you’re looking to pave your way to an exciting and rewarding career in crime prevention, this book is a must-read.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Urządzenia wbudowane to mikrokomputery wielkości chipa na tyle małe, że można je włączyć w strukturę urządzenia, którym sterują. Znajdują się wszędzie - w telefonach, samochodach, kartach kredytowych, laptopach, sprzęcie medycznym, a nawet w infrastrukturze krytycznej. Oznacza to, że zrozumienie ich działania ma kluczowe znaczenie dla bezpieczeństw- ePub + Mobi pkt
(86,80 zł najniższa cena z 30 dni)
99.20 zł
124.00 zł(-20%) -
Promocja
DevSecOps in Practice with VMware Tanzu is a comprehensive learning reference covering the best-in-class tools that will aid in enhancing developer productivity, operational efficiency, and intrinsic security. This book will help you in laying out the easiest path to production for apps built to run in multi-cloud Kubernetes environments.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Zmieniająca się rzeczywistość administracyjna koreluje z wieloma obszarami, a wśród nich priorytetowe znaczenie ma bezpieczeństwo wewnętrzne. Zapewnianie i kształtowanie bezpieczeństwa wewnętrznego odbywa się w dużej mierze przez podmioty publiczne. Efektywność wykonywania przez nie zadań ma realny wpływ na eliminowanie lub neutralizowanie z
-
Promocja
Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve read this book, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives with ease.-
- PDF + ePub
- Audiobook MP3 pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book will prepare cybersecurity professionals for the SC-100 exam while also helping them build a strong foundation for implementing the strategies they learn. A mixture of theoretical and practical knowledge, as well as practice questions and a mock exam will ensure you're confident to take the exam.-
- PDF + ePub
- Audiobook MP3 pkt
(107,10 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł(-10%) -
-
Promocja
As hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.-
- PDF + ePub
- Audiobook MP3 pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, you’ll learn how cloud evolution affected identity strategy within the enterprise.-
- PDF + ePub
- Audiobook MP3 pkt
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book not only helps you gain a deep understanding of crucial information security concepts, but also supercharges your preparation for the CISM exam through interactive practice questions, flashcards, and exam tips.-
- PDF + ePub pkt
(152,10 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.-
- PDF + ePub pkt
(161,10 zł najniższa cena z 30 dni)
170.10 zł
179.00 zł(-5%) -
-
Promocja
This book will help you become confident with system administration and equip you with the knowledge required to get certified in Red Hat Enterprise Linux 9 RHCSA, the standard enterprise Linux used in data centers and the cloud worldwide.-
- PDF + ePub pkt
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
Pablo Iranzo Gómez, Pedro Ibanez Requena, Miguel Pérez Colino, Scott McCarty
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
-
Promocja
This guide to SASE services is for those implementing SD-WAN, SASE, cloud infrastructure, remote access, or integrating a multi-cloud strategy that may or may not include edge computing solutions. This book shows the past, present, and future of SASE and how you can learn today and prepare for the future.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book will help you discover the powerful capabilities of Dapr by implementing a sample application with microservices leveraging all the building blocks. Throughout the book, you’ll find out how Dapr helps you simplify the creation of resilient and portable microservices.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Network Protocols for Security Professionals is a comprehensive guide that will take you through the basics of network security and help you get to grips with the network, network devices, and traffic analysis-based attacks. The book covers practical ways to attack and defend network protocols.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Cybersecurity – Attack and Defense Strategies, Third Edition is a completely revised new edition of this bestselling book that covers the very latest security threats and defense strategies.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Helm is a powerful open-source tool for automating application deployments on Kubernetes. Managing Kubernetes Resources Using Helm provides you with the ability to significantly reduce operational stress around application deployment and lifecycle management.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Malware analysis is a powerful investigation technique widely used in various information security areas including digital forensics and incident response processes. With the help of this book, you’ll be able to use practical examples and comprehensive insights to analyze any type of malware you may encounter within the modern world.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
-
Promocja
Cyberatak to dzisiaj jedno z poważniejszych zagrożeń dla biznesu, a przygotowanie firmy do ataku hakerów, który nieuchronnie nastąpi, to jedno z największych wyzwań dla kadry zarządzającej. Mimo że o cyberbezpieczeństwie mówi się dużo, komunikaty, które docierają do typowego menedżera, trudno przełożyć na konkretne działania zarządcze. Książka Zdą- ePub + Mobi pkt
(34,90 zł najniższa cena z 30 dni)
51.92 zł
64.90 zł(-20%) -
Promocja
