Inne - ebooki
Ebooki z kategorii: Inne dostępne w księgarni Helion
-
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Przestępczość teleinformatyczna 2015
-
Identity and Data Security for Web Development. Best Practices
-
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
-
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
Practical Linux Security Cookbook. Click here to enter text
-
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Security for Web Developers. Using JavaScript, HTML, and CSS
-
Sharing Big Data Safely. Managing Data Security
-
Hadoop Security. Protecting Your Big Data Platform
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website
-
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
-
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Beautiful Security. Leading Security Experts Explain How They Think
-
Security Monitoring
-
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
-
Security Power Tools
-
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
-
Network Security Hacks. 2nd Edition
-
Computer Security Basics. 2nd Edition
-
Security and Usability. Designing Secure Systems that People Can Use
-
Network Security Tools. Writing, Hacking, and Modifying Security Tools
-
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
-
Managing Security with Snort & IDS Tools
-
Hackers & Painters. Big Ideas from the Computer Age
-
Network Security Assessment. Know Your Network
-
Security Warrior
-
Programming .NET Security
-
Linux Security Cookbook
-
Practical UNIX and Internet Security. 3rd Edition
-
Network Security with OpenSSL. Cryptography for Secure Communications
-
Web Security, Privacy & Commerce. 2nd Edition
-
Java Security. 2nd Edition