Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Promocja
Dzięki niej dowiesz się, jak skutecznie zrootować Twoje urządzenie i przejąć nad nim pełną kontrolę. To jest pierwszy i najważniejszy krok. Gdy go wreszcie uczynisz, świat pełen różnych wersji ROM-ów, modyfikacji i atrakcyjnych funkcjonalności stanie przed Tobą otworem. W trakcie lektury nauczysz się modyfikować wygląd i styl Twojego Androida, twor- Druk
- PDF + ePub + Mobi pkt
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
(35,40 zł najniższa cena z 30 dni)
35.40 zł
59.00 zł(-40%) -
Jak obronić się przed atakiem? Wszystkie niezbędne informacje znajdziesz w tym wyjątkowym podręczniku. W trakcie lektury dowiesz się, jak działają hakerzy, jak wyszukują słabe punkty aplikacji oraz jak modyfikują jej kod. Ponadto nauczysz się utrudniać śledzenie kodu Twojej aplikacji oraz bezpiecznie usuwać pliki (tak, aby nie było możliwe ich odtw
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Książka „13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie” pokaże Ci, jak wytropić wirusy, przechytrzyć złośliwe oprogramowanie, rozpoznać podsłuch sieciowy. Ten podręcznik poprowadzi Cię prosto do zwycięstwa w walce z sieciowym zagrożeniem.
- Druk
- PDF + ePub + Mobi pkt
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie 13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
Maciej Szmit, Mariusz Tomaszewski, Dominika Lisiak, Izabela Politowska
Niedostępna
-
Nowość Promocja
Światowy bestseller, który uczy, jak tworzyć bezpieczne systemy informatyczne. Podręcznik obejmuje nie tylko podstawy techniczne, takie jak kryptografia, kontrola dostępu i odporność na manipulacje, ale także sposób ich wykorzystania w prawdziwym życiu. Realne studia przypadków dotyczące bezpieczeństwa systemów płatności, systemów wojskowych, eko- ePub + Mobi pkt
(97,30 zł najniższa cena z 30 dni)
93.12 zł
139.00 zł(-33%) -
Sięgnij po nią i przekonaj się, jak szybko stworzyć w języku Python skrypt tropiący pakiety w systemach Windows i Linux, przeprowadzający atak ARP cache poisoning lub korzystający z biblioteki urllib2. Sporo uwagi zostało tu poświęcone tworzeniu koni trojańskich oraz budowaniu rozszerzeń dla narzędzia Burp. Możesz też sprawdzić, jak zaatakować prze
- Druk
- PDF + ePub + Mobi pkt
Black Hat Python. Język Python dla hakerów i pentesterów Black Hat Python. Język Python dla hakerów i pentesterów
Czasowo niedostępna
-
Dowiedz się, w jaki sposób możesz zdalnie zidentyfikować uruchomiony system operacyjny, przeprowadzać ataki DoS (ang. Denial of Service) oraz testować aplikacje sieciowe. To doskonała lektura, która w rękach wprawnego administratora pozwoli na zdecydowane zwiększenie bezpieczeństwa sieci.
