Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Antivirus Bypass Techniques follows a unique approach that will help you explore the security landscape, understand the fundamentals of antivirus software, and put antivirus bypass techniques to use. This book will enable you to bypass antivirus software solutions in order to develop efficient antivirus software.
- PDF + ePub + Mobi pkt
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Get hands-on with practical ethical hacking from scratch using Python. With the help of step-by-step instructions and practical exercises, you'll develop tools that provide detailed insights into the ethical hacking thought process. This book also covers aspects of network and system hacking along with defense techniques.
- PDF + ePub + Mobi pkt
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.
- PDF + ePub + Mobi pkt
Malware Analysis Techniques. Tricks for the triage of adversarial software Malware Analysis Techniques. Tricks for the triage of adversarial software
-
By taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the
- PDF + ePub
- Audiobook MP3 pkt
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Zscaler Cloud Security Essentials will show you how to leverage the power of Zscaler by jumping right into the design, deployment, and support of a customized Zscaler solution. You'll discover the capabilities of Zscaler through real-world deployment and explore Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) in detail.
- PDF + ePub + Mobi pkt
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Every minute of the day, there are petabytes of data exchanged between our homes, cars, businesses, and IoT devices. But just what exactly is involved when using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals will help you to understand common cryptographic techniques and terms used today to secure our data.
- PDF + ePub + Mobi pkt
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
The Cisco Certified CyberOps Associate 200-201 certification exam helps you gain the skills and knowledge needed to prevent, detect, analyze, and respond to cybersecurity incidents. This book offers complete up-to-date coverage of the 200-201 exam so you can confidently pass first time while getting hands-on cybersecurity experience.
- PDF + ePub + Mobi pkt
Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
-
Information security strategies and best practices help in filling the gap that exists between theory and reality. The book starts by showing you how to implement risk management and governance structures into your organization and goes on to cover the best methods for operationalizing your information security strategy.
- PDF + ePub + Mobi pkt
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
This book covers the finer details of microcontrollers and low-powered embedded device programming with TinyGo. You’ll work through a range of interactive and real-world embedded projects that will help you to build creative thinking and understand a variety of TinyGo features and capabilities for programming hardware and multiple input devi
- PDF + ePub + Mobi pkt
Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation
-
Whether you are a tester or a developer working with APIs, you'll be able to put your knowledge to work with this practical guide to using Postman. The book provides a hands-on approach to implementing and learning the associated methodologies that will have you up-and-running and productive in no time.
- PDF + ePub + Mobi pkt
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing
-
Promocja
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Hardware security has become a major concern in recent times making it crucial for companies and end users to focus on protecting hardware. If you’re a security practitioner who is more familiar with software and binary hacking or someone looking to repurpose devices, this book will demonstrate how to approach hardware hacking of embedded de
- PDF + ePub + Mobi pkt
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
Promocja
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manag- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja
As you move data to the cloud, you need to consider a comprehensive approach to data governance, along with well-defined and agreed-upon policies to ensure your organization meets compliance requirements. Data governance incorporates the ways people, processes, and technology work together to ensure data is trustworthy and can be used effectively.- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
This book is a comprehensive guide for organizations on how to prepare for cyber-attacks and control cyber threats and network security breaches in a way that decreases damage, recovery time, and costs, facilitating the adaptation of existing strategies to cloud-based environments.
- PDF + ePub + Mobi pkt
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Veeam is an infrastructure backup solution for VMware vSphere or Hyper-V to enable VM and server backup. This book takes you through installation best practices, optimizations, and the 3-2-1 rule, before going on to examine repository and proxy-related topics and finally advanced topics such as DataLabs, Instant VM Recovery, and Veeam ONE.
- PDF + ePub + Mobi pkt
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Threat hunting is the act of proactively tracking and eliminating adversaries from your network as early as possible. Practical Threat Intelligence and Data-Driven Threat Hunting covers both threat intelligence and the act of threat hunting from the first steps to advanced practices.
- PDF + ePub + Mobi pkt
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Ghidra is the NSA’s state-of-the-art reverse engineering framework. It is open source, allowing the community to extend it with impressive range of features. This book offers a comprehensive introduction to anyone new to the Ghidra reverse engineering framework and malware reverse engineering.
