Bezpieczeństwo systemów - ebooki
Ebooki z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
Promocja
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
With .NET MAUI for C# Developers, you’ll learn to create cross-platform apps for iOS, Android, Windows, and Mac by writing the code once and leveraging the application to automatically produce native code for each. With the help of this book, you’ll be well prepared to build commercial MAUI programs that integrate into the overall .NE
- PDF + ePub pkt
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications .NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
This book provides a security baseline to reduce the risk of future attacks. The chapters will teach you how to secure your Windows endpoint, protect devices with Microsoft Defender, and secure hybrid workloads using Azure Arc, enabling you to protect your infrastructure, network, and data with the help of SASE and the Zero Trust model.
- PDF + ePub pkt
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
Promocja
Nowoczesne złośliwe oprogramowanie coraz częściej zaciemnia swój kod i uniemożliwia analizę przez co potrzebujemy coraz wymyślniejszych metod, aby podnieść tę ciemną kurtynę wiedzy. Może pomóc w tym analiza binarna, której celem jest ustalenie prawdziwych własności programów binarnych, aby zrozumieć, co naprawdę robią. Inżynieria wsteczna i deasemb- ePub + Mobi pkt
(83,20 zł najniższa cena z 30 dni)
83.20 zł
104.00 zł(-20%) -
Promocja
Przewodnik po zastosowaniach technologii blockchain poprawiającego elastyczność oraz bezpieczeństwo i obniżającego koszty narzędzia do zarządzania, analizy i udostępniania danych Książka przedstawia opis podstaw formalnych i właściwości technologii łańcucha bloków (blockchain) oraz wyniki praktycznych badań nad aspektami jej wdrożeń w środowiskach- ePub + Mobi pkt
Blockchain i bezpieczeństwo systemów rozproszonych Blockchain i bezpieczeństwo systemów rozproszonych
(103,20 zł najniższa cena z 30 dni)
103.20 zł
129.00 zł(-20%) -
JMeter is a Java application designed to load and test performance for a web application. JMeter extends to improve the functioning of various other static and dynamic resources. This book is a great starting point to learn about JMeter. It covers the new features introduced with JMeter 3 and enables you to dive deep into the new techniques neede
- PDF + ePub + Mobi pkt
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.
- PDF + ePub pkt
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
The CompTIA Security+: SY0-601 Certification Guide makes the most complex Security+ concepts easy to understand even for those who have no prior knowledge. Complete with exam tips, practical exercises, mock exams, and exam objective mappings, this is the perfect study guide to help you obtain Security+ certification.
- PDF + ePub + Mobi pkt
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Promocja
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
This is a practical guide that enables SOC professionals to analyze the most common security appliance logs that exist in any environment.
- PDF + ePub pkt
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.
- PDF + ePub
- Audiobook MP3 pkt
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Cybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
-
Ghidra is the NSA’s state-of-the-art reverse engineering framework. It is open source, allowing the community to extend it with impressive range of features. This book offers a comprehensive introduction to anyone new to the Ghidra reverse engineering framework and malware reverse engineering.
- PDF + ePub + Mobi pkt
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.
- PDF + ePub + Mobi pkt
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Design patterns enable you to speed up the development process by providing tested, proven development paradigms. Reusing design patterns helps prevent complex issues, improves your code base, promotes code reuse, and makes the architecture more robust. This book will ease the adoption of design patterns in Kotlin and provide best practices.
- PDF + ePub + Mobi pkt
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing and providing detailed covera
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
GeoServer is an open-source server written in Java that allows users to share, process, and edit geospatial data. This book will guide you through the new features and improvements of GeoServer and will help you get started with it. GeoServer Beginner's Guide gives you a kick-start to build custom maps using your data without the need for costly co
- PDF + ePub + Mobi pkt
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, takes you deeper into one of the major subjects of his international best seller, The DevOps 2.0 Toolkit, and shows you how to successfully integrate Docker Swarm into your DevOps toolset.
