Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Java Programming for Beginners. Learn the fundamentals of programming with Java
-
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Mastering AWS Security. Create and maintain a secure cloud ecosystem
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
DevOps Bootcamp. The fastest way to learn DevOps
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Practical OneOps. Implement DevOps with ease
-
Defensive Security Handbook. Best Practices for Securing Infrastructure
-
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks
-
Troubleshooting OpenVPN. Click here to enter text
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
The Internet of Risky Things. Trusting the Devices That Surround Us
-
Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition
-
Network Security Assessment. Know Your Network. 3rd Edition
-
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Docker Networking Cookbook. Click here to enter text
-
Ransomware. Defending Against Digital Extortion
-
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
Raspberry Pi: Amazing Projects from Scratch. Click here to enter text
-
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
Hacking Android. Click here to enter text
-
CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition
-
Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools
-
Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
-
Practical Windows Forensics. Leverage the power of digital forensics for Windows systems
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Przestępczość teleinformatyczna 2015
-
Identity and Data Security for Web Development. Best Practices
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
-
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Practical Linux Security Cookbook. Click here to enter text
-
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Bezpieczeństwo rozproszonych systemów informatycznych
-
Java Cryptography
-
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board
-
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis
-
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests
-
Sharing Big Data Safely. Managing Data Security
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
Accumulo. Application Development, Table Design, and Best Practices