This book is a technical reference that investigates, analyzes, and explains every part of the FastAPI framework and demonstrates the use of these parts by helping you solve problems. Some topics are experimental and original given the current development setups. Overall, the book is a recipe, blueprint, study, and reference combined into one.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Check Point Firewall Administration R81.10+ is for security administrators to develop the skills necessary for effective deployment and operation of Check Point firewalls or high availability clusters. This book will help you to improve network segmentation and implement airtight access control policies.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
-
Promocja
With this edition, you'll be able to secure your company's data and users in today's threat landscape. This book will help you to holistically approach the method of securing your Windows environment, with best practice recommendations, real-world scenarios, and by guiding you through implementing a zero-trust multi-layered approach.-
- PDF + ePub pkt
(152,10 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces-
- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
Learn Wireshark provides an overview of protocol analysis. You’ll become more confident in navigating the interface while examining protocols such as TCP, IP, and ICMP. The book features tips on how to use display and capture filters, save, export, and share captures, create graphs, and become more proficient in troubleshooting latency issue-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book will take you through some key cybersecurity job roles and teach you the important technical and behavioral questions that will help you pass the interview, land the job, and grow in your cybersecurity career.-
- PDF + ePub
- Audiobook MP3 pkt
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
Ken Underhill, Mari Galloway, Christophe Foulon, Tia Hopkins
(170,10 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
This book provides ultimate coverage of concepts, tools, and resources required to take the CEH exam. By the end of this book, you'll have obtained the information necessary to prepare for the 312-50 exam and become a CEH v11 certified ethical hacker.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
-
Promocja
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book is your ultimate guide to OPNsense, an open-source next-generation firewall solution. The book comes packed with hands-on examples that will enable you to enhance network security like a professional.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin by creating your very first app from the get-go. You’ll learn how to use it as a means to explore and understand the Honeycode development environment and concepts.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.-
- PDF + ePub
- Audiobook MP3 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.-
- PDF + ePub pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This easy-to-follow guide is for network and security professionals who want to learn how to use Palo Alto's Next Generation Firewall, and how it can be leveraged to gain deep insight into the traffic, applications and threats that traverse your network.-
- PDF + ePub
- Audiobook MP3 pkt
(152,10 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł(-10%) -
-
Promocja
With the advent of microservices, Kubernetes, public cloud, and hybrid computing, site reliability and DevOps engineers are facing more complexity than ever before. Service mesh is an exciting new technology that promises to help tackle this complexity. A service mesh provides you with a unified control plane to manage application networking across-
- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Simplifying security concepts of Microsoft Azure and Microsoft 365, this book will help you gain knowledge necessary to take and pass Exam SC-900 to achieve the Microsoft Security, Compliance, and Identity Fundamentals certification. You'll be able to implement the acquired practical knowledge in real-world scenarios in no time.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.-
- PDF + ePub
- Audiobook MP3 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Mastering Cyber Intelligence provides critical knowledge that will help you stay ahead of adversaries and proactively protect your organization against known and unknown cyber threats. You'll build the security skills required to conduct effective threat intelligence, integrate it into operations, and identify gaps in security postures.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Security is integrated into every cloud, but most users take cloud security for granted. Revised to cover product updates up to early 2022, this book will help you understand Microsoft Azure's shared responsibility model that can address any challenge, cybersecurity in the cloud, and how to design secure solutions in Microsoft Azure.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
The evolving ransomware threat landscape brings new challenges to the security personnel of many organizations. The effects of human-operated attacks make practical security approaches the need of the hour as proper response and investigation are crucial. This book discusses how to use these approaches, focusing on real-world scenarios and tools.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
