Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Po pierwsze: bezpieczeństwo. Przewodnik dla twórców oprogramowania
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
Metasploit. Receptury pentestera. Wydanie II
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Certificate of Cloud Security Knowledge (CCSK v5) Study Guide. In-Depth Guidance and Practice
-
Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących
Niedostępna
-
Druk
-
PDF
-
-
Złam ten kod z Pythonem. Jak tworzyć, testować i łamać szyfry
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Microsoft 365 Administration Cookbook. Boost efficiency, automate processes, and enforce compliance with expert admin recipes - Second Edition
-
Bezpieczeństwo urządzeń mobilnych. Receptury
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Security CCNA 210-260. Zostań administratorem sieci komputerowych Cisco
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Bash Shell Scripting for Pentesters. Master the art of command-line exploitation and enhance your penetration testing workflows
-
Podręcznik Hardware Hackera
-
Hakowanie sztucznej inteligencji
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Mastering Ethereum. 2nd Edition
-
CompTIA CySA+ (CS0-003) Certification Guide. Pass the CySA+ exam on your first attempt with complete topic coverage, expert tips, and practice resources
-
Getting Started with Google Kubernetes Engine
-
Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Mastering Linux Security and Hardening. A practical guide to protecting your Linux system from cyber attacks - Third Edition
-
Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw
-
Building Internet Firewalls. 2nd Edition
-
Securing Google Cloud Platform
-
Data Governance: The Definitive Guide
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Mastering Microsoft 365 Security Technologies
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Defensive Security Handbook. 2nd Edition
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Adversary Emulation with MITRE ATT&CK
-
Inżynieria zabezpieczeń Tom I
-
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide. Become an expert and get Google Cloud certified with this practitioner’s guide
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Ransomware. Defending Against Digital Extortion
-
Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II
-
Kali Linux. Testy penetracyjne
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Learn Blue Teaming and Threat Management
-
AI in the Classroom
-
Mastering Cloud Auditing
-
Mastering Azure Security
-
Mastering Cloud-Native Serverless Computing with AWS
-
Reverse Engineering Armv8-A Systems. A practical guide to kernel, firmware, and TrustZone analysis
-
Site Reliability Engineering Handbook
-
The Security Consultant's Handbook. Essential Strategies for Building and Managing a Security Consulting Business
-
Intelligent Continuous Security
-
Attack Surface Management
-
CompTIA CASP+ (CAS-005) Certification Guide - 2nd Edition
-
Learning Game Architecture with Unity
-
SnowPro Core Certification Study Guide. Build a solid foundation in Snowflake to pass the SnowPro Core exam on the first attempt
-
Cloud Computing for Everyone
-
Quantum Blockchain
-
Vulnerability Assessment and Penetration Testing (VAPT)
-
AWS Security Cookbook. Practical solutions for securing AWS cloud infrastructure with essential services and best practices - Second Edition
-
Mastering Honeypots
-
Hack the Cybersecurity Interview. Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles - Second Edition
-
Blockchain, Bitcoin, and the Digital Economy. Unlocking the Future of Financial Technology
-
Cracking the Cybersecurity Interview
-
Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity
-
97 Things Every Application Security Professional Should Know
-
Mastering Open Source Threat Analysis Strategies
-
Learn Penetration Testing with Python 3.x - 2nd Edition
-
Penetration Testing with Kali NetHunter
-
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Zero Trust Networks. 2nd Edition
-
Software Supply Chain Security
-
Implementing DevSecOps Practices. Understand application security testing and secure coding by integrating SAST and DAST
-
Demystifying DevSecOps in AWS
-
Wireless Penetration Testing: Up and Running
-
Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Penetration Testing for Jobseekers
-
Ethically hacking an industrial control system
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation
-
Hands-on Penetration Testing for Web Applications
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Building an Anonymization Pipeline. Creating Safe Data
-
Internet Rzeczy
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Bezpieczeństwo tożsamości i danych w projektach Web
-
Przestępczość teleinformatyczna 2016
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
-
Digital Identity
-
Kerberos: The Definitive Guide. The Definitive Guide
-
TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS
-
PDF + ePub + Mobi
-
-
Zagrożenia informacji w cyberprzestrzeni, cyberterroryzm
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
Security Automation with Python. Practical Python solutions for automating and scaling security operations
-
Learning eBPF
-
Mastering Network Flow Traffic Analysis
-
Cloud Security Handbook. Effectively secure cloud environments using AWS, Azure, and GCP - Second Edition
-
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition
-
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
Dziecko w sieci
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Testowanie bezpieczeństwa aplikacji internetowych. Receptury
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Microsoft Security Copilot. Master strategies for AI-driven cyber defense
-
Cyber Security Kill Chain - Tactics and Strategies. Breaking down the cyberattack process and responding to threats
-
SZYFROWANIE BEZPIECZEŃSTWO KRYPTOGRAFIA: CZĘŚĆ 1 Podstawowe pojęcia i koncepcje
-
PDF
-
-
Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps
-
Bezpieczeństwo defensywne. Podstawy i najlepsze praktyki
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Sieci VPN. Zdalna praca i bezpieczeństwo danych
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Podstawy ochrony komputerów
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-

