Bezpieczeństwo sieci - ebooki
Ebooki z kategorii: Bezpieczeństwo sieci dostępne w księgarni Helion
-
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.
- PDF + ePub + Mobi pkt
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoints and create robust defense strategies.
- PDF + ePub + Mobi pkt
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concepts that will come in handy when making robust cybersecurity tools and custom exploits.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Microsoft Azure has numerous effective solutions but the biggest challenge that architects and administrators face is implementing these solutions appropriately. This Learning Path focuses on various scenarios that will help overcome the challenge of implementing Azure solutions while helping you prepare for the Microsoft Architect exam.
- PDF + ePub + Mobi pkt
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, Namit Tanasseri, Rahul Rai
-
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
pfSense is a FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. This book focuses on configuring essential and other commonly used pfSense services; such as traffic shaping, redundancy, high availability, static and dynamic routing, backup and restoration of pfSense, and diagnostic tools.
- PDF + ePub + Mobi pkt
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what the field is about, the book solves that problem. The book allows readers to train themselves as bug b
- PDF + ePub + Mobi pkt
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
This second edition of Kali Linux 2: Windows Penetration Testing provides approaches and solutions to the issues of modern penetration testing for a Microsoft Windows environment. As a pen tester, you need to be able to understand and use the best available tools - this book addresses these needs with maximum in a cost and time efficient way.
- PDF + ePub + Mobi pkt
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
CompTIA Security+ Certification Guide makes the most complex Security+ concepts easy to understand despite having no prior knowledge. It offers exam tips in every chapter along with access to practical exercises and exam checklist that map to the exam objectives and it is the perfect study guide to help you pass CompTIA Security+ SY0-501 exam.
- PDF + ePub + Mobi pkt
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Industrial Internet is the integration of complex physical machines and networked sensors and software. Increasing the number of sensors in industrial equipment is going to increase the data being captured, which needs to be analyzed. This book is a one-stop guide for software professionals to design, build, manage, and operate IIoT applications.
- PDF + ePub + Mobi pkt
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli
-
Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be able to determine the security state of the client's network and recommend remediations accordingly.
- PDF + ePub + Mobi pkt
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7 Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Nowadays, configuring a network and automating security protocols are quite difficult to implement. However, using Python makes it easy to automate this whole process. This book explains the process of using Python for building networks, detecting network errors, and performing different security protocols using Python Scripting.
- PDF + ePub + Mobi pkt
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity.
- PDF + ePub + Mobi pkt
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
The purpose of the Burp Suite Cookbook is to provide web application penetration testers with hands-on examples of how to use Burp Suite to perform web assessments. The book gives detailed screenshots demonstrating how to perform various attacks in Burp including Cross-site Scripting (XSS), SQL Injection, Cross-site Request Forgery, XML External E
- PDF + ePub + Mobi pkt
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.
- PDF + ePub + Mobi pkt
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
This book covers everything the reader needs to know to get pfSense up and running, as well as how to configure core pfSense services to both secure and optimize their networks, third party packages that extend the functionality of pfSense, and the basics of diagnostics and troubleshooting networks.
- PDF + ePub + Mobi pkt
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Penetration testing is highly competitive, and it’s easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.
- PDF + ePub + Mobi pkt
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud.
- PDF + ePub + Mobi pkt
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.
- PDF + ePub + Mobi pkt
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
This book will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do.
- PDF + ePub + Mobi pkt
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.
- PDF + ePub + Mobi pkt
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260) CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you will be
- PDF + ePub + Mobi pkt
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.
- PDF + ePub + Mobi pkt
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to you. Yo
- PDF + ePub + Mobi pkt
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. By the end of this book, you’ll know how to analyze the traffic, find patterns of various offending tra
- PDF + ePub + Mobi pkt
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best security
- PDF + ePub + Mobi pkt
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Customizing networks and controlling the traffic flow is becoming a must for all the modern solutions, even if these solutions exist on Azure, on-premises or a combination of both.In this book, you will learn all Azure networking solutions and spanning them across Azure and On-premises, and how to build a highly available environment by them.
- PDF + ePub + Mobi pkt
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
This book covers everything you need to set up a Kali Linux lab, the latest generation of the BackTrack Linux penetration testing and security auditing Linux distribution. Learn how to use the hundred tools Kali Linux has so you can manage security tasks such as penetration testing, forensics, and reverse engineering.
- PDF + ePub + Mobi pkt
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices , modern operating systems and help you secure high security environments.
- PDF + ePub + Mobi pkt
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with Insigh
- PDF + ePub + Mobi pkt
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal
-
Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic forensics
- PDF + ePub + Mobi pkt
Security with Go. Explore the power of Golang to secure host, web, and cloud services Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Wireshark is a popular and powerful tool used to analyze the bits and bytes that are flowing through a network. Packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging.