KEY FEATURES Learn how to defend industrial control systems from an attacking standpoint. Learn about industrial network protocols and threat hunting. Handling of tackle industrial cyber risks Develop offensive and defensive skills. DESCRIPTION In recent years, the industrial cybersecurity arena has risen dramatically. Red teams must be used-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Adopt distributed technology to deliver immutable data ownership solutions KEY FEATURES Understand how Blockchain is the backbone of bitcoin and smart contracts. Complete coverage across distributed systems, blockchain frameworks, smart contracts and wallet. Includes use-cases and current trends on the adoption of blockchain across different b-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Memory forensics is a vital part of modern digital forensic examinations as threat actors have started using memory-based malware more often. This comprehensive guide focuses on the application of modern memory forensics techniques to detect hidden threats in memory and reconstruct user activity based on volatile data.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This book covers in detail all the objectives of the SC-200: Microsoft Security Operations Analyst exam. The book offers a blend of theory and practical examples that will not only help you pass this exam but also implement the knowledge in real-world scenarios.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Over the past two decades, the booming ecommerce and fintech industries have become a breeding ground for fraud. Organizations that conduct business online are constantly engaged in a cat-and-mouse game with these invaders. In this practical book, Gilit Saporta and Shoshana Maraney draw on their fraud-fighting experience to provide best practices,-
- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
To najlepsza książka biznesowa roku 2021 według Financial Times & McKinsey. To thriller i zarazem przewodnik po zakamarkach cyberprzestrzeni. Prezentuje bogatą galerię szpiegów, hakerów, handlarzy bronią, naukowców, polityków i ludzi biznesu. Pokazuje kulisy działania NSA, GRU czy Mosadu. Wiele miejsca zajmuje w książce cyberbezpieczeństwo w- ePub + Mobi pkt
(79,90 zł najniższa cena z 30 dni)
63.92 zł
79.90 zł(-20%) -
Promocja
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This book is a guide to understanding new-age protocols and algorithms that are emerging for data protection in cybersecurity and information and communications technology (ICT) with the help of examples and use cases. You’ll begin by exploring classical cryptography and later progress to implementing algorithms for security and data privacy-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Lead the digital transformation wave with Microsoft Teams Key Features Explore numerous business scenarios to gain a better grasp of Microsoft Dataverse for Teams Build your first app with step-by-step instructions and expand features with flows and bots. Find more about the application, environment, and licensing lifecycle management. Descrip-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
W książce Ochrona cyberprzestrzeni Unii Europejskiej autorka analizuje działania podjęte przez Unię Europejską w ramach polityki ochrony cyberprzestrzeni przez UE jako obowiązku zabezpieczenia wspólnej przestrzeni bezpieczeństwa informacyjnego UE w obliczu współczesnych zagrożeń. Przeanalizowana została również aktualna strategia cyberbezpieczeństw- ePub + Mobi pkt
(58,80 zł najniższa cena z 30 dni)
67.20 zł
84.00 zł(-20%) -
Promocja
With this guide for developers, you'll learn how to build apps that use common cryptographic operations to improve security and respect user privacy. You'll understand how, when, and why to use safe, modern cryptographic algorithms and libraries in your code. You’ll learn using plenty of code samples in JavaScript for both Node.js and the br-
- PDF + ePub pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Building and securely deploying container-based applications with Docker and Kubernetes using open source tools. Key Features Real-world examples of vulnerability analysis in Docker containers. Includes recommended practices for Kubernetes and Docker with real execution of commands. Includes essential monitoring tools for Docker containers and-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Veeam provides data protection for modern-day technical organizations. This book takes you through installation best practices, optimizations, and the 3-2-1-1-0 rule, before going on to examine repository and proxy-related topics and advanced concepts such as CDP, extended object storage support, Veeam ONE enhancement, and Orchestrator.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
A good security posture is essential for an organization's Microsoft 365 tenant. This book will help you to understand how you can design and implement Information Protection within Microsoft 365 to protect your digital estate, on-premises as well as on SaaS platforms.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Use Microsoft’s own intelligent security service that brings together cloud security and AI to protect your organization. Microsoft Sentinel in Action will help you to gain enough understanding to make the most of Azure services and secure your environment against modern cybersecurity threats.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Encyclopedia on Blockchain for beginners and experts alike Key Features Includes the basics of Blockchain Comparative study of public Blockchains (Ethereum, Hashgraph, Cardano, Algorand, Solana etc.) Comparison of interoperable Blockchains (Polkadot vs. Cosmos vs. Polygon). Comparison of private permissioned DLTs (Fabric vs. R3 Corda vs. Quoru-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
CISM is a globally recognized and much sought-after certification in the field of IT security. CISM Certification Guide is aligned with the latest edition of the CISM Review Manual and offers you complete, up-to-date coverage of CISM exam content so you can take the exam with confidence, fully equipped to pass the first time.-
- PDF + ePub + Mobi pkt
(197,10 zł najniższa cena z 30 dni)
206.10 zł
229.00 zł(-10%) -
-
Promocja
Penetration Testing Azure for Ethical Hackers provides in-depth explanations of common security issues in Azure environments and tutorials on how to set up a pentesting lab and execute attacks on Azure assets. It will help you gain a deeper understanding of how Azure environments are configured, and more importantly, how they can be misconfigured.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Hands-On Dynamic Story Scripting with the ink Scripting Language shows you how to quickly move from learning the fundamentals of ink, the must-have narrative scripting language for games, to leveraging it to create everything from simple interactive stories to complex narrative-driven projects in Unity.-
- PDF + ePub + Mobi pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Security is a core component of any well-architected cloud environment and Azure is no different in this regard. With this book, you will learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environments and prepare to take the AZ-500 exam to validate your Azure security knowledge.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Dive into the world of securing digital networks, cloud, IoT, mobile infrastructure, and much more. Key Features Courseware and practice papers with solutions for C.E.H. v11. Includes hacking tools, social engineering techniques, and live exercises. Add on coverage on Web apps, IoT, cloud, and mobile Penetration testing. Description The 'Certi-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Mastering Microsoft Endpoint Manager will teach you how to manage your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing a new and simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
-
Promocja
With over 1000 practice questions, explanations of all 8 domains, and 2 full exams, this book is a fantastic exam prep solution. Take the CISSP exam (version May 2021) confidently with the help of mock questions and detailed solutions and validate your skills with the CISSP (ISC)2 certification.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Cybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.-
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
(76,49 zł najniższa cena z 30 dni)
80.91 zł
84.99 zł(-5%) -
-
Promocja
This book explores how Nmap is one of the most robust tools for network discovery and security auditing. You’ll focus on how you can use it to perform hundreds of different tasks, from OS detection and port scanning to advanced fingerprinting and vulnerability exploitation.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Blockchain technology continues to disrupt a wide variety of organizations, from small businesses to the Fortune 500. Today hundreds of blockchain networks are in production, including many built with Hyperledger Fabric. This practical guide shows developers how the latest version of this blockchain infrastructure provides an ideal foundation for d-
- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
Książka „Bezpieczny senior w Internecie” to poradnik, dedykowany nie tylko osobom starszym, ale również wszystkim czytelnikom bez względu na stopień zaawansowania informatycznego. Jest to kolejna pozycja po poprzednich tytułach naszego wydawnictwa: Smartfon, Laptop i Internet również dla seniora, które w podstawowy- PDF + ePub + Mobi pkt
(30,73 zł najniższa cena z 30 dni)
30.73 zł
45.00 zł(-32%) -
Promocja
Analiza złośliwego oprogramowania to ogromny biznes, gdyż ataki mogą słono kosztować firmę. Gdy malware naruszy Twoją obronę, musisz działać szybko, aby wyleczyć bieżące infekcje i zapobiec występowaniu przyszłych. Tych, którzy chcą być kilka kroków przed najnowszym złośliwym oprogramowaniem, książka Praktyczna analiza malware nauczy narzędzi i tec- ePub + Mobi pkt
(121,80 zł najniższa cena z 30 dni)
139.20 zł
174.00 zł(-20%) -
Promocja
Perform effective and efficient penetration testing in an enterprise scenario Key Features Understand the penetration testing process using a highly customizable modular framework. Exciting use-cases demonstrating every action of penetration testing on target systems. Equipped with proven techniques and best practices from seasoned pen-testing-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Wśród zagrożeń w cyberprzestrzeni szczególnie groźne jest zagrożenie cyberprzemocy – zagrożenie, które nie zawsze się dostrzega i wielokrotnie wręcz lekceważy, a które coraz częściej dotyka nas wszystkich. Najogólniej ujmując, cyberprzemoc możemy sprowadzić do prześladowania, zastraszania, szantażowania, nęk
-
Promocja
Antivirus Bypass Techniques follows a unique approach that will help you explore the security landscape, understand the fundamentals of antivirus software, and put antivirus bypass techniques to use. This book will enable you to bypass antivirus software solutions in order to develop efficient antivirus software.-
- PDF + ePub + Mobi pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book focuses largely on different methodologies for connecting remote users, highlighting the benefits and drawbacks as well as step-by-step instructions. You’ll understand phishing prevention and log forwarding, and find a comprehensive section on troubleshooting common issues with the help of examples.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