- Druk
- PDF + ePub + Mobi pkt
Czasowo niedostępna
-
Odpowiednia wiedza na temat istniejących zagrożeń i konsekwentne stosowanie właściwych praktyk bezpieczeństwa, wroga można się bowiem ustrzec jedynie dzięki znajomoci sposobów, które wykorzystuje on sam, próbując włamać się do naszego komputera. Wiedzę tę można zdobyć dzięki książce "Techniki twórców złoliwego oprogramowania. Elementarz programisty
- Druk
- PDF + ePub + Mobi pkt
Techniki twórców złośliwego oprogramowania. Elementarz programisty Techniki twórców złośliwego oprogramowania. Elementarz programisty
Niedostępna
-
To ważne, co Twoje dziecko robi w sieci. To, co ogląda, czyta, z kim rozmawia i ile czasu spędza w Internecie, ma duże znaczenie dla jego rozwoju, ale przede wszystkim dla jego bezpieczeństwa! Internet, który jest jedną z największych zdobyczy naszej cywilizacji, to cudowne okno na wielki świat -- na jego jasne, ale i ciemne strony…
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Na samym początku zbudujesz własne laboratorium sieci bezprzewodowych, tak aby w domowym zaciszu testować różne techniki łamania zabezpieczeń protokołu WEP, WPA i WPA2. W trakcie lektury zdobędziesz wiedzę na temat metod przeprowadzania ataku na infrastrukturę sieci bezprzewodowej. Poznanie zagrożenia w praktyce pozwoli Ci zdobyć doświadczen
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne- Druk
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
(89,40 zł najniższa cena z 30 dni)
89.40 zł
149.00 zł(-40%) -
Dzięki tej książce dowiesz się, jak zabezpieczyć swoją stronę, opartą o ten system, przed ich działaniem. Podręcznik w kompleksowy sposób opisuje wszystkie zagadnienia związane z bezpieczeństwem Joomla! — począwszy od wyboru firmy, na której serwerach umieścisz swoją stronę, a skończywszy na tworzeniu polityki reagowania na ataki.
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Wszechstronne wprowadzenie do najważniejszych zagadnień dotyczących bezpieczeństwa danych i sprzętu.
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Nowość
Catapult your cybersecurity expertise to new heights using expert-backed recipes. With this cookbook, you’ll leverage the power of large language model generative AI like ChatGPT to gain a competitive edge in the ever-changing cybersecurity domain.- PDF + ePub pkt
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Nowość
The OSINT Handbook book helps you understand the significance of open-source intelligence and master advanced techniques and tools, equipping you with the skills you need to navigate the digital landscape effectively.- PDF + ePub pkt
The OSINT Handbook. A practical guide to gathering and analyzing online information The OSINT Handbook. A practical guide to gathering and analyzing online information
-
"Archiwizacja i odzyskiwanie danych" to przewodnik po darmowych narzędziach do archiwizacji i odzyskiwania danych, przeznaczony głównie dla administratorów. W. Curtis Preston, specjalista w dziedzinie ochrony danych, zwrócił uwagę, że środki przeznaczone na system archiwizacji są często zbyt małe, by zapewnić mu wysoką skuteczność.
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Książka Testowanie bezpieczeństwa aplikacji internetowych. Receptury to napisany zrozumiałym językiem podręcznik, dzięki któremu szybko poznasz mechanizmy testowania zabezpieczeń. Praktyczne przykłady zawarte w tym przewodniku sprawią, że szybko nauczysz się włączać systemy zabezpieczeń do standardowych procedur kontroli aplikacji. Bez problemu stw
- Druk
- PDF + ePub + Mobi pkt
Testowanie bezpieczeństwa aplikacji internetowych. Receptury Testowanie bezpieczeństwa aplikacji internetowych. Receptury
Niedostępna
-
W książce Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać? znajdziesz niebanalne i kontrowersyjne informacje nie tylko na temat zabezpieczeń, ale także sposobów ich łamania, dzięki czemu zyskasz wiedzę, skąd może nadejść zagrożenie i w jaki sposób je rozpoznać. Dzięki temu podręcznikowi poznasz konkretne problemy i niedoskonałości syste
- Druk
- PDF + ePub + Mobi pkt
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać? Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
Niedostępna
-
Nowość Promocja
Światowy bestseller, który uczy, jak tworzyć bezpieczne systemy informatyczne. Podręcznik obejmuje nie tylko podstawy techniczne, takie jak kryptografia, kontrola dostępu i odporność na manipulacje, ale także sposób ich wykorzystania w prawdziwym życiu. Realne studia przypadków dotyczące bezpieczeństwa systemów płatności, systemów wojskowych, eko- ePub + Mobi pkt
(111,20 zł najniższa cena z 30 dni)
111.20 zł
139.00 zł(-20%) -
Nowość
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji: Odkryj klucz do cyberhigieny z nową książką! W erze cyfrowej, gdzie nasze dane są tak cenne jak złoto, a cyberzagrożenia czają się na każdym kroku, niezbędne jest wyposażenie się w wiedzę, która ochroni nasze cyfrowe życie. "Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencTwoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Nowość
W świecie, gdzie granice między rzeczywistością a cyfrowym uniwersum zacierają się, a nasze życie coraz bardziej przenosi się do internetu, zagrożenia wirtualne stają się równie realne co te z naszego bezpośredniego otoczenia. Ta wszechstronna publikacja jest niezbędnym kompendium wiedzy na temat cyberbezpieczeństwa, oferującym praktyczne porady, j- PDF + ePub + Mobi pkt
Cyberbezpieczeństwo. Jak chronić się przed phishingiem, cyberstalkingiem, cardingiem, ransomware, hakowaniem, malware, cyberstalkingiem, kradzieżą tożsamości Cyberbezpieczeństwo. Jak chronić się przed phishingiem, cyberstalkingiem, cardingiem, ransomware, hakowaniem, malware, cyberstalkingiem, kradzieżą tożsamości
-
Nowość
Manage physical and Cloud based endpoints, boost security, and simplify app control with ease. Stay up to date with the latest features and cloud services, empowering you to excel in device management. Master Intune, master your endpoints.- PDF + ePub pkt
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
Christiaan Brinkhoff, Per Larsen, Steve Dispensa, Scott Manchester
-
W erze, gdy aplikacje szpiegujące takie jak Pegasus są niemal niewidzialne, a oszustwa internetowe rosną w siłę, Twoja wiedza stanowi pierwszą linię obrony. Ta książka to Twoja tarcza w walce z cyberzagrożeniami. Pegasus, znany jako jeden z najbardziej zaawansowanych narzędzi szpiegowskich, może infiltrować Twoje urządzenia, nie p
- PDF + ePub + Mobi pkt
Pegasus. Jak chronić się przed szpiegami, scamem, phishingiem, kradzieżą tożsamości i oszustwami online Pegasus. Jak chronić się przed szpiegami, scamem, phishingiem, kradzieżą tożsamości i oszustwami online
-
Nowość
This practical guide to implementing DeFi in your projects guides you through building full-stack DeFi solutions with popular tools and teaches you how to leverage blockchain technologies to manage crypto assets.- PDF + ePub pkt
Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain Building Full Stack DeFi Applications. A practical guide to creating your own decentralized finance projects on blockchain
-
Nowość
Facing cyber threats and compliance challenges? Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies to defend against cyber threats and secure cloud, hybrid, and on-premises environments.- PDF + ePub pkt
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
-
Nowość
This book guides you with a thorough understanding of safeguarding your AWS workloads, equipping you to demonstrate your expertise through attainment of the esteemed AWS (SCS-C01) certification.- ePub pkt
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Pass the AWS (SCS-C02) exam on your first attempt with this comprehensive exam guide - Second Edition AWS Certified Security - Specialty (SCS-C02) Exam Guide. Pass the AWS (SCS-C02) exam on your first attempt with this comprehensive exam guide - Second Edition
-
Nowość Promocja
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
This book helps you build a comprehensive foundation in cybersecurity, and prepares you to overcome the challenges of today's digital world. Whether you're pursuing a career in cybersecurity or looking to enhance your existing knowledge, this book is your ultimate guide to passing the SY0-701 exam.
- ePub pkt
CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition
-
Promocja
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Nowość
Whether you're a beginner or a seasoned security professional, this practical guide will equip you with the knowledge and skills to build a robust, proactive, and resilient security posture for your organization with Microsoft's XDR and SIEM.- PDF + ePub pkt
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
This book is a comprehensive guide to configuring and managing Microsoft Intune, a cloud-based endpoint management (MDM) tool. It covers everything from the initial setup and configuration to troubleshooting and automating tasks.
