Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition
-
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
Rootkity i Bootkity
-
Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw
-
AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
-
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
-
Platformy integracyjne Zagadnienia wybrane
-
97 Things Every SRE Should Know
-
Mastering Blockchain
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Blockchain Success Stories
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Praktyczna analiza powłamaniowa. Aplikacja webowa w środowisku Linux
-
Bezpieczeństwo tożsamości i danych w projektach Web
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Praktyczna analiza plików binarnych
-
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Bezpieczeństwo w chmurze
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
-
Building an Anonymization Pipeline. Creating Safe Data
-
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Container Security. Fundamental Technology Concepts that Protect Containerized Applications
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Internet Rzeczy
-
Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition
-
Artificial Intelligence By Example. Acquire advanced AI, machine learning, and deep learning design skills - Second Edition
-
The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition
-
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar
-
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain
-
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Konfiguracja Firewalli CISCO ASA w programie Packet Tracer
-
Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices
-
Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
Hands-On Smart Contract Development with Solidity and Ethereum. From Fundamentals to Deployment
-
Testowanie oprogramowania w praktyce. Studium przypadków 2.0
-
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
Learning CoreDNS. Configuring DNS for Cloud Native Environments
-
Przestępczość teleinformatyczna 2016
-
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
-
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
-
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
-
Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Python Network Programming. Conquer all your networking challenges with the powerful Python language
-
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
Ludzie przeciw technologii. Jak internet zabija demokrację (i jak ją możemy ocalić)
-
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Mastering Vim. Build a software development environment with Vim and Neovim
-
Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications