Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Promocja
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security-
- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
-
Promocja
Advance in your cybersecurity career with targeted interview preparation, practical guidance, and insider tips. Discussing roles from cybersecurity engineer to CISO, this edition addresses reader feedback and covers the latest industry developments.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of-
- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(91,13 zł najniższa cena z 30 dni)
91.13 zł
129.00 zł(-29%) -
-
Promocja
Jeśli chcesz uwolnić się od oglądania czegoś, co atakuje cię przy każdym otwarciu przeglądarki internetowej, marzysz o tym, by uniknąć natrętnych e-maili od obcych osób, które w dodatku wyglądają jak wiadomości od kumpla, i potrzebujesz odrobiny luzu w wirtualnym świecie - ta książka ci pomoże. Dowiesz się z niej, jak skonfigurować przeglądarkę, by- Druk
- PDF + ePub + Mobi pkt
Czasowo niedostępna
-
Promocja
Książka Testowanie bezpieczeństwa aplikacji internetowych. Receptury to napisany zrozumiałym językiem podręcznik, dzięki któremu szybko poznasz mechanizmy testowania zabezpieczeń. Praktyczne przykłady zawarte w tym przewodniku sprawią, że szybko nauczysz się włączać systemy zabezpieczeń do standardowych procedur kontroli aplikacji. Bez problemu stw- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Secure your applications and development environments with Docker and Kubernetes Key Features Introducing Container platforms (Docker, Kubernetes, Swarm, OpenShift Discover how to manage high availability with Docker Swarm and Kubernetes Learn how Docker can manage the security in images and containers Discover how Docker c-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Learn how to build an end-to-end Web application security testing framework Description Hands-on Penetration Testing for Web Applications offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce appli-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Crack a ransomware by identifying and exploiting weaknesses in its design Key Features Get an overview of the current security mechanisms available to prevent ransomware digital extortion. Explore different techniques to analyze a ransomware attack. Understand how cryptographic libraries are misused by malware authors to code ransomwares. De-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Unveiling the future: Navigating AI's Intricate Intersection with International Law A Journey Beyond Hype and Governance Key Features Comprehensive overview of AI ethics and international law. Exploration of pragmatic approaches to AI governance. Navigation of global legal dynamics. Soft law recommendations for responsible AI development.-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
The book is designed for a practical approach to learning, with examples based on scenarios. It covers possible OSINT blueprints from the beginning to an advanced level Key Features Learn about OSINT and how to set up an OSINT environment for investigations. Master techniques for tracking fraud SMS and investigating emails. Explore reverse ima-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
With this book you'll learn advanced AI security techniques and defend against manipulation, evasion, prompt injection, and privacy attacks. You'll be able to protect models from poisoning, theft, and tampering, safeguarding your AI systems.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book will help you understand key security principles and how they are implemented with Spring Security. You'll also gain an in-depth understanding of Spring Security's new features applied to servlet and reactive Spring applications.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitati-
- ePub + Mobi pkt
(245,65 zł najniższa cena z 30 dni)
237.15 zł
279.00 zł(-15%) -
-
Promocja
Wireshark: A hackers guide to network insights Key Features Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. Description Ethical Hacking and Network Analysis with Wires-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is an enterprise IT risk management professional's dream. With its in-depth approach and various self-assessment exercises, this book arms you with knowledge of every single aspect of the certification, and is a fantastic career companion after you're certif-
- PDF + ePub pkt
(161,10 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Attacking and Exploiting Modern Web Attacks will help you understand how to identify attack surfaces and detect vulnerabilities. This book takes a hands-on approach to implementation and associated methodologies and equips you with the knowledge and skills needed to effectively combat web attacks.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledger technology, cryptocurrencies, and blockchain platforms such as Ethereum, Solana, and Bitcoin. With updates on new concepts like privacy, scalability, and DeFi, this book will help keep your knowledge and skills up to date.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What-
- ePub + Mobi pkt
(194,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
-
Promocja
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You’ll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces-
- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
-
Promocja
Internet jest wszędzie zajrzyj, poznaj wirtualny świat młodych i pytaj o wszystko! Obowiązkowa lektura dla rodziców dzieci w każdym wieku! Bo wszyscy jesteśmy online. Codziennie każdy z nas, niezależnie od wieku, spędza wiele czasu w Internecie. Młodzi ludzie dużo szybciej i sprawniej w nim buszują, a my rodzice, nauczyciele i opiekunowi- ePub + Mobi pkt
(24,90 zł najniższa cena z 30 dni)
27.22 zł
34.90 zł(-22%) -
Promocja
With Azure security, you can build a prosperous career in IT security. Key Features In-detail practical steps to fully grasp Azure Security concepts. Wide coverage of Azure Architecture, Azure Security services, and Azure Security implementation techniques. Covers multiple topics from other Azure certifications (AZ-303, AZ-304, and SC series).-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Exploring techniques and tools and best practices used in the real world. Key Features Explore private and public key-based solutions and their applications in the real world. Learn about security protocols implemented at various TCP/IP stack layers. Insight on types of ciphers, their modes, and implementation issues.. Description Cryptograph-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
Wśród zagrożeń w cyberprzestrzeni szczególnie groźne jest zagrożenie cyberprzemocy – zagrożenie, które nie zawsze się dostrzega i wielokrotnie wręcz lekceważy, a które coraz częściej dotyka nas wszystkich. Najogólniej ujmując, cyberprzemoc możemy sprowadzić do prześladowania, zastraszania, szantażowania, nęk(21,07 zł najniższa cena z 30 dni)
24.55 zł
25.00 zł(-2%) -
Promocja
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your systems against threats.Contrary t-
- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
-
Promocja
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to h-
- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
-
Promocja
Jak bezpieczna jest nasza sieć? Najlepszym sposobem znalezienia odpowiedzi na to pytanie jest zaatakowanie jej. Ocena bezpieczeństwa sieci pokazuje narzędzia i techniki, których używają profesjonalni analitycy zabezpieczeń do identyfikowania i oszacowania ryzyka w sieciach instytucji rządowych, wojskowych i komercyjnych. Dzięki wiedzy i umiejętnośc(56,30 zł najniższa cena z 30 dni)
55.66 zł
79.80 zł(-30%) -
Promocja
OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications.-
- PDF + ePub + Mobi pkt
(125,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
-
Promocja
Publikacja dotyczy problemów związanych z kryptografią i uwierzytelnianiem użytkowników sieci Internet. Przedstawiono w niej mechanizmy podpisu elektronicznego z uwzględnieniem problemów dystrybucji klucza i przykłady rozwiązań uwi??erzytelniania oparte o analizę cech biometrycznych.Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
Andrzej Grzywak, Jerzy Klamka, Paweł Buchwald, Piotr Pikiewicz, Maciej Rostański, Marcin Sobota
(21,60 zł najniższa cena z 30 dni)
21.60 zł
27.00 zł(-20%) -
Promocja
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious-
- ePub + Mobi pkt
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
-
Promocja
Learn the data skills necessary for turning large sequencing datasets into reproducible and robust biological findings. With this practical guide, you’ll learn how to use freely available open source tools to extract meaning from large complex biological data sets.At no other point in human history has our ability to understand life’s c-
- ePub + Mobi pkt
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
-
Promocja
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u-
- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
-
Promocja
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
-
Promocja
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be-
- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
-
Promocja
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is t-
- ePub + Mobi pkt
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
-
Promocja
Drugi tom niezwykle życzliwie przyjętej przez Czytelników serii Testowanie oprogramowania w praktyce to kontynuacja idei opisywania przez praktyków dla praktyków rzeczywistych wyzwań zawodowych w dziedzinie inżynierii jakości oprogramowania. Podobnie jak w przypadku części pierwszej, do opisania swoich doświadczeń z testowaniem- ePub + Mobi pkt
(47,20 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania oraz zwalczania niebezpiecznych zachowań w cyberprzestrzeni. Wyzwaniem badawczym stały się także relacje pomiędzy systemem cyberbezpieczeństwa a
- PDF + ePub + Mobi pkt
-
Promocja
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.-
- PDF + ePub pkt
(161,10 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
Metasploit to narzędzie używane przez profesjonalistów do prowadzenia testów penetracyjnych. Jeżeli chcesz poznać najlepsze przepisy na jego wykorzystanie, to trafiłeś na doskonałą książkę! Zawiera ona ponad 80 receptur omawiających najbardziej skuteczne techniki testowania. W trakcie lektury dowiesz się, jak sprawnie skonfigurować Metasploit, omin- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
The definitive guide to installing and configuring IBM FileNet Information Management software Key Features Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboar-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Comprehensive guidance on evaluating cybersecurity, conducting risk assessments, and auditing IT systems for compliance across multiple platforms like AWS, Azure, and GCP.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the knowledge and tools necessary to navigate the complex landscape of password security with confidence.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book helps you build your own blockchains and production-grade decentralized apps on blockchains like Ethereum, Solana, NEAR, and Polkadot. You’ll explore best practices, code, and assets that can be used for scaffolding multiple projects.-
- PDF + ePub pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
With .NET MAUI for C# Developers, you’ll learn to create cross-platform apps for iOS, Android, Windows, and Mac by writing the code once and leveraging the application to automatically produce native code for each. With the help of this book, you’ll be well prepared to build commercial MAUI programs that integrate into the overall .NE-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark Key Features Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve read this book, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives with ease.-
- PDF + ePub
- Audiobook MP3 pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Network Protocols for Security Professionals is a comprehensive guide that will take you through the basics of network security and help you get to grips with the network, network devices, and traffic analysis-based attacks. The book covers practical ways to attack and defend network protocols.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Start your journey in this exciting Android app development world Key Features Start your Kotlin adventure from the very fundamentals to sophisticated Android programming. Experience live coding of a video application, game design, and chat application. Explore the Android framework, app creation, testing, and publication to the Google Play st-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense Key Features Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Mastering Microsoft Endpoint Manager will teach you how to manage your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing a new and simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Oto Franek Runtime skompromitowany eks-komisarz, bezduszny detektyw, ekspert poszukiwań. Gdy komenda główna policji zostaje obrabowana, to Franek Runtime i jego niezwykłe umiejętności pozwolą schwytać winnych. W tym opowiadaniu kryminalnym dowiesz się jak korzystać z narzędzi algorytmicznych, aby rozwiązać sprawę. Franek Runtime binarnie prz- ePub + Mobi pkt
(51,20 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
Promocja
-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Ne-
- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX pl-
- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
Dzięki tej książce dowiesz się, jak zabezpieczyć swoją stronę, opartą o ten system, przed ich działaniem. Podręcznik w kompleksowy sposób opisuje wszystkie zagadnienia związane z bezpieczeństwem Joomla! — począwszy od wyboru firmy, na której serwerach umieścisz swoją stronę, a skończywszy na tworzeniu polityki reagowania na ataki.- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Wszechstronne wprowadzenie do najważniejszych zagadnień dotyczących bezpieczeństwa danych i sprzętu.- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Nowość Promocja
This comprehensive exam guide is designed to transform you into an AWS networking expert, going beyond the ANS-C01 exam blueprint to maximize your impact in the field.-
- PDF + ePub pkt
(100,08 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Nowość Promocja
This tailor-made study guide will equip you with the skills, knowledge, and confidence to pass the SnowPro Core Certification exam and apply what you have learned in your organization.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Description Quantum blockchain uses the power of quantum computing to solve issues like security and scalability that traditional blockchains face. With its ability to handle large data sets and solve complex problems much faster, it can greatly improve transaction speeds, security, and efficiency. This book begins by explaining the basics of bloc-
- ePub + Mobi pkt
Quantum Blockchain
Dr. Mahendra Kumar Shrivas, Dr. Kamal Kant Hiran, Dr. Ashok Bhansali, Umesh Kumar Sahu
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Description The cloud is ubiquitous. Everyone is rushing to the cloud or is already in the cloud, and both of these groups are concerned with cloud security. In this book, we will explain the concepts of security in a beginner friendly way, but also hint at the great expanse of knowledge that lies beyond. This book offers a detailed guide to cloud-
- ePub + Mobi pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book shows you how to automate essential security tasks like vulnerability scanning, patch management, and threat intelligence gathering. Streamline your security workflows and enhance defense strategies with custom Python scripts.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Description Vulnerability Assessment and Penetration Testing (VAPT) combinations are a huge requirement for all organizations to improve their security posture. The VAPT process helps highlight the associated threats and risk exposure within the organization. This book covers practical VAPT technologies, dives into the logic of vulnerabilities, and-
- ePub + Mobi pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Master the skills needed to secure AI ecosystems from evolving cyber threats. This course delves into the risks targeting AI systems, real-world case studies, and strategies for safeguarding LLMs, GenAI applications, and AI infrastructures. Build expertise in combating attacks and ensuring compliance in AI environments.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Explore critical strategies for defending against cyber threats, securing social media, and protecting home networks.-
- PDF + ePub pkt
Surviving A Cyberattack. A Comprehensive Guide to Digital Security for Families and Businesses
Mercury Learning and Information, Todd G. Shipley, Art Bowker
(109,00 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki 1) TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów spo
- PDF + ePub + Mobi pkt
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska, Agnieszka Brzostek, Sylwia Gliwa
-
Promocja
This book is a comprehensive guide to using Ghidra for malware analysis, reverse engineering, and vulnerability detection. It covers everything from basic usage to advanced topics such as Ghidra plug-ins, kernel debugging, and binary diffing.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware. This book is a comprehensive-
- ePub + Mobi pkt
(71,91 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
This book covers everything from basic scripting to advanced techniques for reconnaissance, exploitation, and integration with AI. You'll master essential skills to automate tasks, analyze data, and enhance cybersecurity assessments.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Description "Mastering the Red Hat Certified Engineer (RHCE) Exam" is a comprehensive guide designed for IT professionals and system administrators aspiring to achieve RHCE certification. This book is an essential resource for mastering Red Hat Enterprise Linux (RHEL) skills and advancing careers in Linux administration. This book is designed to g-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Learn all about Microsoft Defender for Identity in depth and master the art of securing digital identities against emerging threats with hands-on guidance to elevate your cybersecurity skills to new heights.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Learn the various aspects of Cyber Security concepts. Key Features Strengthens the foundations, as detailed explanation of the concepts are given. Simple language, crystal clear approach, straight forward comprehensible presentation. Adopting user-friendly classroom lecture style. The concepts are duly supported by several examples.-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
A practical book that will help you defend against malicious activities Key Features Learn how attackers infiltrate a network, exfiltrate sensitive data and destroy any evidence on their way out Learn how to choose, design and implement a cybersecurity program that best fits your needs Learn how to improve a cybersecurity progra-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Step-by-step guide to learn Ripple and explore $155 trillion+ market on international remittance Key Features Know the inefficiencies of banks in international remittance and how Ripple can help Learn Ripples architecture and its product offerings such as xCurrent, xRapid, and xVia Acquire development skills on Ripples XRP ledger-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Learn how to redesign NLP applications from scratch. Key Features Get familiar with the basics of any Machine Learning or Deep Learning application. Understand how does preprocessing work in NLP pipeline. Use simple PyTorch snippets to create basic building blocks of the network commonly used in NLP. Get familiar with the advanced em-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Learn to secure your personal data & reclaim your online privacy! Key Features Understand your cyber risk exposure by calculating your Privacy Score Improve your Privacy Score with easy-to-follow recommendations Different recommendations for different levels of expertise YOUR choice! An interactive book with inline QR code r-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Step-by-step guide to learning the role of E-commerce in our economy Key Features Hands-on with the concept of E-Commerce and E-Business. Understand the know-how of working of E-Commerce framework. Learn the type of E-Payment system and its mechanism. Understanding Brand building and Digital Marketing methods. Description-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Getting familiar with cloud computing features from scratch to advanced. Description Cloud computing is a technology that allows you to store, access data and programs over the internet instead of the hard drive or a server. In this book, you will gain knowledge about the fundamentals of cloud computing. This book includes a detailed descript-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Cyber crime stories and tricks used by cyber criminals to trap people and preventive tips to avoid cyber crimes. Key Features Real-case studies and true events on cyber crime incidents. Learn how to protect yourself from cyber threats and assist police for crime investigation. Coverage on financial frauds, social media crimes, mobile payment f-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Prepare yourself for any type of audit and minimise security findings Key Features It follows a lifecycle approach to information security by understanding: Why we need Information security How we can implement How to operate securely and maintain a secure posture How to face audits Description This book is a guide for Net-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Master the CNAPP lifecycle with this comprehensive guide that will teach you how to plan, deploy, and operationalize cloud security using Microsoft Defender for Cloud, enhancing your security posture across multicloud environments.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Ace the SC-100 exam with this essential guide, covering advanced cloud security strategies, zero-trust architecture, and GRC evaluations. Benefit from real-world examples and practice exams questions to ensure certification success.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book offers in-depth coverage and practical insights for effectively securing AWS environments, encompassing key services, compliance, and best practices.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Embark on a dynamic journey through command shells with this hands-on manual. From the Linux staple Bash to rising stars like Z shell and PowerShell, master their power for Linux, macOS, and Unix.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) Key Features Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
A comprehensive guide to Multi-Cloud Administration for Cloud professionals Key Features Get familiar with the various components involved in establishing a multi-cloud architecture. Acquire the skills to effectively manage multi-cloud environments. Establish guardrails and guidelines to ensure interoperability and security across multiple clo-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more Key Features Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advanc-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments Key Features A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. D-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Description In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It-
- ePub + Mobi pkt
(53,91 zł najniższa cena z 30 dni)
58.49 zł
64.99 zł(-10%) -
-
Promocja
This book equips network professionals with the skills to monitor, analyze, and optimize network infrastructures using specific tools. With advanced techniques, you'll learn how to build tailored observability solutions for your needs.-
- PDF + ePub pkt
Modern Network Observability. A hands-on approach using open source tools such as Telegraf, Prometheus, and Grafana
David Flores, Christian Adell, Josh VanDeraa, Eric Chou, Damien Garros
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,-
- ePub + Mobi pkt
(53,91 zł najniższa cena z 30 dni)
58.49 zł
64.99 zł(-10%) -
-
Promocja
Everything you need to know to secure your IoT devices Key Features Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities that can affect IoT devices. Implement security measures to protect IoT devices from attack. Description The Internet of Things (IoT) is a rapidly growing-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Learn how to leverage DevSecOps to secure your modern enterprise in the cloud Key Features Explore DevSecOps principles, fundamentals, practices, and their application in AWS environments comprehensively and in-depth. Leverage AWS services and tools to enhance security within your DevSecOps pipeline, gaining deep insights. Implement DevSecOps-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This hands-on guide to understanding Snort 3 and its evolution covers everything from installation to configuration based on available resources and expected detection rates. The book dives into various key modules using practical examples.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book is a valuable resource that offers practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This latest edition of Practical Hardware Pentesting features even more practical advice on how to pentest various devices, from IoT to simpler hardware. As you progress through the chapters, you'll quickly learn the most common attack techniques, as well as ways to secure embedded systems and build more secure devices.-
- ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This is an in-depth guide covering hacking techniques, security vulnerabilities, and countermeasures. Learn how to use tools like Kali Linux for ethical hacking, test for exploits, and secure systems.-
- PDF + ePub pkt
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling
(161,10 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
Take your career to the next level by becoming an ISC2 certified cloud security professional (CCSP) Key Features Prepares you to crack the ISC2 CCSP exam successfully. Provides you with concrete knowledge and skills to secure your organizations cloud. Covers all six domains of the CCSP exam in detail for a clear understanding of cloud security-
- ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
76.49 zł
84.99 zł(-10%) -
-
Promocja
Ta książka jest zaktualizowanym i uzupełnionym wydaniem świetnego przewodnika po świecie blockchaina; skorzysta z niej zarówno programista, jak i prezes konstruujący strategię swojej firmy. Znalazło się tu wyczerpujące omówienie technicznych podstaw łańcuchów bloków i systemów rozproszonych. Przedstawiono mechanizmy związane z kryptowalutami i pisa- Druk
- PDF + ePub + Mobi pkt
Czasowo niedostępna
-
Promocja
Z niniejszej książki dowiesz się, jak działa ten system operacyjny i jak z nim pracować jako administrator. Nauczysz się wykorzystywać przy tym najlepsze praktyki w branży. Poznasz sposób działania rozwiązania PowerVM, które jest jednym z najbardziej elastycznych, a jednocześnie najbardziej niezawodnych rozwiązań wirtualizacyjnych. Dowiesz się też,- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Ta książka jest przeznaczona dla specjalistów ds. bezpieczeństwa, którzy chcą korzystać z języka C# do takich zadań jak fuzzowanie, skanowanie w poszukiwaniu luk zabezpieczeń i analiza złośliwego oprogramowania. Opisano tu zarówno podstawy języka C#, jak i jego dość zaawansowane funkcje. Przedstawiono szereg bibliotek dostępnych dla tego języka. Po- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
W książce Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać? znajdziesz niebanalne i kontrowersyjne informacje nie tylko na temat zabezpieczeń, ale także sposobów ich łamania, dzięki czemu zyskasz wiedzę, skąd może nadejść zagrożenie i w jaki sposób je rozpoznać. Dzięki temu podręcznikowi poznasz konkretne problemy i niedoskonałości syste- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Jak obronić się przed atakiem? Wszystkie niezbędne informacje znajdziesz w tym wyjątkowym podręczniku. W trakcie lektury dowiesz się, jak działają hakerzy, jak wyszukują słabe punkty aplikacji oraz jak modyfikują jej kod. Ponadto nauczysz się utrudniać śledzenie kodu Twojej aplikacji oraz bezpiecznie usuwać pliki (tak, aby nie było możliwe ich odtw- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Dzięki tej książce łatwiej zrozumiesz naturę botów i nauczysz się je projektować. Zamieszczono tu wiele informacji o pracy projektantów i programistów botów. Poza zagadnieniami teoretycznymi znajdziesz tu także sporo praktycznej wiedzy, wzbogaconej rzeczywistymi przykładami budowania użytecznych botów. Nauczysz się projektowania konwersacyjnych int- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
To ważne, co Twoje dziecko robi w sieci. To, co ogląda, czyta, z kim rozmawia i ile czasu spędza w Internecie, ma duże znaczenie dla jego rozwoju, ale przede wszystkim dla jego bezpieczeństwa! Internet, który jest jedną z największych zdobyczy naszej cywilizacji, to cudowne okno na wielki świat -- na jego jasne, ale i ciemne strony…- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne- Druk
Czasowo niedostępna
-
Promocja
Z tą książką przyjdzie Ci to bez trudu. Nauczysz się nie tylko tworzyć proste kopie, ale także właściwie zarządzać danymi, rekonstruować skasowane pliki i szyfrować te, których nie chcesz upubliczniać. Z drugiej strony poznasz sposoby trwałego usuwania plików z dysku, metody ich kompresowania oraz odpowiedniego przechowywania w archiwum. Dowiesz si- Druk
- PDF + ePub + Mobi pkt
Niedostępna