- PDF + ePub pkt
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Nowość
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.- PDF + ePub pkt
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Nowość
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.- PDF + ePub pkt
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.
- PDF + ePub pkt
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
This comprehensive guide covers a range of topics in cloud security with a practical focus on providing valuable insights and skills to enable you to secure multi-cloud environments effectively.
- PDF + ePub pkt
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
The comprehensive yet concise guide offers secure practices for handling sensitive data payloads, including credentials, certificates, and tokens, enabling secure access to and from your organization's resources for apps running on Kubernetes.
- PDF + ePub pkt
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
TLS is the most important and widely used security protocol in the world. This book takes you on a journey through modern cryptography with TLS as the guiding light. It explains all necessary cryptographic primitives and how they are used within TLS. You’ll explore the inner workings of TLS and its design structure.
- PDF + ePub pkt
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Promocja
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecyc- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration
- PDF + ePub pkt
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you’ll be able to shift security toward the left, enabling you to merge security into coding in no time.
- PDF + ePub pkt
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Malware Science is your go-to guide to the synergy of cybersecurity and data science. You’ll first learn about malware lifecycle before delving into data science techniques for improved detection and analysis. This book will also help you decipher key regulations like GDPR and CCPA, making it an indispensable resource for cybersecurity pros
- PDF + ePub pkt
Malware Science. A comprehensive guide to detection, analysis, and compliance Malware Science. A comprehensive guide to detection, analysis, and compliance
-
The Essential Guide to Web3 serves as a gateway to the decentralized web—also known as the decentralized internet—to enable you to embark on an immersive journey into the fascinating world of Web3. With brief overviews of the blockchain and the Ethereum ecosystem at the outset, this book quickly immerses you in practical blockchain ap
- PDF + ePub pkt
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
Niniejsza publikacja wprowadza w podstawy bezpieczenego korzystania z laptopa, bądź z komputera stacjonarnego działającego pod kontrolą systemu Windows. Z publikacji Czytelnik dowie się na co należy zwrócić uwagę i o co zadbać aby korzystać z komputera w bezpieczniejszy sposób. Zagadnienia poruszone w publikacji: Windows 11, Windows 10,
-
The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond.
- PDF + ePub pkt
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.
- PDF + ePub pkt
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. This book covers the nuts and bolts of how to keep your organization safe by helping you understand the intricacies of mitigating risks, creating an implementation roadmap, ensuring continuous improvement, and beyond.
- PDF + ePub pkt
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Promocja
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, gr- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is an enterprise IT risk management professional’s dream. With its in-depth approach and various self-assessment exercises, this book arms you with knowledge of every single aspect of the certification, and is a fantastic career companion after you
- PDF + ePub pkt
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to th
- PDF + ePub pkt
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi
- PDF + ePub pkt
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.
- PDF + ePub pkt
Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners
-
Burp Suite is an immensely powerful and popular tool for web application security testing. This book provides a collection of recipes that address vulnerabilities in web applications and APIs. It offers guidance on how to configure Burp Suite, make the most of its tools, and explore into its extensions.
- PDF + ePub pkt
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
This book will help you to design, develop, and operate security controls on Google Cloud as well as discover best practices for relevant security domains, including identity and access management, network, and data.
