Kategoria Hacking w Helionie to kompendium wiedzy dla każdego, kto pragnie zgłębić tajniki cyberbezpieczeństwa, etycznego hakowania i testów penetracyjnych. Odkryj fascynujące książki i kursy o hackingu i cyberbezpieczeństwie, które przeniosą Cię w głąb sieci komputerowych, ucząc technik obrony i ataku, socjotechniki, kryptografii oraz bezpieczeństwa danych. Zanurz się w lekturze i poznaj najnowsze strategie, narzędzia i metody, które pozwolą Ci stać się ekspertem w dziedzinie bezpieczeństwa cyfrowego!
Hacking
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Helion
-
Promocja
Promocja 2za1
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is- ePub + Mobi pkt
Kerberos: The Definitive Guide. The Definitive Guide Kerberos: The Definitive Guide. The Definitive Guide
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Nowość
Promocja 2za1
This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.- PDF + ePub pkt
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Promocja 2za1
ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is an enterprise IT risk management professional’s dream. With its in-depth approach and various self-assessment exercises, this book arms you with knowledge of every single aspect of the certification, and is a fantastic career companion after you- PDF + ePub pkt
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Promocja
Promocja 2za1
Ten solidny i dokładny przewodnik pomoże Ci zbudować i utrzymać skuteczną automatyzację testów W miarę jak branża związana z oprogramowaniem odchodzi stopniowo od tradycyjnych paradygmatów kaskadowych na rzecz tych bardziej zwinnych, automatyzacja testów staje się ważnym narzędziem, które pozwala zespołom deweloperów na dostarczanie oprogramowania- ePub + Mobi pkt
Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania Automatyzacja testów. Kompletny przewodnik dla testerów oprogramowania
(83,20 zł najniższa cena z 30 dni)
83.20 zł
104.00 zł(-20%) -
Promocja 2za1
Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.- PDF + ePub pkt
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
Promocja 2za1
The CompTIA Security+: SY0-601 Certification Guide makes the most complex Security+ concepts easy to understand even for those who have no prior knowledge. Complete with exam tips, practical exercises, mock exams, and exam objective mappings, this is the perfect study guide to help you obtain Security+ certification.- PDF + ePub + Mobi pkt
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Promocja 2za1
Dzięki tej książce łatwiej zrozumiesz naturę botów i nauczysz się je projektować. Zamieszczono tu wiele informacji o pracy projektantów i programistów botów. Poza zagadnieniami teoretycznymi znajdziesz tu także sporo praktycznej wiedzy, wzbogaconej rzeczywistymi przykładami budowania użytecznych botów. Nauczysz się projektowania konwersacyjnych int- Druk
- PDF + ePub + Mobi pkt
Zaprojektuj bota. Tworzenie interfejsów konwersacyjnych Zaprojektuj bota. Tworzenie interfejsów konwersacyjnych
Niedostępna
-
Promocja
Promocja 2za1
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Promocja
Promocja 2za1
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Promocja
Promocja 2za1
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecyc- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Promocja 2za1
This is a practical guide that enables SOC professionals to analyze the most common security appliance logs that exist in any environment.- PDF + ePub pkt
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
Promocja 2za1
Through this book, you’ll learn to administer core and advanced Windows Server and Infrastructure-as-a-Service workloads utilizing the available - on-premises, hybrid, and cloud technologies. All the skills you acquire will prepare you to ace the AZ-801: Configuring Windows Server Hybrid Advanced Services Exam.- PDF + ePub pkt
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Promocja
Promocja 2za1
The book: “PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors ha- PDF + ePub pkt
(96,75 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
Promocja
Promocja 2za1
The book: “PACKET TRACER FOR YOUNG ADVANCED ADMINS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations were prepared- PDF + ePub pkt
(96,75 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
Promocja
Promocja 2za1
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Promocja 2za1
This book will help you become confident with system administration and equip you with the knowledge required to get certified in Red Hat Enterprise Linux 9 RHCSA, the standard enterprise Linux used in data centers and the cloud worldwide.- PDF + ePub pkt
Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition
Pablo Iranzo Gómez, Pedro Ibánez Requena, Miguel Pérez Colino, Scott McCarty
-
Promocja 2za1
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.- PDF + ePub
- Audiobook MP3 pkt
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Promocja 2za1
This easy-to-follow guide is for network and security professionals who want to learn how to use Palo Alto’s Next Generation Firewall, and how it can be leveraged to gain deep insight into the traffic, applications and threats that traverse your network.- PDF + ePub
- Audiobook MP3 pkt
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
Promocja 2za1
Penetration Testing Azure for Ethical Hackers provides in-depth explanations of common security issues in Azure environments and tutorials on how to set up a pentesting lab and execute attacks on Azure assets. It will help you gain a deeper understanding of how Azure environments are configured, and more importantly, how they can be misconfigured.- PDF + ePub + Mobi pkt
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Promocja 2za1
With over 1000 practice questions, explanations of all 8 domains, and 2 full exams, this book is a fantastic exam prep solution. Take the CISSP exam (version May 2021) confidently with the help of mock questions and detailed solutions and validate your skills with the CISSP (ISC)2 certification.- PDF + ePub + Mobi pkt
CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version
-
Promocja 2za1
Cybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.- PDF + ePub + Mobi
- Audiobook MP3 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
-
Promocja
Promocja 2za1
Książka „Bezpieczny senior w Internecie” to poradnik, dedykowany nie tylko osobom starszym, ale również wszystkim czytelnikom bez względu na stopień zaawansowania informatycznego. Jest to kolejna pozycja po poprzednich tytułach naszego wydawnictwa: Smartfon, Laptop i Internet również dla seniora, które w podstawowy- PDF + ePub + Mobi pkt
(33,75 zł najniższa cena z 30 dni)
33.75 zł
45.00 zł(-25%) -
Promocja 2za1
Ghidra is the NSA’s state-of-the-art reverse engineering framework. It is open source, allowing the community to extend it with impressive range of features. This book offers a comprehensive introduction to anyone new to the Ghidra reverse engineering framework and malware reverse engineering.- PDF + ePub + Mobi pkt
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Promocja 2za1
W skrypcie omówiono zagrożenia informacji i systemów teleinformatycznych, takich jak oprogramowanie złośliwe, cyberprzestępstwa i cyberterroryzm. Zaprezentowano różnorodne metody ochrony informacji przed zagrożeniami w cyberprzestrzeni, dzieląc je na metody administracyjno-organizacyjne, prawne i normalizacyjne, techniczne orazOchrona informacji i systemów teleinformatycznych w cyberprzestrzeni Ochrona informacji i systemów teleinformatycznych w cyberprzestrzeni
-
Promocja 2za1
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.- PDF + ePub + Mobi pkt
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Promocja 2za1
Python is the major programming language for network programming. This Learning Path shows you how to use the power and beauty of Python to complete numerous real-world tasks related to programming, monitoring, and administering networks.- PDF + ePub + Mobi pkt
Python Network Programming. Conquer all your networking challenges with the powerful Python language Python Network Programming. Conquer all your networking challenges with the powerful Python language
Abhishek Ratan, Eric Chou, Pradeeban Kathiravelu, Dr. M. O. Faruque Sarker
-
Promocja 2za1
Network automation is the process of efficiently automating the management and functionality of networks. Through practical use-cases and examples, this book introduces you to the popular tools such as Python, Ansible, Chef and more, that are used to automate a network.- PDF + ePub + Mobi pkt
Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition
-
Promocja 2za1
Python's built-in unittest module is showing it's age; hard to extend, debug and track what's going on. The pytest framework overcomes these problems and simplifies testing your Python software. Many users love to use pytest and the improvement in their testing shows! This book is the ideal introduction to pytest, teaching you how to write tests of- PDF + ePub + Mobi pkt
pytest Quick Start Guide. Write better Python code with simple and maintainable tests pytest Quick Start Guide. Write better Python code with simple and maintainable tests
-
Promocja 2za1
Design patterns enable you to speed up the development process by providing tested, proven development paradigms. Reusing design patterns helps prevent complex issues, improves your code base, promotes code reuse, and makes the architecture more robust. This book will ease the adoption of design patterns in Kotlin and provide best practices.- PDF + ePub + Mobi pkt
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Promocja 2za1
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing and providing detailed covera- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Promocja 2za1
GeoServer is an open-source server written in Java that allows users to share, process, and edit geospatial data. This book will guide you through the new features and improvements of GeoServer and will help you get started with it. GeoServer Beginner's Guide gives you a kick-start to build custom maps using your data without the need for costly co- PDF + ePub + Mobi pkt
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