- PDF + ePub + Mobi pkt
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Promocja
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Mart- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, gr- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Promocja
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by- ePub + Mobi pkt
97 Things Every Information Security Professional Should Know 97 Things Every Information Security Professional Should Know
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
As you move data to the cloud, you need to consider a comprehensive approach to data governance, along with well-defined and agreed-upon policies to ensure your organization meets compliance requirements. Data governance incorporates the ways people, processes, and technology work together to ensure data is trustworthy and can be used effectively.- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
Promocja
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Promocja
To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine app- ePub + Mobi pkt
Container Security. Fundamental Technology Concepts that Protect Containerized Applications Container Security. Fundamental Technology Concepts that Protect Containerized Applications
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to h- ePub + Mobi pkt
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
(211,65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
Promocja
Site reliability engineering (SRE) is more relevant than ever. Knowing how to keep systems reliable has become a critical skill. With this practical book, newcomers and old hats alike will explore a broad range of conversations happening in SRE. You'll get actionable advice on several topics, including how to adopt SRE, why SLOs matter, when you ne- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Książka Cyberjutsu. Cyberbezpieczeństwo dla współczesnych ninja to praktyczny przewodnik po cyberbezpieczeństwie oparty na technikach, taktykach i procedurach starożytnych ninja. Analiza odtajnionych japońskich zwojów przeprowadzona przez specjalistę od cyberwojny Bena McCarty'ego pokazuje, jak można zastosować metody stosowane przez ninja do wal- ePub + Mobi pkt
(55,20 zł najniższa cena z 30 dni)
55.20 zł
69.00 zł(-20%) -
Promocja
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows y- ePub + Mobi pkt
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and person- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Promocja
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja
With the advent of microservices, Kubernetes, public cloud, and hybrid computing, site reliability and DevOps engineers are facing more complexity than ever before. Service mesh is an exciting new technology that promises to help tackle this complexity. A service mesh provides you with a unified control plane to manage application networking across- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja
Zabezpieczenie cyfrowe jest ważną częścią reakcji na incydenty pośmiertne i gromadzenia dowodów. Cyfrowi śledczy gromadzą, przechowują i zarządzają dowodami cyfrowymi w celu wsparcia spraw cywilnych i karnych takich jak: badanie naruszenia zasad organizacyjnych; rozstrzyganie sporów czy analizowanie cyberataków. Książka Metody zabezpieczenia cyfrow- ePub + Mobi pkt
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
(83,20 zł najniższa cena z 30 dni)
83.20 zł
104.00 zł(-20%) -
Promocja
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Jira Software is an agile project management tool that supports any agile methodology, be it scrum, Kanban, or your own unique flavor. From agile boards to reports, you can plan, track, and manage all your agile software development projects from a single tool. Jira Software brings the power of agile methodology to Atlassian Jira.With this practica
- PDF + ePub + Mobi pkt
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Do you want to create better products and innovative solutions? User experience maps will help you understand users, gain strategic insights, and improve communication with stakeholders. Maps can also champion user-centricity within the organizationTwo advanced mapping techniques will be revealed for the first time in print, the behavioural change
- PDF + ePub + Mobi pkt
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Promocja
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, to- ePub + Mobi pkt
Defensive Security Handbook. Best Practices for Securing Infrastructure Defensive Security Handbook. Best Practices for Securing Infrastructure
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other informatio- ePub + Mobi pkt
The Internet of Risky Things. Trusting the Devices That Surround Us The Internet of Risky Things. Trusting the Devices That Surround Us
(92,65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Be- ePub + Mobi pkt
Beautiful Security. Leading Security Experts Explain How They Think Beautiful Security. Leading Security Experts Explain How They Think
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad- ePub + Mobi pkt
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. F- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administ- ePub + Mobi pkt
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh- ePub + Mobi pkt
RADIUS. Securing Public Access to Private Resources RADIUS. Securing Public Access to Private Resources
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Niniejsza książka jest znakomitym kompendium wiedzy o bezpieczeństwie urządzeń przenośnych. Przedstawiono w niej różnorodne techniki ingerencji w popularne urządzenia i zasady wykonywania testów penetracyjnych. Dowiesz się stąd, jak wykryć luki w zabezpieczeniach i ochronić urządzenia przed atakami. Autorzy przedstawili także istotne informacje o a
- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne- Druk
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
(89,40 zł najniższa cena z 30 dni)
89.40 zł
149.00 zł(-40%) -
Z tą książką przyjdzie Ci to bez trudu. Nauczysz się nie tylko tworzyć proste kopie, ale także właściwie zarządzać danymi, rekonstruować skasowane pliki i szyfrować te, których nie chcesz upubliczniać. Z drugiej strony poznasz sposoby trwałego usuwania plików z dysku, metody ich kompresowania oraz odpowiedniego przechowywania w archiwum. Dowiesz si
- Druk
- PDF + ePub + Mobi pkt
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
Niedostępna
-
Nowość
This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing resilient security measures, all tailored for varying levels of expertise.- PDF + ePub pkt
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Nowość
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.- PDF + ePub pkt
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Nowość
Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działan- PDF + ePub + Mobi pkt
Strategie cyberbezpieczeństwa współczesnego świata Strategie cyberbezpieczeństwa współczesnego świata
-
Nowość
Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji- PDF + ePub + Mobi pkt
System bezpieczeństwa w cyberprzestrzeni RP System bezpieczeństwa w cyberprzestrzeni RP
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska
-
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.