- PDF + ePub pkt
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
Wprowadzenie do bezpieczeństwa w Linuxie dla początkujących użytkowników! Nie jest to wstęp do korzystania z systemu Linux, jest to wstęp do bezpieczeństwa w systemie Linux! W niniejszej publikacji znajdziesz podstawowe informacje jak zabezpieczyć komputer osobisty z systemem Linux. Chociaż w publikacji polecane są dystrybucie zimmunizowane,
Linux - bezpieczny komputer osobisty dla początkujących Linux - bezpieczny komputer osobisty dla początkujących
-
Promocja
Informatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym Wydawnictwo: Wyższa Szkoła Policji w SzczytnieInformatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym Informatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym
(44,80 zł najniższa cena z 30 dni)
44.80 zł
56.00 zł(-20%) -
The Microsoft 365 Security, Compliance, and Identity Administration is a comprehensive guide that helps you employ Microsoft 365's robust suite of features and empowers you to optimize your administrative tasks.
- PDF + ePub pkt
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud environments running on AWS, Azure, and GCP. In addition to these, you will explore a number of practical strategies on how to manage the complexity, cost, and security risks involved when setting up vulnerable cloud lab environments.
- PDF + ePub pkt
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
This Automotive Cybersecurity Engineering Handbook untangles the complexities of building secure automotive products and helps you to comply with cybersecurity standards. It provides practical tools, tips, and techniques coupled with real-world examples to enable you to create cyber-resilient automotive products with ease.
- PDF + ePub pkt
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
Promocja
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro- ePub + Mobi pkt
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Reconnaissance for Ethical Hackers provides highly contextual real-world techniques used by threat actors, ethical hackers, and pentesters to collect valuable information about organizations that can be used for future attacks and operations. This book will help you develop the ethical hacking skills needed to successfully perform reconnaissance.
- PDF + ePub pkt
Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting
-
Promocja
Książka Cyberwalka. Militarny wymiar działań jest poświęcona cyberwalce rozumianej jako militarny wymiar działań. Przedstawione w niej są zarówno aspekty techniczne, społeczne, jak również czysto wojskowe. Książka ta jest unikalną monografią poświęconą teorii i praktyce cyberwalki prowadzonej przez siły zbrojne oraz aparatu pojęciowego z nią związa- ePub + Mobi pkt
(55,30 zł najniższa cena z 30 dni)
52.93 zł
79.00 zł(-33%) -
Promocja
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Attacking and Exploiting Modern Web Attacks will help you understand how to identify attack surfaces and detect vulnerabilities. This book takes a hands-on approach to implementation and associated methodologies and equips you with the knowledge and skills needed to effectively combat web attacks.
- PDF + ePub pkt
Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation
-
This is a practical guide that enables SOC professionals to analyze the most common security appliance logs that exist in any environment.
- PDF + ePub pkt
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
PowerShell is a powerful framework and tool that can help both red and blue teamers. It’s easy to learn and provides direct access to the Windows subsystem and APIs. This book will provide you with the skills and knowledge to make the most of PowerShell from both a red and blue team perspective. You’ll learn to attack, secure, and bui
- PDF + ePub pkt
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Promocja
- Najlepsze praktyki dotyczące korzystania z kryptografii - Schematy i objaśnienia algorytmów kryptograficznych Książka pomaga w zrozumieniu technik kryptograficznych stosowanych w popularnych narzędziach, strukturach i protokołach, dzięki czemu Czytelnik łatwiej będzie mógł dokonać właściwych wyborów zabezpieczeń dla swoich systemów i aplikacji. P- ePub + Mobi pkt
(69,30 zł najniższa cena z 30 dni)
66.33 zł
99.00 zł(-33%) -
With this new edition, get to grips with Keycloak in a hands-on way with the help of brilliant examples. Keycloak - Identity and Access Management for Modern Applications 2E teaches you how to secure new and existing applications.
- PDF + ePub pkt
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will
- PDF + ePub pkt
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Gain a comprehensive understanding of the detection engineering lifecycle, why it’s important, and how it can be leveraged to protect your organization. Authored by three cybersecurity veterans, this practical guide covers everything from fundamental concepts to career insights, enriching your cybersecurity expertise and bolstering your CV.
- PDF + ePub pkt
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.
- PDF + ePub pkt
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Promocja
Urządzenia wbudowane to mikrokomputery wielkości chipa na tyle małe, że można je włączyć w strukturę urządzenia, którym sterują. Znajdują się wszędzie w telefonach, samochodach, kartach kredytowych, laptopach, sprzęcie medycznym, a nawet w infrastrukturze krytycznej. Oznacza to, że zrozumienie ich działania ma kluczowe znaczenie dla bezpieczeństwa- ePub + Mobi pkt
(83,30 zł najniższa cena z 30 dni)
79.73 zł
119.00 zł(-33%) -
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.
- PDF + ePub pkt
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
This comprehensive guide will help you understand practical aspects of information systems auditing. It covers key areas such as governance and management of IT, information systems acquisition, development, implementation and information systems operations, business resilience, and the crucial topic of protecting information assets.
- PDF + ePub pkt
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.
- PDF + ePub pkt
Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA
-
With .NET MAUI for C# Developers, you’ll learn to create cross-platform apps for iOS, Android, Windows, and Mac by writing the code once and leveraging the application to automatically produce native code for each. With the help of this book, you’ll be well prepared to build commercial MAUI programs that integrate into the overall .NE
- PDF + ePub pkt
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications .NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledger technology, cryptocurrencies, and blockchain platforms such as Ethereum, Solana, and Bitcoin. With updates on new concepts like privacy, scalability, and DeFi, this book will help keep your knowledge and skills up to date.
- PDF + ePub pkt
Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition
-
The MS-100 certification validates your knowledge of identity and security aspects of a Microsoft 365 tenant. With the help of this book, you’ll explore core features such as self-service password reset and Azure AD identity protection, enabling you to implement Azure AD identity and secure access easily.
- PDF + ePub pkt
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
This book provides a security baseline to reduce the risk of future attacks. The chapters will teach you how to secure your Windows endpoint, protect devices with Microsoft Defender, and secure hybrid workloads using Azure Arc, enabling you to protect your infrastructure, network, and data with the help of SASE and the Zero Trust model.
- PDF + ePub pkt
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.
- PDF + ePub pkt
10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques 10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques
-
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e
- PDF + ePub pkt
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Promocja
Hacking jest w tym tomie rozpatrywany z różnych perspektyw, jako: przestępstwo, incydent cyberbezpieczeństwa, eksplorowanie i modyfikowanie systemów technicznych, społecznych i biologicznych, a najogólniej - jako przełamywanie zabezpieczeń.(203,15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
With Mastering Veeam Backup and Replication you’ll learn how to install Veeam Backup & Replication 12 on your system, the Core Architecture enhancements, as well as about other enhancements. You’ll also gain an understanding of security, Object Storage direct, and CDP with Cloud Connect.
- PDF + ePub pkt
Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition
-
Through this book, you’ll learn to administer core and advanced Windows Server and Infrastructure-as-a-Service workloads utilizing the available - on-premises, hybrid, and cloud technologies. All the skills you acquire will prepare you to ace the AZ-801: Configuring Windows Server Hybrid Advanced Services Exam.
- PDF + ePub pkt
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Promocja
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.
- PDF + ePub pkt
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
-
This book helps you set up your own virtual and portable forensic lab and guides on memory analysis and full forensic analysis using industry-recognized tools. You’ll explore malware and network artifact analyses and implement all the pillars of digital forensics such as acquisition, analysis, and presentation using cutting-edge tools.
- PDF + ePub pkt
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
This practical guide will help developers working with networking technologies such as CSMA, P2P, Wi-Fi, Wi-Fi 6, and LTE to perform advanced network simulations using ns-3. This book provides a hands-on approach to evaluating useful test scenarios of wired, Wi-Fi, LTE networks in the context of real-time deployments and research activities.
- PDF + ePub pkt
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3 Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
This book is a technical reference that investigates, analyzes, and explains every part of the FastAPI framework and demonstrates the use of these parts by helping you solve problems. Some topics are experimental and original given the current development setups. Overall, the book is a recipe, blueprint, study, and reference combined into one.