- PDF + ePub + Mobi pkt
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
The security of wireless networks is more important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking features of Kali Linux.
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
: Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.
- PDF + ePub + Mobi pkt
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Security is a key ingredient when it comes to workloads deployed in cloud. Security is highest priority for any organization and it is considered job zero at AWS. Our book will dig deep into the achieving end to end automated security for all workloads deployed, running and stored in AWS cloud.
- PDF + ePub + Mobi pkt
Mastering AWS Security. Create and maintain a secure cloud ecosystem Mastering AWS Security. Create and maintain a secure cloud ecosystem
-
With ever-improving and ever-changing cyber threats, businesses need to be on their toes to ensure their safety. This comprehensive book takes you from understanding the basics of cyber security and industrial protocols to building robust industrial control systems. Through real-world scenarios, you will understand vulnerabilities and will be equip
- PDF + ePub + Mobi pkt
Industrial Cybersecurity. Efficiently secure critical infrastructure systems Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed for the present while keeping the future in mind. This book talks about how to design and implement enterprise ne
- PDF + ePub + Mobi pkt
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
The Junos automation toolkit is part of the standard Junos OS available on all switches, routers, and security devices running Junos OS. Junos automation simplifies complex configurations and reduces potential configuration errors.This book is a set of powerful recipes that will cover all you need to know about implementing Junos Automation to auto
- PDF + ePub + Mobi pkt
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need fo
- PDF + ePub + Mobi pkt
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Promocja
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how you- ePub + Mobi pkt
Network Security Through Data Analysis. From Data to Action. 2nd Edition Network Security Through Data Analysis. From Data to Action. 2nd Edition
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Metasploit for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. This book would help the reader absorb the essential concepts on using Metasploit framework for comprehensive penetration testing. By the end of the book, the reader would feel confident
- PDF + ePub + Mobi pkt
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.
- PDF + ePub + Mobi pkt
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
With the ever-increasing amount of data flowing in today’s world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2
- PDF + ePub + Mobi pkt
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
This is the second edition of ‘Nmap 6: Network Exploration and Security Auditing Cookbook’. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security audit
- PDF + ePub + Mobi pkt
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Metasploit Bootcamp will enable readers to gain hands-on knowledge on Penetration testing with Metasploit in various environments using a boot camp style approach. The readers will learn about Scanning, fingerprinting and exploiting different software. They will also learn about testing on services like Databases, VOIP and other known and unknown s
- PDF + ePub + Mobi pkt
Metasploit Bootcamp. The fastest way to learn Metasploit Metasploit Bootcamp. The fastest way to learn Metasploit
-
Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.
- PDF + ePub + Mobi pkt
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo
- PDF + ePub + Mobi pkt
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
- PDF + ePub + Mobi pkt
-
- PDF + ePub + Mobi pkt
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
- PDF + ePub + Mobi pkt
Penetration Testing: A Survival Guide. A Survival Guide Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran
-
The second edition of Penetration Testing with Raspberry Pi will show you how to use Raspberry Pi 3 to develop a portable, cost-efficient hacking tool with Kali Linux 2. You’ll be able to get hands-on with pentesting and explore a variety of essential techniques.
- PDF + ePub + Mobi pkt
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
- PDF + ePub + Mobi pkt
Docker Networking Cookbook. Click here to enter text Docker Networking Cookbook. Click here to enter text
-
Promocja
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
-
This book gets you up and running with mobile forensics, covering everything from how to effectively deal with digital evidence to mobile acquisition tools and techniques. You’ll also gain insights into the various challenges faced while performing mobile forensics.
- PDF + ePub + Mobi pkt
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
- PDF + ePub + Mobi pkt
Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition
-
This updated edition focuses on the use of Kali Linux 2, aka Sana, and provides you with the skills needed to conduct penetration testing effectively. You’ll find out how to install Kali Linux and then use it for pentesting with the help of cutting-edge wireless penetration tools, enabling you to test your corporate network against threats.
- PDF + ePub + Mobi pkt
Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition Kali Linux 2 - Assuring Security by Penetration Testing. Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition! - Third Edition
-
- PDF + ePub + Mobi pkt
Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition Building Virtual Pentesting Labs for Advanced Penetration Testing. Click here to enter text. - Second Edition
-
- PDF + ePub + Mobi pkt
CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition
-
- PDF + ePub + Mobi pkt
Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
-
- PDF + ePub + Mobi pkt
Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks
-
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.