- PDF + ePub + Mobi pkt
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Explore the capabilities of the Roblox platform to create real-world games with this book. You’ll follow a hands-on approach to learning the implementation and associated methodologies and get up and running with Roblox Lua in no time.
- PDF + ePub + Mobi pkt
Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming
-
Python’s latest updates feature numerous packages that can be used to perform critical missions. This Python networking and security book will help you to use Python packages to detect vulnerabilities in web apps and tackle networking challenges. You’ll explore a variety of techniques and tools for networking and security in Python.
- PDF + ePub + Mobi pkt
Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition
-
The CompTIA Security+: SY0-601 Certification Guide makes the most complex Security+ concepts easy to understand even for those who have no prior knowledge. Complete with exam tips, practical exercises, mock exams, and exam objective mappings, this is the perfect study guide to help you obtain Security+ certification.
- PDF + ePub + Mobi pkt
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
W skrypcie omówiono zagrożenia informacji i systemów teleinformatycznych, takich jak oprogramowanie złośliwe, cyberprzestępstwa i cyberterroryzm. Zaprezentowano różnorodne metody ochrony informacji przed zagrożeniami w cyberprzestrzeni, dzieląc je na metody administracyjno-organizacyjne, prawne i normalizacyjne, techniczne oraz
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
Promocja
Rootkity i Bootkity pomaga zrozumieć i przeciwdziałać wyrafinowanym, zaawansowanym zagrożeniom, zagrzebanym głęboko w procesie rozruchowym maszyny albo oprogramowaniu układowym UEFI. Z pomocą rozlicznych studiów przypadków i profesjonalnych badań trzech spośród wiodących światowych ekspertów do spraw zabezpieczeń prześledzimy rozwój złośliwego opro- ePub + Mobi pkt
(79,73 zł najniższa cena z 30 dni)
95.20 zł
119.00 zł(-20%) -
AWS is a very popular cloud service that many organizations are implementing into their infrastructure. AWS Penetration Testing is a comprehensive introduction for those who are new to AWS and Ethical hacking, that will have you up-to-speed in no time.
- PDF + ePub + Mobi pkt
AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
-
This book provides a comprehensive view of blockchain business models, governance structure, technology landscape, and architecture considerations. It will speed up your understanding and concept development for distributed ledgers.
- PDF + ePub + Mobi pkt
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
Nitin Gaur, Anthony O'Dowd, Petr Novotny, Luc Desrosiers, Venkatraman Ramakrishna, Salman A. Baset
-
Promocja
Książka jest kolejną publikacją Ogólnopolskiego Międzyuczelnianego Seminarium Problemy badawcze i projektowe informatyzacji państwa. Celem jej napisania było przybliżenie zagadnień związanych z integracją systemów informatycznych działających w jednej lub kilku firmach, w których zarządzanie dużą liczbą takich systemów staje się kłopotliwe. Książ(49,58 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
Promocja
Site reliability engineering (SRE) is more relevant than ever. Knowing how to keep systems reliable has become a critical skill. With this practical book, newcomers and old hats alike will explore a broad range of conversations happening in SRE. You'll get actionable advice on several topics, including how to adopt SRE, why SLOs matter, when you ne- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your systems against threats.Contrary t- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja
The future will be increasingly distributed. As the publicity surrounding Bitcoin and blockchain has shown, distributed technology and business models are gaining popularity. Yet the disruptive potential of this technology is often obscured by hype and misconception. This detailed guide distills the complex, fast moving ideas behind blockchain into- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
After prominent market leaders have been impacted by advanced cyber threats, network security has become a top priority in terms of successfully keeping attackers from breaching networks. This book will help you design a robust network security ecosystem that helps prevent traditional and new and evolving attacks.
- PDF + ePub + Mobi pkt
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Promocja
Accessible and fun to read, this practical book contains a collection of stories of organizations using blockchain technology in practice. Through deep research and firsthand interviews, authors Sir John Hargrave and Evan Karnoupakis show you how leading-edge organizations have worked to integrate blockchain into their businesses.You'll start by ex- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Biometric technology provides a robust and convenient method for authenticating an individual’s identity using fingerprint, iris, voice, palm print, or facial recognition. Identity Management with Biometrics will help you identify and address the challenges that you will need to consider as you move into the next iteration of identity protec
- PDF + ePub + Mobi pkt
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Mastering Blockchain, Third Edition is the blockchain bible to equip you with extensive knowledge of distributed ledgers, cryptocurrencies, smart contracts, consensus algorithms, cryptography and blockchain platforms such as Ethereum, Bitcoin, and many more.
- PDF + ePub + Mobi pkt
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
AI and blockchain are catalyzing the pace of enterprise innovation. This book is a guide to learn the basic concepts, analyze use-cases and implement these technologies across various industries such as healthcare, finance, trade, and supply chain. The book also guides you to build applications using Ethereum, machine learning and MóiBit.
- PDF + ePub + Mobi pkt
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Promocja
Nowoczesne złośliwe oprogramowanie coraz częściej zaciemnia swój kod i uniemożliwia analizę przez co potrzebujemy coraz wymyślniejszych metod, aby podnieść tę ciemną kurtynę wiedzy. Może pomóc w tym analiza binarna, której celem jest ustalenie prawdziwych własności programów binarnych, aby zrozumieć, co naprawdę robią. Inżynieria wsteczna i deasemb- ePub + Mobi pkt
(69,68 zł najniższa cena z 30 dni)
83.20 zł
104.00 zł(-20%) -
Kubernetes is a widely used opensource orchestration platform for managing container applications. Developers are not yet aware of the pitfalls of a containerized environment. This book takes you through core security principles, best practices, and real-world use cases to learn mitigation or prevention strategies from known attacks and CVEs.
- PDF + ePub + Mobi pkt
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
MS-500: Microsoft 365 Security Administration offers complete, up-to-date coverage of the MS-500 exam so you can take it with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.
- PDF + ePub + Mobi pkt
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Promocja
Przewodnik po zastosowaniach technologii blockchain poprawiającego elastyczność oraz bezpieczeństwo i obniżającego koszty narzędzia do zarządzania, analizy i udostępniania danych Książka przedstawia opis podstaw formalnych i właściwości technologii łańcucha bloków (blockchain) oraz wyniki praktycznych badań nad aspektami jej wdrożeń w środowiskach- ePub + Mobi pkt
Blockchain i bezpieczeństwo systemów rozproszonych Blockchain i bezpieczeństwo systemów rozproszonych
(86,43 zł najniższa cena z 30 dni)
103.20 zł
129.00 zł(-20%) -
Promocja
W związku z szybko zmieniającą się architekturą automatyzacji opartej na interfejsach API, platformy w chmurze stanęły wobec niespotykanych dotychczas wyzwań i możliwości w zakresie zapewnienia bezpieczeństwa. W niniejszej książce omówiono najlepsze praktyki dotyczące bezpieczeństwa środowisk w chmurze, udostępnianych przez różnych dostawców, nieza- ePub + Mobi pkt
(49,58 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.
- PDF + ePub + Mobi pkt
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator.
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Promocja
Ten solidny i dokładny przewodnik pomoże Ci zbudować i utrzymać skuteczną automatyzację testów W miarę jak branża związana z oprogramowaniem odchodzi stopniowo od tradycyjnych paradygmatów kaskadowych na rzecz tych bardziej zwinnych, automatyzacja testów staje się ważnym narzędziem, które pozwala zespołom deweloperów na dostarczanie oprogramowania- ePub + Mobi pkt
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
(69,68 zł najniższa cena z 30 dni)
83.20 zł
104.00 zł(-20%) -
Promocja
How can you use data in a way that protects individual privacy but still provides useful and meaningful analytics? With this practical book, data architects and engineers will learn how to establish and integrate secure, repeatable anonymization processes into their data flows and analytics in a sustainable manner.Luk Arbuckle and Khaled El Emam fr- ePub + Mobi pkt
Building an Anonymization Pipeline. Creating Safe Data Building an Anonymization Pipeline. Creating Safe Data
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.
- PDF + ePub + Mobi pkt
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10.
- PDF + ePub + Mobi pkt
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
-
Azure Sentinel is an intelligent security service from Azure where Microsoft's main focus on developing sentinel is to integrate and bring together cloud security and artificial intelligence into effect. Here readers will gain enough understanding to make the most of Azure services to secure their environment from modern cybersecurity threats.
- PDF + ePub + Mobi pkt
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Promocja
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine app- ePub + Mobi pkt
Container Security. Fundamental Technology Concepts that Protect Containerized Applications Container Security. Fundamental Technology Concepts that Protect Containerized Applications
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Cybersecurity Attacks: Red Team Strategies is a guide to building and maturing an internal red team program. It highlights the core strategies to measure and improve security awareness, breach detection, and response capabilities. In addition, we will dive into the technical details of tactics and techniques for red teamers of all skill levels.
- PDF + ePub + Mobi pkt
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
A first-hand look into how quantum computing and Blockchain together are redefining industries, including fintech, healthcare, and research. Through a series of interviews with domain experts, Arun also explores the potential of these technologies to transform national and global governance and policies.
- PDF + ePub + Mobi pkt
Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain
-
Promocja
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to h- ePub + Mobi pkt
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
(211,65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
Promocja
Real IT World to cykl publikacji przygotowanych przez specjalistów dla specjalistów, omawiający aktualne i ważne zagadnienia, hot tematy, nowe trendy, praktyczne case study, najważniejsze problemy i innowacje w świecie IT. Jest to odpowiedź na szybko zmieniający się rynek. Każdy numer tworzony jest przez wybitnych ekspertów-praktyków, którzy szybko- ePub + Mobi pkt
(33,90 zł najniższa cena z 30 dni)
39.20 zł
49.00 zł(-20%) -
Hands-On Restful Web Services with Go will help you in understanding the fundamentals of REST and enable you to quickly develop graceful API with the help of Golang's open-source tools and libraries. It can be a developer guide in general that covers all key aspects of API development and standard architecture patterns in application development.
- PDF + ePub + Mobi pkt
Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition
-
Artificial Intelligence (AI) gets your system to think smart and learn intelligently. This book is packed with some of the smartest trending examples with which you will learn the fundamentals of AI. By the end, you will have acquired the basics of AI by practically applying the examples in this book.
- PDF + ePub + Mobi pkt
Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition
-
AWS Security Cookbook lists all the practical solutions to the common problems faced by individuals or organizations in securing their instances. Here readers will learn to troubleshoot security concerns and understand additional patterns and services for securing AWS infrastructure.
- PDF + ePub + Mobi pkt
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
A new edition of the bestselling Pandas cookbook updated to pandas 1.x with new chapters on creating and testing, and exploratory data analysis. Recipes are written with modern pandas constructs. This book also covers EDA, tidying data, pivoting data, time-series calculations, visualizations, and more.
- PDF + ePub + Mobi pkt
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Cyber Warfare – Truth, Tactics, and Strategies takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools and strategies presented for you to learn how to think about defendin
- PDF + ePub + Mobi pkt
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Blockchain technology will play a disruptive role in the banking and finance sector in the future. Experts estimate that it will save up to 20 billion dollars annually. You will build full-fledged financial applications using blockchain. It will aid you in building more secure and transparent workflows and re-engineering your business processes.
- PDF + ePub + Mobi pkt
Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar
-
With six new chapters, Deep Reinforcement Learning Hands-On Second edition is completely updated and expanded with the very latest reinforcement learning (RL) tools and techniques, providing you with an introduction to RL, as well as the hands-on ability to code intelligent learning agents to perform a range of practical tasks.
- PDF + ePub + Mobi pkt
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety.
- PDF + ePub + Mobi pkt
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book that covers the very latest security threats and defense strategies, updated for 2020.
- PDF + ePub + Mobi pkt
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Promocja
Książka Konfiguracja Firewalli CISCO ASA w programie Packet Tracer zawiera podstawy filtrowania ruchu sieciowego realizowanego na komputerze, routerze WIFI oraz urządzeniach ASA. Czytelnik znajdzie tutaj wiele przykładów i ćwiczeń wykonanych w najnowszej wersji symulatora Packet Tracer. Ćwiczenia poprowadzą czytelnika w sposób łatwKonfiguracja Firewalli CISCO ASA w programie Packet Tracer Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
(24,90 zł najniższa cena z 30 dni)
42.00 zł
56.00 zł(-25%) -
Electron is one of the most popular JavaScript frameworks for building cross-platform desktop applications. This project-based guide will help you explore the components of the Electron framework and its integration with other JS libraries to build real-world desktop apps with an increasing level of complexity.
- PDF + ePub + Mobi pkt
Electron Projects. Build over 9 cross-platform desktop applications from scratch Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
The MS-101 exam is part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path in which users learn to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This book offers complete, up-to-date coverage of the MS-101 exam so you can take them with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365 Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Promocja
Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distributed computing platform. You’llget up to speed with the fundamentals and quickly mo- ePub + Mobi pkt
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
This book helps data scientists and cybersecurity experts on implementing the latest AI techniques in cybersecurity. Concrete and clear steps for implementing ML security systems are provided, saving you months in research and development. By the end of this book, you will be able to build defensive systems to curb cybersecurity threats.
- PDF + ePub + Mobi pkt
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication.
- PDF + ePub + Mobi pkt
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Get ready to pass your CompTIA Security+ certification exam with the elaborate and complete practice that Security+? Practice Tests will provide you. From detailed explanations of the six domains to full-length practice tests, you’ll gain complete knowledge of what this test contains and how to ace it.
- PDF + ePub pkt
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
This book will cover use-cases on how blockchain is currently being used in the industry - catering to key decision-makers within an organization. It also addresses the real problems and technical difficulties in implementing blockchain, and the various blockchain strategies being adopted by popular organizations all over the world.
- PDF + ePub + Mobi pkt
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.
- PDF + ePub + Mobi pkt
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Blockchain empowers enterprises to scale out in a unique way, allowing them to build and manage blockchain business networks. This book offers an exploration of distributed ledger technology, blockchain, and Hyperledger fabric along with blockchain-as-a-service (BaaS).
- PDF + ePub + Mobi pkt
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Promocja
Until recently, learning CoreDNS required reading the code or combing through the skimpy documentation on the website. No longer. With this practical book, developers and operators working with Docker or Linux containers will learn how to use this standard DNS server with Kubernetes.John Belamaric, senior staff software engineer at Google, and Cric- ePub + Mobi pkt
Learning CoreDNS. Configuring DNS for Cloud Native Environments Learning CoreDNS. Configuring DNS for Cloud Native Environments
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
This Learning Path is your comprehensive guide to making machine data accessible across your organization using advanced dashboards. With over 80 realistic examples, you'll get several recipes to use Splunk and transform your data into business-critical insights.
- PDF + ePub + Mobi pkt
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
This book will cover all the new features that have been introduced in TensorFlow 2.0 especially the major highlight, including eager execution and more. You will learn how to make the best use of these features to migrate your codes from TensorFlow 1.x to TensorFlow 2.0 in a seamless way.
- PDF + ePub + Mobi pkt
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Web Components are the set of APIs that helps you build standard UI functions that work across any browser, with any JavaScript framework. This practical guide will help you fulfill this promise through examples and best practices. It will help you implement the web components in your existing frontend application to let you fully realize the capab
- PDF + ePub + Mobi pkt
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.
- PDF + ePub + Mobi pkt
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
With this book, you will learn to write production-ready smart contracts for the Ethereum blockchain. Finally, with the help of comprehensive examples, you will learn how to add security to smart contracts and then delve into the various security considerations that must be paid attention to.
- PDF + ePub + Mobi pkt
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
This Learning Path is your easy reference to know all about penetration testing or ethical hacking. With more than 100 recipes, you'll become a master of the most widely used penetration testing framework and easily tackle command injection flaws, crypto implementation layers, and web application security holes.
- PDF + ePub + Mobi pkt
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
-
Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.
- PDF + ePub + Mobi pkt
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure your i
- PDF + ePub + Mobi pkt
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Promocja
Remember the dawn of the internet or the advent of mobile computing and social media? Yet another digital revolution is now underway. Like its predecessors, blockchains are about to transform the way we live, work, and play, while disrupting entrenched industries and shattering conventional business models.This practical guide takes you past the hy- ePub + Mobi pkt
Unblocked. How Blockchains Will Change Your Business (and What to Do About It) Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
With Red Hat Enterprise Essentials you will run and operate Red Hat Linux 8 learn to securely administer a server or a system using Linux commands.
- ePub pkt
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world.
- PDF + ePub + Mobi pkt
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). This book teaches you various penetration testing techniques in order to become
- PDF + ePub + Mobi pkt
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
ABAP is an established and complex programming language in the IT industry. This book will give you confidence in using the latest ABAP programming techniques and applying legacy constructions with the help of practical examples.
- PDF + ePub + Mobi pkt
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Starting with the technical foundations of blockchain, this Learning Path takes you deep into the theoretical and technical foundations of the technology to transform you into an expert of decentralized applications and blockchain.
- PDF + ePub + Mobi pkt
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
This essential guide will help any blockchain practitioner gain expertise in developing complete STO and stablecoins DApps. This book provides a quick introduction to basic ICO and STO concepts, and their differences. It will also help readers compile, test, and deploy their own contracts by altering the code provided in the book.
- PDF + ePub + Mobi pkt
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
This Learning Path focuses on showing you how to leverage the benefits of the cloud and create applications that are high in performance and availability. It teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud.
- PDF + ePub + Mobi pkt
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Promocja
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows y- ePub + Mobi pkt
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
C# and .NET Core makes network programming the enjoyable experience it should be. This book will get you started with the basics of network programming as they relate to C#. We will then dig into the core topics of the network layer. You'll also learn to make sockets connections as well and develop practical client-side applications in this book.
- PDF + ePub + Mobi pkt
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
This Learning Path is your easy reference to explore and build blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Starting with the basics of blockchain, this Learning Path teaches you all that you need to know to develop your own private and public blockchain networks.
- PDF + ePub + Mobi pkt
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
Salman A. Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
-
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.
- PDF + ePub + Mobi pkt
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7 Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Mastering Distributed Tracing provides comprehensive coverage of the tracing field. Solve problems through code instrumentation with open standards, and learn how to profile complex systems. The book will also prepare you to operate and enhance your own tracing infrastructure.
- PDF + ePub + Mobi pkt
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Data structures and algorithms help you to understand computational complexity and write efficient code. Kotlin data structures and algorithms enable you to write code that runs faster which is important in the web and mobile world. This book takes you through the techniques that you can use in your regular production environment.
- PDF + ePub + Mobi pkt
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get started with executing an application penetration test and be sure of the results.
- PDF + ePub + Mobi pkt
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine VR Quick Start Guide introduces designers to the guidelines and design processes necessary to build interactive VR experiences. Learn to use User Experience design techniques and Blueprint programming to create virtual reality gameplay for HTC Vive, Oculus Rift, PSVR, and Windows Mixed Reality headsets.
- PDF + ePub + Mobi pkt
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4 Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
With this Learning Path, you will be able to easily solve complex programming challenges using advanced features of C#. You'll structure and build scalable, optimized, and robust applications in C#7 and .NET, and with the newly-acquired TDD skills, you'll be ready to enter the market not only as a C# pro, but also as a TDD expert.
- PDF + ePub + Mobi pkt
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C# Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
-
This book is for Python developers to implement various components of end-to-end decentralized applications such as cryptocurrencies, smart contracts, wallet and more. You will use the example-based approach using various libraries from Python ecosystem to build efficient and powerful blockchain applications at work or projects.
- PDF + ePub + Mobi pkt
Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python
-
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.
- PDF + ePub + Mobi pkt
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoints and create robust defense strategies.
- PDF + ePub + Mobi pkt
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concepts that will come in handy when making robust cybersecurity tools and custom exploits.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Microsoft Azure has numerous effective solutions but the biggest challenge that architects and administrators face is implementing these solutions appropriately. This Learning Path focuses on various scenarios that will help overcome the challenge of implementing Azure solutions while helping you prepare for the Microsoft Architect exam.
- PDF + ePub + Mobi pkt
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, Namit Tanasseri, Rahul Rai
-
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
The serverless architecture allows you to build and run applications and services without having to manage the infrastructure which saves cost and improves scalability. In this book, you will learn to harness serverless technology to reduce production time, minimize cost and have the freedom to customize your code, without hindering functionality.
- PDF + ePub + Mobi pkt
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
This is a comprehensive guide to help you understand the current threats faced by the financial cyberspace and how to go about it and secure your financial landscape. The book will take you on a journey from identifying the attackers to securing your financial transactions and assets. The book then take you through the updates needed for procedures
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Python is the major programming language for network programming. This Learning Path shows you how to use the power and beauty of Python to complete numerous real-world tasks related to programming, monitoring, and administering networks.
- PDF + ePub + Mobi pkt
Python Network Programming. Conquer all your networking challenges with the powerful Python language Python Network Programming. Conquer all your networking challenges with the powerful Python language
Abhishek Ratan, Eric Chou, Pradeeban Kathiravelu, Dr. M. O. Faruque Sarker
-
Functional programming is a very powerful programming paradigm that can help us to write better code. This book presents essential functional and reactive programming concepts in a simplified manner using Typescript.
- PDF + ePub + Mobi pkt
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Mastering Kali Linux for Advanced Penetration Testing, Third Edition will guide you through proven techniques to test your infrastructure security using Kali Linux. From selecting the most effective tools to carrying out advanced pentesting in highly secure environments, this book will help you gain the expertise you need to advance in your career.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain has the potential to change the world and has become the hottest field in the tech sector now. Blockchain for Business is a comprehensive guide that enables you to fully understand the far-reaching applications beyond Bitcoin and empowers you to make fully-informed decisions.
- PDF + ePub + Mobi pkt
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. Learn blockchain from first concepts to algorithms explained in Python.
- PDF + ePub + Mobi pkt
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
Promocja
Autor dowodzi, że dalszy rozwój cyfrowych narzędzi komunikacyjnych technologii jest nie do pogodzenia z dalszym trwaniem liberalnych instytucji demokracji. Demokracja liberalna wykształciła się w czasach analogowych, więc do analogowej rzeczywistości były przystosowane jej główne założenia i narzędzia do zarządzania kryzysem. W epoce cyfrowej, g- ePub + Mobi pkt
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić) Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
(18,90 zł najniższa cena z 30 dni)
24.80 zł
31.00 zł(-20%) -
IoT and Blockchain are not limited to certain industries or use cases. Almost any business with a network and IoT device can reduce costs, improve business efficiency, and remove single points of failure in networks by implementing Blockchain. This book will help you implement an end-to-end Blockchain and IoT solution using best practices.
- PDF + ePub + Mobi pkt
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
The book will allow readers to implement smart solutions to their existing cybersecurity products and effectively build intelligent solutions which cater to the needs of the future. By the end of this book, you will be able to build, apply, and evaluate machine learning algorithms to identify various cybersecurity potential threats.
- PDF + ePub + Mobi pkt
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Hands-On Enterprise Application Development with Python explains how Python has matured to become a suitable programming language to build robust applications that scale easily to manage the requirements of the enterprise. The book will explore features of Python 3.7, tested frameworks and tools and best programming practices for developing scalabl
- PDF + ePub + Mobi pkt
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3 Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
This book will introduce you to Android forensics helping you to set up a forensic environment, handle mobile evidence, analyze how and where common applications store their data. You will also learn to identify malware on a device, and how to analyze it.
- PDF + ePub + Mobi pkt
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
C++ is a general-purpose programming language with a bias towards systems programming. This book provides a detailed walkthrough of the C, C++ and POSIX standards and enables a firm understanding of various system calls for UNIX systems. Topics include console and file IO, memory management, sockets, time interface, process and thread management
- PDF + ePub + Mobi pkt
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17 Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
Understanding the history of the Deep Web, its current state, and its possible evolution, can help you, the reader; better understand the dangers and risks that exist out there. This book helps you access the Deep Web and the Dark Net and also protect yourself while browsing the Deep Web.
- PDF + ePub + Mobi pkt
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions.
- PDF + ePub + Mobi pkt
CentOS Quick Start Guide. Get up and running with CentOS server administration CentOS Quick Start Guide. Get up and running with CentOS server administration