- PDF + ePub pkt
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.
- PDF + ePub pkt
Azure Security Cookbook. Practical recipes for securing Azure resources and operations Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Promocja
The book: “PACKET TRACER FOR YOUNG BEGINNING ADMINS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configu- PDF + ePub + Mobi pkt
Packet Tracer for young beginning admins Packet Tracer for young beginning admins
Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek Smyczek
(96,75 zł najniższa cena z 30 dni)
58.05 zł
129.00 zł(-55%) -
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title.- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for intermediate users Computer Networks in Packet Tracer for intermediate users
(96,75 zł najniższa cena z 30 dni)
58.05 zł
129.00 zł(-55%) -
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR ADVANCED USERS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for advanced users Computer Networks in Packet Tracer for advanced users
(96,75 zł najniższa cena z 30 dni)
58.05 zł
129.00 zł(-55%) -
Promocja
The book: “PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors ha- PDF + ePub pkt
(96,75 zł najniższa cena z 30 dni)
58.05 zł
129.00 zł(-55%) -
Promocja
The book: “PACKET TRACER FOR YOUNG ADVANCED ADMINS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations were prepared- PDF + ePub pkt
(96,75 zł najniższa cena z 30 dni)
58.05 zł
129.00 zł(-55%) -
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for beginners Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(96,75 zł najniższa cena z 30 dni)
58.05 zł
129.00 zł(-55%) -
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.
- PDF + ePub pkt
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.
- PDF + ePub pkt
Windows APT Warfare. Identify and prevent Windows APT attacks effectively Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.
- PDF + ePub pkt
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You’ll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.
- PDF + ePub pkt
Mastering Linux Security and Hardening. A practical guide to protecting your Linux system from cyber attacks - Third Edition Mastering Linux Security and Hardening. A practical guide to protecting your Linux system from cyber attacks - Third Edition
-
The Executive’s Cybersecurity Program Handbook helps you perform internal assessments to drive strategic cybersecurity program development and evaluate risk within an organization. With this book, you’ll be able to build an incident response team and implement administrative and technical security controls.
- PDF + ePub pkt
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
W książce omówiono zagadnienia dotyczące ochrony danych osobowych w różnych służbach mundurowych. Pozycja skierowana jest do wykładowców i studentów szkół wyższych o kierunku bezpieczeństwo wewnętrzne. Będzie również przydatna dla wszystkich osób zainteresowanych tematyką ochrony danych osobowych.
- PDF + ePub + Mobi pkt
-
This book is a guide to help security professionals learn about the process of discovering and publishing vulnerabilities in software. They'll learn how to build and execute winning vulnerability research strategies and disclosure methods and find out exactly how to claim credit for their work by opening CVEs and sharing their research publicly.
- PDF + ePub pkt
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.
- PDF + ePub pkt
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Combating Crime on the Dark Web gives you a deep understanding of how criminal elements operate on the dark web and how you can strategize and use various tools to disrupt those operations. If you’re looking to pave your way to an exciting and rewarding career in crime prevention, this book is a must-read.
- PDF + ePub pkt
Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime
-
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
- PDF + ePub pkt
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Promocja
Książka jest zbiorem zadań z rozwiązaniami z podstaw teoretycznych kryptografii i kryptograficznej ochrony informacji. Poszczególne rozdziały dotyczą różnych fragmentów tej dziedziny.Zbiór zadań z podstaw teoretycznych kryptografii i ochrony informacji Zbiór zadań z podstaw teoretycznych kryptografii i ochrony informacji
(24,05 zł najniższa cena z 30 dni)
14.90 zł
31.00 zł(-52%) -
DevSecOps in Practice with VMware Tanzu is a comprehensive learning reference covering the best-in-class tools that will aid in enhancing developer productivity, operational efficiency, and intrinsic security. This book will help you in laying out the easiest path to production for apps built to run in multi-cloud Kubernetes environments.
- PDF + ePub pkt
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Zmieniająca się rzeczywistość administracyjna koreluje z wieloma obszarami, a wśród nich priorytetowe znaczenie ma bezpieczeństwo wewnętrzne. Zapewnianie i kształtowanie bezpieczeństwa wewnętrznego odbywa się w dużej mierze przez podmioty publiczne. Efektywność wykonywania przez nie zadań ma realny wpływ na eliminowanie lub neutralizowanie z
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve read this book, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives with ease.
- PDF + ePub
- Audiobook MP3 pkt
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Promocja
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
This book will prepare cybersecurity professionals for the SC-100 exam while also helping them build a strong foundation for implementing the strategies they learn. A mixture of theoretical and practical knowledge, as well as practice questions and a mock exam will ensure you’re confident to take the exam.
- PDF + ePub
- Audiobook MP3 pkt
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
As hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.
- PDF + ePub
- Audiobook MP3 pkt
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
While penetration testing is highly competitive, it’s easy to be stuck in a monotonous routine client after client. This book will provide hands-on experience with penetration testing while guiding you through the behind-the-scenes action along the way.
- PDF + ePub pkt
Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition
-
This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, you’ll learn how cloud evolution affected identity strategy within the enterprise.
- PDF + ePub
- Audiobook MP3 pkt
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.
- PDF + ePub pkt
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Przestępcy, co raz częściej korzystają ze złośliwego oprogramowania (exploity, wirusy, rootkity itp.) w celu oszukania nieświadomego użytkownika, przeprowadzenia ataku typu odmowa usługi lub włamania się do jakiegoś systemu i wykradzenia informacji. Działanie oprogramowania tego typu można w pełni zrozumieć tylko poprzez inżynierię odwrotną. Inżyni
- Druk
- PDF + ePub + Mobi pkt
Inżynieria odwrotna w praktyce. Narzędzia i techniki Inżynieria odwrotna w praktyce. Narzędzia i techniki
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse
Niedostępna
-
Jeżeli zainteresował Cię temat testów penetracyjnych, to trafiłeś na doskonałą książkę. Znajdziesz w niej omówienie specjalnej dystrybucji Kali Linux. Zawiera ona zestaw niezbędnych narzędzi oraz pozwoli Ci przeprowadzić testy. W trakcie lektury zrozumiesz, jak przygotować środowisko pracy i jak przeprowadzić atak na popularne serwery aplikacji int
- Druk
- PDF + ePub + Mobi pkt
Czasowo niedostępna
-
W książce Bezpieczeństwo systemu e-commerce znajdziesz przede wszystkim informacje o mechanizmach prewencyjnych, czyli możliwych sposobach zabezpieczania systemu. Poznasz także wymogi prawne obowiązujące osoby handlujące przez internet. Autorzy rozpatrują je od strony aplikacji e-commerce, lecz także szerzej (opisują m.in. kwestię zapisów w regulam
- Druk
- PDF + ePub + Mobi pkt
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
Niedostępna
-
Z tą książką przyjdzie Ci to bez trudu. Nauczysz się nie tylko tworzyć proste kopie, ale także właściwie zarządzać danymi, rekonstruować skasowane pliki i szyfrować te, których nie chcesz upubliczniać. Z drugiej strony poznasz sposoby trwałego usuwania plików z dysku, metody ich kompresowania oraz odpowiedniego przechowywania w archiwum. Dowiesz si
- Druk
- PDF + ePub + Mobi pkt
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
Niedostępna
-
Promocja
Explore the implementation of Wazuh for effective security monitoring through use cases and demonstrations of how to integrate Wazuh with essential tools like OSSEC, TheHive, Cortex, and Shuffle.- PDF + ePub pkt
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
(92,88 zł najniższa cena z 30 dni)