- PDF + ePub + Mobi pkt
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
- PDF + ePub + Mobi pkt
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337 Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
Promocja
Publikacja składa się z trzech podstawowych części. Pierwsza z nich porusza historie rozwoju informatyki i metod zabezpieczenia informacji. W drugiej części przedstawione są aktualne rozwiązania związane z szyfrowaniem informacji, autentyfikacją użytkownika oraz omówiona została kwestia ochrony przechowywanej informacji. Ponieważ niekt&oacutBezpieczeństwo rozproszonych systemów informatycznych Bezpieczeństwo rozproszonych systemów informatycznych
(26,40 zł najniższa cena z 30 dni)
26.40 zł
33.00 zł(-20%) -
- PDF + ePub + Mobi pkt
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
- PDF + ePub + Mobi pkt
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
- PDF + ePub + Mobi pkt
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
- PDF + ePub + Mobi pkt
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
- PDF + ePub + Mobi pkt
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Promocja
Opracowanie nie skupia się na aspektach związanych z kontrolą czasu pracy, ocenie efektywności wykorzystania czasu pracy, czy kształtowania i normowania czasów działań podejmowanych przez użytkowników systemów komputerowych. Zakres tematyczny pracy jest związany z bezpieczeństwem i ciągłością działania systemów komputMonitorowanie aktywności użytkowników systemów komputerowych Monitorowanie aktywności użytkowników systemów komputerowych
(25,60 zł najniższa cena z 30 dni)
25.60 zł
32.00 zł(-20%) -
Promocja
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether yo- ePub + Mobi pkt
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis
-
- PDF + ePub + Mobi pkt
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
- PDF + ePub + Mobi pkt
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
- PDF + ePub + Mobi pkt
Mastering Python Forensics. Master the art of digital forensics and analysis with Python Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
- PDF + ePub + Mobi pkt
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
- PDF + ePub + Mobi pkt
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
Promocja
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level s- ePub + Mobi pkt
Accumulo. Application Development, Table Design, and Best Practices Accumulo. Application Development, Table Design, and Best Practices
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance
-
- PDF + ePub + Mobi pkt
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Promocja
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own th- ePub + Mobi pkt
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
- PDF + Mobi pkt
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
- PDF + ePub + Mobi pkt
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
- PDF + ePub + Mobi pkt
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
Cyfrowy świat już nieodwołalnie wkroczył w nasze życie, lecz czy przyniósł same korzyści? Wydawało się, że wraz z rozwojem Internetu będzie się poszerzać sfera wolności, lecz stało się coś wręcz przeciwnego. Ujawniona przez Edwarda Snowdena skala powszechnego szpiegostwa z wykorzystaniem globalnej sieci Internet wskazuje, że wolności jest co
-
- PDF + ePub + Mobi pkt
Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning
-
Co to jest nowy malware i czy jest się czego bać? Cyfrowy świat już na dobre wkroczył w nasze życie, lecz czy na pewno przyniósł same dobrodziejstwa? Wielu z nas tak zauroczyło się tym cyfrowym jarmarkiem różności, że się nad tym nie zastanawia... Zagrożenia w wirtualnym świecie są bagatelizowane, a nawet świadomie ignorowane &nda
-
- PDF + ePub + Mobi pkt
Network Analysis using Wireshark Cookbook. This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues Network Analysis using Wireshark Cookbook. This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues
-
- PDF + ePub + Mobi pkt
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
- PDF + ePub + Mobi pkt
VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud
-
- PDF + ePub + Mobi pkt
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
- PDF + ePub + Mobi pkt
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
- PDF + ePub + Mobi pkt
Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment
-
- PDF + ePub + Mobi pkt
SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features
-
- PDF + ePub + Mobi pkt
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
Darla Nykamp, Joseph Anderson, Jayasree Nampalli, Mari Heiser, Timothy Speed
-
- PDF + ePub + Mobi pkt
Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness
-
- PDF + ePub + Mobi pkt
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
- PDF + ePub + Mobi pkt
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
Ochrona danych osobowych. Poradnik dla przedsiębiorców Ochrona danych osobowych. Poradnik dla przedsiębiorców
-
- PDF + ePub + Mobi pkt
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
- PDF + ePub + Mobi pkt
SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM
-
- PDF + ePub + Mobi pkt
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
- PDF + ePub + Mobi pkt
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
- PDF + ePub + Mobi pkt
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
- PDF + ePub + Mobi pkt
Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting
-
- PDF + ePub + Mobi pkt
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
-
- PDF + ePub + Mobi pkt
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Promocja
Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been col- ePub + Mobi pkt
Privacy and Big Data. The Players, Regulators, and Stakeholders Privacy and Big Data. The Players, Regulators, and Stakeholders
(63,74 zł najniższa cena z 30 dni)
63.74 zł
74.99 zł(-15%) -
Promocja
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secu- ePub + Mobi pkt
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is- ePub + Mobi pkt
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
(84,92 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
Promocja
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techn- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence- ePub + Mobi pkt
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
(84,92 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
- PDF + ePub + Mobi pkt
Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and
-
Promocja
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and kee- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%)