Promocja 2za1
Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, takes you deeper into one of the major subjects of his international best seller, The DevOps 2.0 Toolkit, and shows you how to successfully integrate Docker Swarm into your DevOps toolset.- PDF + ePub + Mobi pkt
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Promocja
Promocja 2za1
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro- ePub + Mobi pkt
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Promocja 2za1
As you move data to the cloud, you need to consider a comprehensive approach to data governance, along with well-defined and agreed-upon policies to ensure your organization meets compliance requirements. Data governance incorporates the ways people, processes, and technology work together to ensure data is trustworthy and can be used effectively.- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
Promocja
Promocja 2za1
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by- ePub + Mobi pkt
97 Things Every Information Security Professional Should Know 97 Things Every Information Security Professional Should Know
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Promocja 2za1
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Promocja
Promocja 2za1
Over the past two decades, the booming ecommerce and fintech industries have become a breeding ground for fraud. Organizations that conduct business online are constantly engaged in a cat-and-mouse game with these invaders. In this practical book, Gilit Saporta and Shoshana Maraney draw on their fraud-fighting experience to provide best practices,- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja
Promocja 2za1
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption fo- ePub + Mobi pkt
Network Security with OpenSSL. Cryptography for Secure Communications Network Security with OpenSSL. Cryptography for Secure Communications
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Promocja 2za1
Książka "OpenBSD. Tworzenie firewalli za pomocą PF" przedstawia zaimplementowany w OpenBSD system PF -- unikatowe narzędzie do samodzielnego definiowania mechanizmów zabezpieczeń filtrujących pakiety.- Druk pkt
(35,40 zł najniższa cena z 30 dni)
35.40 zł
59.00 zł(-40%) -
Promocja 2za1
The Essential Guide to Web3 serves as a gateway to the decentralized web—also known as the decentralized internet—to enable you to embark on an immersive journey into the fascinating world of Web3. With brief overviews of the blockchain and the Ethereum ecosystem at the outset, this book quickly immerses you in practical blockchain ap- PDF + ePub pkt
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
Promocja
Promocja 2za1
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Promocja 2za1
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What- ePub + Mobi pkt
(203,15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Promocja
Promocja 2za1
Książka Cyberjutsu. Cyberbezpieczeństwo dla współczesnych ninja to praktyczny przewodnik po cyberbezpieczeństwie oparty na technikach, taktykach i procedurach starożytnych ninja. Analiza odtajnionych japońskich zwojów przeprowadzona przez specjalistę od cyberwojny Bena McCarty'ego pokazuje, jak można zastosować metody stosowane przez ninja do wal- ePub + Mobi pkt
(55,20 zł najniższa cena z 30 dni)
55.20 zł
69.00 zł(-20%) -
Promocja 2za1
Check Point Firewall Administration R81.10+ is for security administrators to develop the skills necessary for effective deployment and operation of Check Point firewalls or high availability clusters. This book will help you to improve network segmentation and implement airtight access control policies.- PDF + ePub pkt
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Promocja
Promocja 2za1
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja 2za1
Learn Wireshark provides an overview of protocol analysis. You’ll become more confident in navigating the interface while examining protocols such as TCP, IP, and ICMP. The book features tips on how to use display and capture filters, save, export, and share captures, create graphs, and become more proficient in troubleshooting latency issue- PDF + ePub pkt
Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition
-
Promocja
Promocja 2za1
With the advent of microservices, Kubernetes, public cloud, and hybrid computing, site reliability and DevOps engineers are facing more complexity than ever before. Service mesh is an exciting new technology that promises to help tackle this complexity. A service mesh provides you with a unified control plane to manage application networking across- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja
Promocja 2za1
Як часто вам здається, що вас дурять в інтернеті? Або- ePub + Mobi pkt
Як не стати овочем. Інструкція з виживання в інфопросторі Як не стати овочем. Інструкція з виживання в інфопросторі
(17,17 zł najniższa cena z 30 dni)
17.17 zł
21.20 zł(-19%) -
Promocja
Promocja 2za1
Zabezpieczenie cyfrowe jest ważną częścią reakcji na incydenty pośmiertne i gromadzenia dowodów. Cyfrowi śledczy gromadzą, przechowują i zarządzają dowodami cyfrowymi w celu wsparcia spraw cywilnych i karnych takich jak: badanie naruszenia zasad organizacyjnych; rozstrzyganie sporów czy analizowanie cyberataków. Książka Metody zabezpieczenia cyfrow- ePub + Mobi pkt
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
(83,20 zł najniższa cena z 30 dni)
83.20 zł
104.00 zł(-20%) -
Promocja
Promocja 2za1
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Mart- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja
Promocja 2za1
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Promocja
Promocja 2za1
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manag- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja
Promocja 2za1
Remember the dawn of the internet or the advent of mobile computing and social media? Yet another digital revolution is now underway. Like its predecessors, blockchains are about to transform the way we live, work, and play, while disrupting entrenched industries and shattering conventional business models.This practical guide takes you past the hy- ePub + Mobi pkt
Unblocked. How Blockchains Will Change Your Business (and What to Do About It) Unblocked. How Blockchains Will Change Your Business (and What to Do About It)
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja 2za1
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment.- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Promocja 2za1
Jira Software is an agile project management tool that supports any agile methodology, be it scrum, Kanban, or your own unique flavor. From agile boards to reports, you can plan, track, and manage all your agile software development projects from a single tool. Jira Software brings the power of agile methodology to Atlassian Jira.With this practica- PDF + ePub + Mobi pkt
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Promocja
Promocja 2za1
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, to- ePub + Mobi pkt
Defensive Security Handbook. Best Practices for Securing Infrastructure Defensive Security Handbook. Best Practices for Securing Infrastructure
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja 2za1
Antywirusy nie wykrywają najgroźniejszego złośliwego oprogramowania. Dzieje się tak dlatego, że na komputerze ofiary instalują się unikatowe w formie binarnej, kontrolowane przez cyberprzestępców programy. Ich obecność w komputerze jest maskowana przez zastosowanie wyrafinowanych technik ukrywania w systemie, określanych mianem rootkita. SąDeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą DeRATyzacja komputerów. Jak schwytać i ubić trojany, gdy antywirusy zawodzą
-
Promocja
Promocja 2za1
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. F- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
Promocja 2za1
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Promocja 2za1
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and person- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Promocja 2za1
"Archiwizacja i odzyskiwanie danych" to przewodnik po darmowych narzędziach do archiwizacji i odzyskiwania danych, przeznaczony głównie dla administratorów. W. Curtis Preston, specjalista w dziedzinie ochrony danych, zwrócił uwagę, że środki przeznaczone na system archiwizacji są często zbyt małe, by zapewnić mu wysoką skuteczność.- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Promocja 2za1
Internet, oferuje takie same możliwości tym, którzy chcą wykorzystać go dla wspólnego dobra, jak i tym, którzy widzą w nim instrument wykorzystywany do niesienia zła. Zamierzeniem tej książki jest wyposażenie specjalistów zajmujących się kwestiami bezpieczeństwa w przewodnik, który przeprowadzi ich przez cały proces tworzenia bezpiecznej infrastruk- Druk pkt
(59,40 zł najniższa cena z 30 dni)
59.40 zł
99.00 zł(-40%) -
Nowość
Promocja 2za1
"Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY" - niezbędnik każdego użytkownika internetu! W dobie wszechobecnych technologii i wszechwładnej sztucznej inteligencji, zarówno dorosłym, jak i najmłodszym użytkownikom sieci, przyda się solidny fundament wiedzy na temat bezpieczeństwa cyfrowego. Poradnik "TwojTwoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY
-
Nowość
Promocja 2za1
This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing resilient security measures, all tailored for varying levels of expertise.- PDF + ePub pkt
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Nowość
Promocja 2za1
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.- PDF + ePub pkt
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Nowość
Promocja 2za1
Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działan- PDF + ePub + Mobi pkt
Strategie cyberbezpieczeństwa współczesnego świata Strategie cyberbezpieczeństwa współczesnego świata
-
Nowość
Promocja 2za1
Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji- PDF + ePub + Mobi pkt
System bezpieczeństwa w cyberprzestrzeni RP System bezpieczeństwa w cyberprzestrzeni RP
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska
-
Nowość Promocja
Promocja 2za1
Мова Python сьогодні відома у всьому світі. Вона задіяна CHead First. Python. Легкий для сприйняття довідник Head First. Python. Легкий для сприйняття довідник
(84,16 zł najniższa cena z 30 dni)
84.16 zł
103.90 zł(-19%) -
Nowość Promocja
Promocja 2za1
Ця книжка познайомить вас з особливостями JavaScript 2014 основHead First. Програмування на JavaScript. Head First. Програмування на JavaScript Head First. Програмування на JavaScript. Head First. Програмування на JavaScript
(84,16 zł najniższa cena z 30 dni)
84.16 zł
103.90 zł(-19%) -
Promocja 2za1
Whether you're a beginner or a seasoned security professional, this practical guide will equip you with the knowledge and skills to build a robust, proactive, and resilient security posture for your organization with Microsoft's XDR and SIEM.- PDF + ePub pkt
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Promocja 2za1
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.- PDF + ePub pkt
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Promocja 2za1
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.- PDF + ePub pkt
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Promocja 2za1
This comprehensive guide covers a range of topics in cloud security with a practical focus on providing valuable insights and skills to enable you to secure multi-cloud environments effectively.- PDF + ePub pkt
Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
-
Promocja 2za1
The comprehensive yet concise guide offers secure practices for handling sensitive data payloads, including credentials, certificates, and tokens, enabling secure access to and from your organization's resources for apps running on Kubernetes.- PDF + ePub pkt
Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions
-
Promocja 2za1
Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration- PDF + ePub pkt
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Promocja 2za1
This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you’ll be able to shift security toward the left, enabling you to merge security into coding in no time.- PDF + ePub pkt
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Promocja 2za1
Malware Science is your go-to guide to the synergy of cybersecurity and data science. You’ll first learn about malware lifecycle before delving into data science techniques for improved detection and analysis. This book will also help you decipher key regulations like GDPR and CCPA, making it an indispensable resource for cybersecurity pros- PDF + ePub pkt
Malware Science. A comprehensive guide to detection, analysis, and compliance Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Promocja 2za1
The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond.- PDF + ePub pkt
Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications Cloud Penetration Testing for Red Teamers. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Promocja 2za1
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.- PDF + ePub pkt
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Promocja 2za1
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. This book covers the nuts and bolts of how to keep your organization safe by helping you understand the intricacies of mitigating risks, creating an implementation roadmap, ensuring continuous improvement, and beyond.- PDF + ePub pkt
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Promocja
Promocja 2za1
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, gr- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja 2za1
As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to th- PDF + ePub pkt
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Promocja 2za1
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi- PDF + ePub pkt
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Promocja 2za1
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.- PDF + ePub pkt
Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners
-
Promocja 2za1
Burp Suite is an immensely powerful and popular tool for web application security testing. This book provides a collection of recipes that address vulnerabilities in web applications and APIs. It offers guidance on how to configure Burp Suite, make the most of its tools, and explore into its extensions.- PDF + ePub pkt
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
Promocja 2za1
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud environments running on AWS, Azure, and GCP. In addition to these, you will explore a number of practical strategies on how to manage the complexity, cost, and security risks involved when setting up vulnerable cloud lab environments.- PDF + ePub pkt
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
Promocja 2za1
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will- PDF + ePub pkt
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Promocja 2za1
Gain a comprehensive understanding of the detection engineering lifecycle, why it’s important, and how it can be leveraged to protect your organization. Authored by three cybersecurity veterans, this practical guide covers everything from fundamental concepts to career insights, enriching your cybersecurity expertise and bolstering your CV.- PDF + ePub pkt
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Promocja 2za1