- PDF + ePub pkt
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.
- PDF + ePub pkt
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration
- PDF + ePub pkt
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you’ll be able to shift security toward the left, enabling you to merge security into coding in no time.
- PDF + ePub pkt
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Malware Science is your go-to guide to the synergy of cybersecurity and data science. You’ll first learn about malware lifecycle before delving into data science techniques for improved detection and analysis. This book will also help you decipher key regulations like GDPR and CCPA, making it an indispensable resource for cybersecurity pros
- PDF + ePub pkt
Malware Science. A comprehensive guide to detection, analysis, and compliance Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.
- PDF + ePub pkt
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. This book covers the nuts and bolts of how to keep your organization safe by helping you understand the intricacies of mitigating risks, creating an implementation roadmap, ensuring continuous improvement, and beyond.
- PDF + ePub pkt
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to th
- PDF + ePub pkt
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi
- PDF + ePub pkt
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will
- PDF + ePub pkt
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Gain a comprehensive understanding of the detection engineering lifecycle, why it’s important, and how it can be leveraged to protect your organization. Authored by three cybersecurity veterans, this practical guide covers everything from fundamental concepts to career insights, enriching your cybersecurity expertise and bolstering your CV.
- PDF + ePub pkt
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.
- PDF + ePub pkt
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.
- PDF + ePub pkt
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.
- PDF + ePub pkt
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.
- PDF + ePub pkt
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
- PDF + ePub pkt
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Zmieniająca się rzeczywistość administracyjna koreluje z wieloma obszarami, a wśród nich priorytetowe znaczenie ma bezpieczeństwo wewnętrzne. Zapewnianie i kształtowanie bezpieczeństwa wewnętrznego odbywa się w dużej mierze przez podmioty publiczne. Efektywność wykonywania przez nie zadań ma realny wpływ na eliminowanie lub neutralizowanie z
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
As hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.
- PDF + ePub
- Audiobook MP3 pkt
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, you’ll learn how cloud evolution affected identity strategy within the enterprise.
- PDF + ePub
- Audiobook MP3 pkt
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Cyber anonymity is very essential as most devices, applications, and browsers collect information on every single activity that you perform in cyberspace. This book helps you understand the importance of cyber anonymity and you will learn techniques that will help you perform tasks without disclosing your information.
- PDF + ePub pkt
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.
- PDF + ePub pkt
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Helm is a powerful open-source tool for automating application deployments on Kubernetes. Managing Kubernetes Resources Using Helm provides you with the ability to significantly reduce operational stress around application deployment and lifecycle management.
- PDF + ePub + Mobi pkt
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Cybersecurity – Attack and Defense Strategies, Third Edition is a completely revised new edition of this bestselling book that covers the very latest security threats and defense strategies.
- PDF + ePub pkt
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.
- PDF + ePub pkt
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.
- PDF + ePub pkt
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.
- PDF + ePub pkt
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin by creating your very first app from the get-go. You’ll learn how to use it as a means to explore and understand the Honeycode development environment and concepts.
- PDF + ePub pkt
Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming
-
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.
- PDF + ePub pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
-
Simplifying security concepts of Microsoft Azure and Microsoft 365, this book will help you gain knowledge necessary to take and pass Exam SC-900 to achieve the Microsoft Security, Compliance, and Identity Fundamentals certification. You'll be able to implement the acquired practical knowledge in real-world scenarios in no time.
- PDF + ePub pkt
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam’s objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.
- PDF + ePub pkt
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
This book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.
- PDF + ePub
- Audiobook MP3 pkt
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Mastering Cyber Intelligence provides critical knowledge that will help you stay ahead of adversaries and proactively protect your organization against known and unknown cyber threats. You'll build the security skills required to conduct effective threat intelligence, integrate it into operations, and identify gaps in security postures.
