Inne - ebooki
Ebooki z kategorii: Inne dostępne w księgarni Helion
-
Advanced Cyber Threat Intelligence and Hunting. Detect APTs and zero-day attacks using CTI, behavioral analytics, and AI techniques
-
Anom. Największa operacja FBI przeciwko światowej przestępczości
-
Cybersecurity Strategy for the AI-Driven Era. Proven strategies and data-driven tactics to disrupt attacks and strengthen enterprise defenses - Third Edition
-
Agentic AI for Offensive Cybersecurity. Build and automate smarter penetration testing workflows using AI-driven agents
-
Security Intelligence with Sumo Logic. Your guide to an effective security detection and response program with the Sumo Logic platform
-
Unified SecOps Playbook. End-to-end enterprise security with Microsoft Sentinel, Defender XDR, and Security Copilot
-
SOC Analyst Career Guide. Become highly skilled in security tools, tactics, and techniques to jumpstart your SOC analyst career
-
The Azure Cloud Native Architecture Mapbook. Design and build Azure architectures for infrastructure, applications, data, AI, and security - Second Edition
-
Mastering Endpoint Management using Microsoft Intune Suite. Learn Everything About Intune Suite
-
Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
-
A Day in the Life of a CISO. Personal Mentorship from 24+ Battle-Tested CISOs — Mentoring We Never Got
-
Cybersecurity Beginner's Guide. Understand the inner workings of cybersecurity and learn how experts keep us safe
-
ISO 27001 Controls. Mastering ISO 27001: A Step-by-Step Guide to Effective Implementation and Auditing
-
The Art of Cyber Security. A practical guide to winning the war on cyber crime
-
The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework
-
Disaster Recovery and Business Continuity. A quick guide for organisations and business managers
-
The Ransomware Threat Landscape. Prepare for, recognise and survive ransomware attacks
-
Digital Ethics in the Age of AI. Navigating the ethical frontier today and beyond
-
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
-
The Security Consultant's Handbook. Essential Strategies for Building and Managing a Security Consulting Business
-
Cyber Essentials. A guide to the Cyber Essentials and Cyber Essentials Plus certifications
-
ISO 27001/ISO 27002. A guide to information security management systems
-
PCI DSS Version 4.0.1. A guide to the payment card industry data security standard
-
Information Security Risk Management for ISO 27001/ISO 27002. A Practical Guide to Risk, Assessment, and Control Selection Aligned with ISO Standards
-
Cyber Resilience. A Comprehensive Guide to Understanding and Implementing Cybersecurity Principles
-
EU General Data Protection Regulation (GDPR). An implementation and compliance guide
-
Securing Cloud Services. A Comprehensive Approach to Safeguarding Cloud Infrastructure, Services, and Data
-
The California Privacy Rights Act (CPRA). An implementation and compliance guide
-
Cyber Security Kill Chain - Tactics and Strategies. Breaking down the cyberattack process and responding to threats
-
Digital Forensics for Enterprises Beyond Kali Linux
-
Tworzenie złośliwego oprogramowania w etycznym hackingu. Zrozum, jak działa malware i jak ta wiedza pomaga we wzmacnianiu cyberbezpieczeństwa
-
CCNP 300-410 ENARSI. Zaawansowane administrowanie sieciami przedsiębiorstwa i bezpieczeństwo sieci
-
Learning Game Architecture with Unity
-
Microsoft Identity and Access Administrator SC-300 Exam Guide. Pass the SC-300 exam with confidence by using exam-focused resources - Second Edition
-
SZYFROWANIE BEZPIECZEŃSTWO KRYPTOGRAFIA: CZĘŚĆ 1 Podstawowe pojęcia i koncepcje
-
PDF
-
-
Advanced Malware Analysis and Intelligence
-
Szósty zmysł hakera. O hakowaniu systemów społecznych i przywracaniu sprawiedliwych zasad gry
-
CompTIA Security+ SY0-701 Practice Tests. Hundreds of challenging mock exam questions aligned with the latest SY0-701 exam objectives
-
CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition
-
Digital Forensics and Incident Response
-
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
-
Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems
-
Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
Docker Deep Dive. Zero to Docker in a single book - Third Edition
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition
-
Jak rabuję banki (i inne podobne miejsca)
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
AWS Certified Security - Specialty (SCS-C02) Exam Guide. Get all the guidance you need to pass the AWS (SCS-C02) exam on your first attempt - Second Edition
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Dowód stawki. Proof of stake (PoS), powstanie Ethereum i filozofia łańcucha bloków
-
Niebieski lis. Polecenia procesorów Arm i inżynieria wsteczna
-
Cyberbezpieczeństwo. Jak chronić się przed phishingiem, cyberstalkingiem, cardingiem, ransomware, hakowaniem, malware, cyberstalkingiem, kradzieżą tożsamości
-
PDF + ePub + Mobi
-
-
Mastering Network Forensics
-
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance
-
Mała księga wielkich szyfrów
-
Pegasus. Jak chronić się przed szpiegami, scamem, phishingiem, kradzieżą tożsamości i oszustwami online
-
PDF + ePub + Mobi
-
-
Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących. Wydanie II
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Go H*ck Yourself. Proste wprowadzenie do obrony przed cyberatakami
-
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Socjotechniki w praktyce. Podręcznik etycznego hakera
-
Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Breaking Ransomware
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
Ochrona danych osobowych w służbach mundurowych
-
PDF + ePub + Mobi
-
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Practical Digital Forensics
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
Etyczny haking. Praktyczne wprowadzenie do hakingu
-
CompTIA Network+ N10-008 Certification Guide - Second Edition. The ultimate guide to passing the N10-008 exam - Second Edition
-
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
-
Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Sztuka tworzenia wydajnego kodu. Przewodnik po zaawansowanych technikach wykorzystywania sprzętu i kompilatorów
-
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
Upoluj cyberprzestępcę. Przewodnik dla hakerów prowadzących śledztwa online
-
Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition
-
Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących
Niedostępna
-
Druk
-
PDF
-
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Building Android Projects with Kotlin
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source
-
Internet Rzeczy (IoT). Problemy cyberbezpieczeństwa
-
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Internet. Jak działa naprawdę? Ilustrowany przewodnik po protokołach, prywatności, cenzurze i zarządzaniu
-
Sztuka prowadzenia cyberkonfliktu. Atak i obrona w czasie rzeczywistym
-
Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony
-
Cybersecurity Research, Education and Management: University Perspective
-
Hakowanie internetu rzeczy w praktyce. Przewodnik po skutecznych metodach atakowania IoT
-
Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
CYBERPRZEMOC szczególnym zagrożeniem społeczeństwa informacyjnego
-
Algorytmy kryptograficzne w Pythonie. Wprowadzenie
-
Złam ten kod z Pythonem. Jak tworzyć, testować i łamać szyfry
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Cyberbroń - broń doskonała. Wojny, akty terroryzmu i zarządzanie strachem w epoce komputerów
-
Blue team i cyberbezpieczeństwo. Zestaw narzędzi dla specjalistów od zabezpieczeń w sieci
-
Bug Bounty Bootcamp. Przewodnik po tropieniu i zgłaszaniu luk w zabezpieczeniach
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Wojny w cyberprzestrzeni. Koncepcje, strategie i taktyki, dzięki którym przetrwasz i ocalisz swoją organizację
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-