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.- PDF + ePub pkt
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Promocja 2za1
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.- PDF + ePub pkt
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Promocja 2za1
This comprehensive guide will help you understand practical aspects of information systems auditing. It covers key areas such as governance and management of IT, information systems acquisition, development, implementation and information systems operations, business resilience, and the crucial topic of protecting information assets.- PDF + ePub pkt
CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition
-
Promocja 2za1
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.- PDF + ePub pkt
Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA
-
Promocja 2za1
The MS-100 certification validates your knowledge of identity and security aspects of a Microsoft 365 tenant. With the help of this book, you’ll explore core features such as self-service password reset and Azure AD identity protection, enabling you to implement Azure AD identity and secure access easily.- PDF + ePub pkt
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
Promocja 2za1
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.- PDF + ePub pkt
10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques 10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques
-
Promocja 2za1
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e- PDF + ePub pkt
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Promocja
Promocja 2za1
Hacking jest w tym tomie rozpatrywany z różnych perspektyw, jako: przestępstwo, incydent cyberbezpieczeństwa, eksplorowanie i modyfikowanie systemów technicznych, społecznych i biologicznych, a najogólniej - jako przełamywanie zabezpieczeń.(203,15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Promocja 2za1
With Mastering Veeam Backup and Replication you’ll learn how to install Veeam Backup & Replication 12 on your system, the Core Architecture enhancements, as well as about other enhancements. You’ll also gain an understanding of security, Object Storage direct, and CDP with Cloud Connect.- PDF + ePub pkt
Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition
-
Promocja 2za1
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.- PDF + ePub pkt
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
-
Promocja 2za1
This book helps you set up your own virtual and portable forensic lab and guides on memory analysis and full forensic analysis using industry-recognized tools. You’ll explore malware and network artifact analyses and implement all the pillars of digital forensics such as acquisition, analysis, and presentation using cutting-edge tools.- PDF + ePub pkt
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
Promocja 2za1
This practical guide will help developers working with networking technologies such as CSMA, P2P, Wi-Fi, Wi-Fi 6, and LTE to perform advanced network simulations using ns-3. This book provides a hands-on approach to evaluating useful test scenarios of wired, Wi-Fi, LTE networks in the context of real-time deployments and research activities.- PDF + ePub pkt
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3 Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Promocja 2za1
This audiobook will prepare cybersecurity professionals for the SC-100 exam while also helping them build a strong foundation for implementing the strategies they learn. A mixture of theoretical and practical knowledge, as well as practice questions and a mock exam will ensure you’re confident to take the exam.- PDF + ePub
- Audiobook MP3 pkt
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
Promocja 2za1
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.- PDF + ePub pkt
Azure Security Cookbook. Practical recipes for securing Azure resources and operations Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Promocja
Promocja 2za1
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title.- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for intermediate users Computer Networks in Packet Tracer for intermediate users
(96,75 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
Promocja
Promocja 2za1
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR ADVANCED USERS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for advanced users Computer Networks in Packet Tracer for advanced users
(96,75 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
Promocja
Promocja 2za1
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for beginners Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(96,75 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
Promocja 2za1
Książka Testowanie bezpieczeństwa aplikacji internetowych. Receptury to napisany zrozumiałym językiem podręcznik, dzięki któremu szybko poznasz mechanizmy testowania zabezpieczeń. Praktyczne przykłady zawarte w tym przewodniku sprawią, że szybko nauczysz się włączać systemy zabezpieczeń do standardowych procedur kontroli aplikacji. Bez problemu stw- Druk
- PDF + ePub + Mobi pkt
Testowanie bezpieczeństwa aplikacji internetowych. Receptury Testowanie bezpieczeństwa aplikacji internetowych. Receptury
Niedostępna
-
Promocja 2za1
Odpowiednia wiedza na temat istniejących zagrożeń i konsekwentne stosowanie właściwych praktyk bezpieczeństwa, wroga można się bowiem ustrzec jedynie dzięki znajomoci sposobów, które wykorzystuje on sam, próbując włamać się do naszego komputera. Wiedzę tę można zdobyć dzięki książce "Techniki twórców złoliwego oprogramowania. Elementarz programisty- Druk
- PDF + ePub + Mobi pkt
Techniki twórców złośliwego oprogramowania. Elementarz programisty Techniki twórców złośliwego oprogramowania. Elementarz programisty
Niedostępna
-
Promocja 2za1
Jeżeli zainteresował Cię temat testów penetracyjnych, to trafiłeś na doskonałą książkę. Znajdziesz w niej omówienie specjalnej dystrybucji Kali Linux. Zawiera ona zestaw niezbędnych narzędzi oraz pozwoli Ci przeprowadzić testy. W trakcie lektury zrozumiesz, jak przygotować środowisko pracy i jak przeprowadzić atak na popularne serwery aplikacji int- Druk
- PDF + ePub + Mobi pkt
Czasowo niedostępna
-
Promocja 2za1
To ważne, co Twoje dziecko robi w sieci. To, co ogląda, czyta, z kim rozmawia i ile czasu spędza w Internecie, ma duże znaczenie dla jego rozwoju, ale przede wszystkim dla jego bezpieczeństwa! Internet, który jest jedną z największych zdobyczy naszej cywilizacji, to cudowne okno na wielki świat -- na jego jasne, ale i ciemne strony…- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja 2za1
Niniejsza książka jest znakomitym kompendium wiedzy o bezpieczeństwie urządzeń przenośnych. Przedstawiono w niej różnorodne techniki ingerencji w popularne urządzenia i zasady wykonywania testów penetracyjnych. Dowiesz się stąd, jak wykryć luki w zabezpieczeniach i ochronić urządzenia przed atakami. Autorzy przedstawili także istotne informacje o a- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja 2za1
Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne- Druk
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
Czasowo niedostępna
-
Promocja 2za1
Dzięki tej książce dowiesz się, jak zabezpieczyć swoją stronę, opartą o ten system, przed ich działaniem. Podręcznik w kompleksowy sposób opisuje wszystkie zagadnienia związane z bezpieczeństwem Joomla! — począwszy od wyboru firmy, na której serwerach umieścisz swoją stronę, a skończywszy na tworzeniu polityki reagowania na ataki.- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja 2za1
Z tą książką przyjdzie Ci to bez trudu. Nauczysz się nie tylko tworzyć proste kopie, ale także właściwie zarządzać danymi, rekonstruować skasowane pliki i szyfrować te, których nie chcesz upubliczniać. Z drugiej strony poznasz sposoby trwałego usuwania plików z dysku, metody ich kompresowania oraz odpowiedniego przechowywania w archiwum. Dowiesz si- Druk
- PDF + ePub + Mobi pkt
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
Niedostępna
-
Promocja
Promocja 2za1
Uncover history, principles, and cutting-edge insights in this new edition. Apply algorithms, defend against attacks, and stay current with trends like IoT and quantum crypto. Elevate your cybersecurity expertise with this essential resource.- ePub pkt
Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition
(100,08 zł najniższa cena z 30 dni)
-
Promocja
Promocja 2za1
A comprehensive guide to critical infrastructure and cybersecurity, essential for those concerned about modern safety. Gain insights into growing cyber threats, system vulnerabilities, and common attacks. Learn practical techniques for protecting CI.- PDF + ePub pkt
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
(100,08 zł najniższa cena z 30 dni)
-
Promocja
Promocja 2za1
Designed for security professionals and aspiring pentesters, this book equips you with the skills and knowledge to exploit vulnerabilities, gain access, and navigate post-exploitation scenarios across diverse platforms.- PDF + ePub pkt
PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms
(100,08 zł najniższa cena z 30 dni)
-
Promocja
Promocja 2za1
This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape.- PDF + ePub pkt
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
(100,08 zł najniższa cena z 30 dni)
-
Promocja
Promocja 2za1
This book provides invaluable insights into the evolving security landscape, offering practical strategies for implementing and maximizing the effectiveness of EDR tools.- PDF + ePub pkt
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
(78,48 zł najniższa cena z 30 dni)
-
Promocja
Promocja 2za1
Implementing Palo Alto Prisma Access not only teaches you how and why to deploy Prisma Access, but also delves into component interaction. Discover how to leverage advanced configurations to optimize the user experience and tighten your security.- PDF + ePub pkt
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
(114,48 zł najniższa cena z 30 dni)
-
Promocja
Promocja 2za1
This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts.- PDF + ePub pkt
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
(100,08 zł najniższa cena z 30 dni)
Dlaczego cyberbezpieczeństwo jest ważne?
W dzisiejszym świecie, w którym wiele aspektów naszego życia jest związanych z technologią, zrozumienie zasad cyberbezpieczeństwa jest niezwykle istotne. Nasze książki nie tylko omawiają najważniejsze rodzaje cyberbezpieczeństwa, ale także wyjaśniają, dlaczego to zagadnienie jest tak kluczowe dla każdej organizacji i jednostki. Bowiem każdego dnia jesteśmy narażeni na różnorodne zagrożenia płynące z sieci, od nieuczciwych praktyk hakerów do przypadkowych ataków malware. W księgarni internetowej Helion.pl znajdziesz bogaty wybór książek o hakowaniu, które pomogą Ci przede wszystkim zrozumieć co to jest hakowanie, jak zostać etycznym hakerem, co to znaczy być specjalistą w dziedzinie cybersecurity oraz jak dbać o bezpieczeństwo danych.
Podstawy hackingu – książki i kursy dla początkujących specjalistów cyberbezpieczeństwa
Niezależnie od tego, czy dopiero zaczynasz swoją przygodę z cyberbezpieczeństwem, czy jesteś doświadczonym specjalistą, posiadamy książki o cyberbezpieczeństwie, które sprostają Twoim oczekiwaniom. Oferujemy bogatą kolekcję książek na temat hackingu, testów penetracyjnych oraz podstaw i zaawansowanych zagadnień cyberbezpieczeństwa. Jedną z nich jest "Cybersecurity w pytaniach i odpowiedziach". Dla początkujących, polecamy także "Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności". To praktyczny poradnik hakera, w którym znajdziesz materiały wprowadzające do podstaw hackingu. Jeśli interesuje Cię, jak dbać o dane w swojej organizacji, pomocna okaże się książka "Bezpieczeństwo sieci firmowej. Kontrola ruchu wychodzącego".
Dla bardziej zaawansowanych oferujemy także publikacje na temat etycznego hackingu, takie jak "Etyczny haking. Praktyczne wprowadzenie do hakingu" oraz "Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze", które wprowadzą Cię w świat testów penetracyjnych oraz profesjonalnych wskazówek na temat tego, jak chronić się przed atakami. Dodatkowo, znajdziesz u nas kursy cyberbezpieczeństwa, które także mogą Cię zainteresować.
Odkryj świat kryptografii, socjotechnik i bezpieczeństwa danych z książkami o hackingu i cyberbezpieczeństwie
Jeśli jesteś osobą, która pragnie jeszcze bardziej zgłębić wiedzę w zakresie bezpieczeństwa danych i bezpieczeństwa sieci lub zainteresowała Cię informatyka śledcza, to u nas również znajdziesz książki o tej tematyce. A jeśli chcesz wiedzieć więcej o technikach manipulacji, polecamy pozycję "Socjotechnika. Sztuka zdobywania władzy nad umysłami.I". Dla zainteresowanego kryptografią polecamy "Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym". To doskonałe materiały dla profesjonalistów, którzy chcą poszerzyć swoją wiedzę i umiejętności.
Mamy nadzieję, że znalazłeś tu inspirujące pozycje, które pomogą Ci rozwijać umiejętności i wiedzę w dziedzinie hakowania i cyberbezpieczeństwa. Niezależnie od tego, czy jesteś początkującym entuzjastą, doświadczonym specjalistą, czy po prostu pragniesz zrozumieć, jak zabezpieczyć swoją prywatność online, nasza oferta książek o hackingu dostarczy Ci niezbędnych zasobów i informacji. Odkrywaj tajemnice blockchaina, OSINT, IoT i chmury obliczeniowej, a także ucz się programowania w Pythonie dla bezpieczeństwa sieci. Pamiętaj, że wiedza to najważniejsze narzędzie w walce z cyberzagrożeniami. Dzięki najlepszym książkom o cyberbezpieczeństwie zdobędziesz umiejętności, które są cenione na rynku pracy. Powodzenia!
Sprawdź także książki o programowaniu w naszej ofercie.