- PDF + ePub pkt
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Security is integrated into every cloud, but most users take cloud security for granted. Revised to cover product updates up to early 2022, this book will help you understand Microsoft Azure's shared responsibility model that can address any challenge, cybersecurity in the cloud, and how to design secure solutions in Microsoft Azure.
- PDF + ePub pkt
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Shellcode is code that is used to execute a command within software memory to take control of or exploit a target computer. Offensive Shellcode from Scratch helps you to understand what shellcode is, along with its components, the tools used to build shellcode, and how shellcode can be used within Linux and Windows.
- PDF + ePub pkt
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
The evolving ransomware threat landscape brings new challenges to the security personnel of many organizations. The effects of human-operated attacks make practical security approaches the need of the hour as proper response and investigation are crucial. This book discusses how to use these approaches, focusing on real-world scenarios and tools.
- PDF + ePub pkt
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Memory forensics is a vital part of modern digital forensic examinations as threat actors have started using memory-based malware more often. This comprehensive guide focuses on the application of modern memory forensics techniques to detect hidden threats in memory and reconstruct user activity based on volatile data.
- PDF + ePub pkt
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
This book covers in detail all the objectives of the SC-200: Microsoft Security Operations Analyst exam. The book offers a blend of theory and practical examples that will not only help you pass this exam but also implement the knowledge in real-world scenarios.
- PDF + ePub pkt
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
-
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.
- PDF + ePub pkt
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
This book is a guide to understanding new-age protocols and algorithms that are emerging for data protection in cybersecurity and information and communications technology (ICT) with the help of examples and use cases. You’ll begin by exploring classical cryptography and later progress to implementing algorithms for security and data privacy
- PDF + ePub pkt
Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
-
CompTIA Advanced Security Practitioner (CASP+) candidates need to stay up to date with the emerging technologies and threats in this fast-changing environment. This book helps you to apply CASP+ concepts, understand processes and methodologies, and discover industry best practices for achieving CASP+ certification.
- PDF + ePub
- Audiobook MP3 pkt
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition provides you with an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers.
- PDF + ePub pkt
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
With this guide for developers, you'll learn how to build apps that use common cryptographic operations to improve security and respect user privacy. You'll understand how, when, and why to use safe, modern cryptographic algorithms and libraries in your code. You’ll learn using plenty of code samples in JavaScript for both Node.js and the br
- PDF + ePub pkt
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This book will take you through the latest version of Kali Linux to help you efficiently deal with crucial security aspects such as confidentiality, integrity, availability, and access control.
- PDF + ePub pkt
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition
-
This book will guide you in improving your security posture and building robust and predictable security operations. You'll learn to design processes for the changing landscape of security operations, from designing defensive architectures to passive defense, blue and purple teaming, threat intelligence agility, measuring business values, and more.
- PDF + ePub pkt
Agile Security Operations. Engineering for agility in cyber defense, detection, and response Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Veeam provides data protection for modern-day technical organizations. This book takes you through installation best practices, optimizations, and the 3-2-1-1-0 rule, before going on to examine repository and proxy-related topics and advanced concepts such as CDP, extended object storage support, Veeam ONE enhancement, and Orchestrator.
- PDF + ePub pkt
Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition
-
A good security posture is essential for an organization's Microsoft 365 tenant. This book will help you to understand how you can design and implement Information Protection within Microsoft 365 to protect your digital estate, on-premises as well as on SaaS platforms.
- PDF + ePub pkt
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Use Microsoft’s own intelligent security service that brings together cloud security and AI to protect your organization. Microsoft Sentinel in Action will help you to gain enough understanding to make the most of Azure services and secure your environment against modern cybersecurity threats.
- PDF + ePub pkt
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!
- PDF + ePub pkt
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.
- PDF + ePub pkt
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
CISM is a globally recognized and much sought-after certification in the field of IT security. CISM Certification Guide is aligned with the latest edition of the CISM Review Manual and offers you complete, up-to-date coverage of CISM exam content so you can take the exam with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Security is a core component of any well-architected cloud environment and Azure is no different in this regard. With this book, you will learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environments and prepare to take the AZ-500 exam to validate your Azure security knowledge.
- PDF + ePub + Mobi pkt
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
This book explores how Nmap is one of the most robust tools for network discovery and security auditing. You’ll focus on how you can use it to perform hundreds of different tasks, from OS detection and port scanning to advanced fingerprinting and vulnerability exploitation.
- PDF + ePub + Mobi pkt
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Elastic security offers enhanced threat hunting capabilities to build active defense strategies. Complete with practical examples and tips, this easy-to-follow guide will help you enhance your security skills by leveraging the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting.
- PDF + ePub + Mobi pkt
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Antivirus Bypass Techniques follows a unique approach that will help you explore the security landscape, understand the fundamentals of antivirus software, and put antivirus bypass techniques to use. This book will enable you to bypass antivirus software solutions in order to develop efficient antivirus software.
- PDF + ePub + Mobi pkt
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.
- PDF + ePub + Mobi pkt
Malware Analysis Techniques. Tricks for the triage of adversarial software Malware Analysis Techniques. Tricks for the triage of adversarial software
-
By taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the
- PDF + ePub
- Audiobook MP3 pkt
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Zscaler Cloud Security Essentials will show you how to leverage the power of Zscaler by jumping right into the design, deployment, and support of a customized Zscaler solution. You'll discover the capabilities of Zscaler through real-world deployment and explore Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) in detail.
- PDF + ePub + Mobi pkt
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Every minute of the day, there are petabytes of data exchanged between our homes, cars, businesses, and IoT devices. But just what exactly is involved when using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals will help you to understand common cryptographic techniques and terms used today to secure our data.
- PDF + ePub + Mobi pkt
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
Information security strategies and best practices help in filling the gap that exists between theory and reality. The book starts by showing you how to implement risk management and governance structures into your organization and goes on to cover the best methods for operationalizing your information security strategy.
- PDF + ePub + Mobi pkt
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
This book is a comprehensive guide for organizations on how to prepare for cyber-attacks and control cyber threats and network security breaches in a way that decreases damage, recovery time, and costs, facilitating the adaptation of existing strategies to cloud-based environments.
- PDF + ePub + Mobi pkt
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Veeam is an infrastructure backup solution for VMware vSphere or Hyper-V to enable VM and server backup. This book takes you through installation best practices, optimizations, and the 3-2-1 rule, before going on to examine repository and proxy-related topics and finally advanced topics such as DataLabs, Instant VM Recovery, and Veeam ONE.
- PDF + ePub + Mobi pkt
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Odpowiednia wiedza na temat istniejących zagrożeń i konsekwentne stosowanie właściwych praktyk bezpieczeństwa, wroga można się bowiem ustrzec jedynie dzięki znajomoci sposobów, które wykorzystuje on sam, próbując włamać się do naszego komputera. Wiedzę tę można zdobyć dzięki książce "Techniki twórców złoliwego oprogramowania. Elementarz programisty
- Druk
- PDF + ePub + Mobi pkt
Techniki twórców złośliwego oprogramowania. Elementarz programisty Techniki twórców złośliwego oprogramowania. Elementarz programisty
Niedostępna
-
Promocja
Uncover history, principles, and cutting-edge insights in this new edition. Apply algorithms, defend against attacks, and stay current with trends like IoT and quantum crypto. Elevate your cybersecurity expertise with this essential resource.- ePub pkt
Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition
(100,08 zł najniższa cena z 30 dni)
-
Promocja
A comprehensive guide to critical infrastructure and cybersecurity, essential for those concerned about modern safety. Gain insights into growing cyber threats, system vulnerabilities, and common attacks. Learn practical techniques for protecting CI.- PDF + ePub pkt
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
(100,08 zł najniższa cena z 30 dni)
-
Promocja
This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape.- PDF + ePub pkt
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
(100,08 zł najniższa cena z 30 dni)
-
Promocja
This book provides invaluable insights into the evolving security landscape, offering practical strategies for implementing and maximizing the effectiveness of EDR tools.- PDF + ePub pkt
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
(78,48 zł najniższa cena z 30 dni)
-
Promocja
Implementing Palo Alto Prisma Access not only teaches you how and why to deploy Prisma Access, but also delves into component interaction. Discover how to leverage advanced configurations to optimize the user experience and tighten your security.- PDF + ePub pkt
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
(114,48 zł najniższa cena z 30 dni)
-
Promocja
This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts.- PDF + ePub pkt
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
(100,08 zł najniższa cena z 30 dni)