If you’re a designer working with Revit, this Autodesk Revit book will guide you through improving productivity and efficiency in your day-to-day tasks. With the help of this book, you'll be able to set up your Revit projects, explore Revit's core functionalities, use Dynamo for visual programming, and leverage Power BI to analyze BIM inform-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
By taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the-
- PDF + ePub
- Audiobook MP3 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Every minute of the day, there are petabytes of data exchanged between our homes, cars, businesses, and IoT devices. But just what exactly is involved when using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals will help you to understand common cryptographic techniques and terms used today to secure our data.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Książka Kryptografia. W teorii i praktyce jest uznawana w świecie za jeden z najlepszych podręczników do kryptografii. Publikacja składa się z trzech części. o Pierwsza obejmuje kryptografię klasyczną, z tajnym kluczem, zwaną symetryczną. Autor omawia w niej szyfry strumieniowe i elementy teorii informacji Shanonna. Szczegółowo opisuje i analizuje- ePub + Mobi pkt
(93,80 zł najniższa cena z 30 dni)
107.19 zł
134.00 zł(-20%) -
Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Information security strategies and best practices help in filling the gap that exists between theory and reality. The book starts by showing you how to implement risk management and governance structures into your organization and goes on to cover the best methods for operationalizing your information security strategy.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This book covers the finer details of microcontrollers and low-powered embedded device programming with TinyGo. You'll work through a range of interactive and real-world embedded projects that will help you to build creative thinking and understand a variety of TinyGo features and capabilities for programming hardware and multiple input devices.-
- PDF + ePub + Mobi pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features Real-case studies and true events on cyber crime incidents. Learn how to protect yourself from cyber threats and assist police for crime investigation. Coverage on financial frauds, social media crimes, mobile payment f-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service-
- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
Getting familiar with cloud computing features from scratch to advanced. Description Cloud computing is a technology that allows you to store, access data and programs over the internet instead of the hard drive or a server. In this book, you will gain knowledge about the fundamentals of cloud computing. This book includes a detailed description-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Hardware security has become a major concern in recent times making it crucial for companies and end users to focus on protecting hardware. If you’re a security practitioner who is more familiar with software and binary hacking or someone looking to repurpose devices, this book will demonstrate how to approach hardware hacking of embedded de-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manag-
- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
This book is a comprehensive guide for organizations on how to prepare for cyber-attacks and control cyber threats and network security breaches in a way that decreases damage, recovery time, and costs, facilitating the adaptation of existing strategies to cloud-based environments.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Veeam is an infrastructure backup solution for VMware vSphere or Hyper-V to enable VM and server backup. This book takes you through installation best practices, optimizations, and the 3-2-1 rule, before going on to examine repository and proxy-related topics and finally advanced topics such as DataLabs, Instant VM Recovery, and Veeam ONE.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Threat hunting is the act of proactively tracking and eliminating adversaries from your network as early as possible. Practical Threat Intelligence and Data-Driven Threat Hunting covers both threat intelligence and the act of threat hunting from the first steps to advanced practices.-
- PDF + ePub + Mobi pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Książka jest zbiorem zadań z rozwiązaniami z podstaw teoretycznych kryptografii i kryptograficznej ochrony informacji. Poszczególne rozdziały dotyczą różnych fragmentów tej dziedziny.
-
Promocja
Python’s latest updates feature numerous packages that can be used to perform critical missions. This Python networking and security book will help you to use Python packages to detect vulnerabilities in web apps and tackle networking challenges. You’ll explore a variety of techniques and tools for networking and security in Python.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Step-by-step guide to learning the role of E-commerce in our economy Key Features Hands-on with the concept of E-Commerce and E-Business. Understand the know-how of working of E-Commerce framework. Learn the type of E-Payment system and its mechanism. Understanding Brand building and Digital Marketing methods. Description Electronic Commerce (E-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -