Kategoria Hacking w Helionie to kompendium wiedzy dla każdego, kto pragnie zgłębić tajniki cyberbezpieczeństwa, etycznego hakowania i testów penetracyjnych. Odkryj fascynujące książki, które przeniosą Cię w głąb sieci komputerowych, ucząc technik obrony i ataku, socjotechniki, kryptografii oraz bezpieczeństwa danych. Zanurz się w lekturze i poznaj najnowsze strategie, narzędzia i metody, które pozwolą Ci stać się ekspertem w dziedzinie bezpieczeństwa cyfrowego!
Hacking
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Helion
-
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi
- PDF + ePub pkt
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.
- PDF + ePub pkt
Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners
-
Burp Suite is an immensely powerful and popular tool for web application security testing. This book provides a collection of recipes that address vulnerabilities in web applications and APIs. It offers guidance on how to configure Burp Suite, make the most of its tools, and explore into its extensions.
- PDF + ePub pkt
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud environments running on AWS, Azure, and GCP. In addition to these, you will explore a number of practical strategies on how to manage the complexity, cost, and security risks involved when setting up vulnerable cloud lab environments.
- PDF + ePub pkt
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will
- PDF + ePub pkt
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Gain a comprehensive understanding of the detection engineering lifecycle, why it’s important, and how it can be leveraged to protect your organization. Authored by three cybersecurity veterans, this practical guide covers everything from fundamental concepts to career insights, enriching your cybersecurity expertise and bolstering your CV.
- PDF + ePub pkt
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.
- PDF + ePub pkt
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.
- PDF + ePub pkt
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.
- PDF + ePub pkt
Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA
-
The MS-100 certification validates your knowledge of identity and security aspects of a Microsoft 365 tenant. With the help of this book, you’ll explore core features such as self-service password reset and Azure AD identity protection, enabling you to implement Azure AD identity and secure access easily.
- PDF + ePub pkt
Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt Microsoft 365 Identity and Services Exam Guide MS-100. Expert tips and techniques to pass the MS-100 exam on the first attempt
-
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.
- PDF + ePub pkt
10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques 10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques
-
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e
- PDF + ePub pkt
Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security
-
Promocja
Hacking jest w tym tomie rozpatrywany z różnych perspektyw, jako: przestępstwo, incydent cyberbezpieczeństwa, eksplorowanie i modyfikowanie systemów technicznych, społecznych i biologicznych, a najogólniej - jako przełamywanie zabezpieczeń.(203,15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
With Mastering Veeam Backup and Replication you’ll learn how to install Veeam Backup & Replication 12 on your system, the Core Architecture enhancements, as well as about other enhancements. You’ll also gain an understanding of security, Object Storage direct, and CDP with Cloud Connect.
- PDF + ePub pkt
Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition
-
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.
- PDF + ePub pkt
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
-
This book helps you set up your own virtual and portable forensic lab and guides on memory analysis and full forensic analysis using industry-recognized tools. You’ll explore malware and network artifact analyses and implement all the pillars of digital forensics such as acquisition, analysis, and presentation using cutting-edge tools.
- PDF + ePub pkt
Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition
-
This practical guide will help developers working with networking technologies such as CSMA, P2P, Wi-Fi, Wi-Fi 6, and LTE to perform advanced network simulations using ns-3. This book provides a hands-on approach to evaluating useful test scenarios of wired, Wi-Fi, LTE networks in the context of real-time deployments and research activities.
- PDF + ePub pkt
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3 Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
This audiobook will prepare cybersecurity professionals for the SC-100 exam while also helping them build a strong foundation for implementing the strategies they learn. A mixture of theoretical and practical knowledge, as well as practice questions and a mock exam will ensure you’re confident to take the exam.
- PDF + ePub
- Audiobook MP3 pkt
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.
- PDF + ePub pkt
Azure Security Cookbook. Practical recipes for securing Azure resources and operations Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title.- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for intermediate users Computer Networks in Packet Tracer for intermediate users
(58,05 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR ADVANCED USERS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for advanced users Computer Networks in Packet Tracer for advanced users
(58,05 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for beginners Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(58,05 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.
- PDF + ePub pkt
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
CompTIA Advanced Security Practitioner (CASP+) candidates need to stay up to date with the emerging technologies and threats in this fast-changing environment. This audiobook helps you to apply CASP+ concepts, understand processes and methodologies, and discover industry best practices for achieving CASP+ certification.
- PDF + ePub
- Audiobook MP3 pkt
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.
- PDF + ePub pkt
Windows APT Warfare. Identify and prevent Windows APT attacks effectively Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.
- PDF + ePub pkt
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve listened to this audiobook, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives wi
- PDF + ePub
- Audiobook MP3 pkt
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You’ll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.
- PDF + ePub pkt
Mastering Linux Security and Hardening. A practical guide to protecting your Linux system from cyber attacks - Third Edition Mastering Linux Security and Hardening. A practical guide to protecting your Linux system from cyber attacks - Third Edition
-
As hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.
- PDF + ePub
- Audiobook MP3 pkt
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
The Executive’s Cybersecurity Program Handbook helps you perform internal assessments to drive strategic cybersecurity program development and evaluate risk within an organization. With this book, you’ll be able to build an incident response team and implement administrative and technical security controls.
- PDF + ePub pkt
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this audiobook, you’ll learn how cloud evolution affected identity strategy within the enterprise.
- PDF + ePub
- Audiobook MP3 pkt
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
W książce omówiono zagadnienia dotyczące ochrony danych osobowych w różnych służbach mundurowych. Pozycja skierowana jest do wykładowców i studentów szkół wyższych o kierunku bezpieczeństwo wewnętrzne. Będzie również przydatna dla wszystkich osób zainteresowanych tematyką ochrony danych osobowych.
- PDF + ePub + Mobi pkt
-
This book is a guide to help security professionals learn about the process of discovering and publishing vulnerabilities in software. They'll learn how to build and execute winning vulnerability research strategies and disclosure methods and find out exactly how to claim credit for their work by opening CVEs and sharing their research publicly.
- PDF + ePub pkt
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.
- PDF + ePub pkt
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Combating Crime on the Dark Web gives you a deep understanding of how criminal elements operate on the dark web and how you can strategize and use various tools to disrupt those operations. If you’re looking to pave your way to an exciting and rewarding career in crime prevention, this book is a must-read.
- PDF + ePub pkt
Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime
-
This easy-to-follow guide is for network and security professionals who want to learn how to use Palo Alto’s Next Generation Firewall, and how it can be leveraged to gain deep insight into the traffic, applications and threats that traverse your network.
- PDF + ePub
- Audiobook MP3 pkt
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
The AWS Certified Cloud Practitioner Exam Guide will help you to develop a solid understanding of security protocols and the different AWS pricing models necessary for building secure and cost-effective cloud applications. You'll be able to enhance your knowledge of AWS cloud services and architect robust solutions for your clients.
- PDF + ePub
- Audiobook MP3 pkt
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01) AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Cybersecurity is a vast field and getting started can seem overwhelming. This audiobook demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
-
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
- PDF + ePub pkt
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
DevSecOps in Practice with VMware Tanzu is a comprehensive learning reference covering the best-in-class tools that will aid in enhancing developer productivity, operational efficiency, and intrinsic security. This book will help you in laying out the easiest path to production for apps built to run in multi-cloud Kubernetes environments.
- PDF + ePub pkt
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
This comprehensive guide will aid the C-suite and executives in understanding the necessity of cyber resilience in their organizations, self-assess their role in supporting their company’s cybersecurity program, and provide practical takeaways and insights on navigating their working relationship with the other C-suite counterparts.
- PDF + ePub
- Audiobook MP3 pkt
Building a Cyber Resilient Business. A cyber handbook for executives and boards Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Zmieniająca się rzeczywistość administracyjna koreluje z wieloma obszarami, a wśród nich priorytetowe znaczenie ma bezpieczeństwo wewnętrzne. Zapewnianie i kształtowanie bezpieczeństwa wewnętrznego odbywa się w dużej mierze przez podmioty publiczne. Efektywność wykonywania przez nie zadań ma realny wpływ na eliminowanie lub neutralizowanie z
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
The Cybersecurity and Privacy Law Handbook is a beginner's guide to compliance with cybersecurity and privacy standards that will ensure the safety of your data and protect you from the hefty fines that will come your way if you fail to safeguard your company's, and your customers', data.
- PDF + ePub
- Audiobook MP3 pkt
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.
- PDF + ePub
- Audiobook MP3 pkt
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
This book not only helps you gain a deep understanding of crucial information security concepts, but also supercharges your preparation for the CISM exam through interactive practice questions, flashcards, and exam tips.
- PDF + ePub pkt
Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition
-
Cyber anonymity is very essential as most devices, applications, and browsers collect information on every single activity that you perform in cyberspace. This book helps you understand the importance of cyber anonymity and you will learn techniques that will help you perform tasks without disclosing your information.
- PDF + ePub pkt
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
This audiobook takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.
- PDF + ePub
- Audiobook MP3 pkt
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
-
The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This audiobook will take you through the latest version of Kali Linux to help you efficiently deal with crucial security aspects such as confidentiality, integrity, availability, and access control.
- Audiobook MP3 pkt
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
-
The CompTIA Network+ Certification Guide makes the most complex Network+ concepts easy to understand despite having no prior knowledge. It offers exam tips in every chapter along with access to practical exercises and an exam checklist that map to the exam objectives. Moreover, it is the perfect study guide to help you confidently pass the CompTIA
- PDF + ePub pkt
CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition
-
Digital transformation of enterprises and hybrid multi-cloud adoption pose many security challenges. This book presents useful security patterns that discuss the problem context and solution. You’ll receive clear guidance on implementation and best practices for securing infrastructure, protecting data and providing continuous security and c
- PDF + ePub pkt
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
This book will help you discover the powerful capabilities of Dapr by implementing a sample application with microservices leveraging all the building blocks. Throughout the book, you’ll find out how Dapr helps you simplify the creation of resilient and portable microservices.
- PDF + ePub pkt
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
This guide to SASE services is for those implementing SD-WAN, SASE, cloud infrastructure, remote access, or integrating a multi-cloud strategy that may or may not include edge computing solutions. This book shows the past, present, and future of SASE and how you can learn today and prepare for the future.
- PDF + ePub pkt
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.
- PDF + ePub pkt
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Network Protocols for Security Professionals is a comprehensive guide that will take you through the basics of network security and help you get to grips with the network, network devices, and traffic analysis-based attacks. The book covers practical ways to attack and defend network protocols.
- PDF + ePub pkt
Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
-
This audiobook will take you through some key cybersecurity job roles and teach you the important technical and behavioral questions that will help you pass the interview, land the job, and grow in your cybersecurity career.
- PDF + ePub
- Audiobook MP3 pkt
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
Kenneth Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
-
Helm is a powerful open-source tool for automating application deployments on Kubernetes. Managing Kubernetes Resources Using Helm provides you with the ability to significantly reduce operational stress around application deployment and lifecycle management.
- PDF + ePub + Mobi pkt
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Cybersecurity – Attack and Defense Strategies, Third Edition is a completely revised new edition of this bestselling book that covers the very latest security threats and defense strategies.
- PDF + ePub pkt
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Malware analysis is a powerful investigation technique widely used in various information security areas including digital forensics and incident response processes. With the help of this book, you’ll be able to use practical examples and comprehensive insights to analyze any type of malware you may encounter within the modern world.
- PDF + ePub pkt
Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition
-
Windows Server 2022 is Microsoft's latest version of the server OS. It brings significant improvements in security, secure connectivities, Azure hybrid capabilities, storage, and other vital features. This book covers all Windows Server 2022 administration fundamentals, giving you valuable insights into Microsoft's role-based certifications.
- PDF + ePub pkt
Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition Windows Server 2022 Administration Fundamentals. A beginner's guide to managing and administering Windows Server environments - Third Edition
-
With this edition, you’ll be able to secure your company’s data and users in today’s threat landscape. This book will help you to holistically approach the method of securing your Windows environment, with best practice recommendations, real-world scenarios, and by guiding you through implementing a zero-trust multi-layered app
- PDF + ePub pkt
Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition
-
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.
- PDF + ePub pkt
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
This audiobook is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.
- Audiobook MP3 pkt
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
By taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the
- PDF + ePub
- Audiobook MP3 pkt
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cyber Warfare – Truth, Tactics, and Strategies takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools and strategies presented for you to learn how to think about defendin
- Audiobook MP3 pkt
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Microsoft Defender for Cloud is an infrastructure management system that enhances security status and provides threat protection of hybrid workloads in the cloud. Microsoft Defender for Cloud Cookbook provides comprehensive coverage of Microsoft Defender for Cloud features and capabilities as well as hands-on and implementation guides and examples.
- PDF + ePub pkt
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
This book is your ultimate guide to OPNsense, an open-source next-generation firewall solution. The book comes packed with hands-on examples that will enable you to enhance network security like a professional.
- PDF + ePub pkt
OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense
-
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.
- PDF + ePub pkt
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.
- PDF + ePub pkt
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin by creating your very first app from the get-go. You’ll learn how to use it as a means to explore and understand the Honeycode development environment and concepts.
- PDF + ePub pkt
Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming
-
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.
- PDF + ePub pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
-
Simplifying security concepts of Microsoft Azure and Microsoft 365, this book will help you gain knowledge necessary to take and pass Exam SC-900 to achieve the Microsoft Security, Compliance, and Identity Fundamentals certification. You'll be able to implement the acquired practical knowledge in real-world scenarios in no time.
- PDF + ePub pkt
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam’s objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.
- PDF + ePub pkt
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Mastering Cyber Intelligence provides critical knowledge that will help you stay ahead of adversaries and proactively protect your organization against known and unknown cyber threats. You'll build the security skills required to conduct effective threat intelligence, integrate it into operations, and identify gaps in security postures.
- PDF + ePub pkt
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Security is integrated into every cloud, but most users take cloud security for granted. Revised to cover product updates up to early 2022, this book will help you understand Microsoft Azure's shared responsibility model that can address any challenge, cybersecurity in the cloud, and how to design secure solutions in Microsoft Azure.
- PDF + ePub pkt
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Promocja
Як часто вам здається, що вас дурять в інтернеті? Або- ePub + Mobi pkt
Як не стати овочем. Інструкція з виживання в інфопросторі Як не стати овочем. Інструкція з виживання в інфопросторі
(17,17 zł najniższa cena z 30 dni)
17.17 zł
21.20 zł(-19%) -
Shellcode is code that is used to execute a command within software memory to take control of or exploit a target computer. Offensive Shellcode from Scratch helps you to understand what shellcode is, along with its components, the tools used to build shellcode, and how shellcode can be used within Linux and Windows.
- PDF + ePub pkt
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
The evolving ransomware threat landscape brings new challenges to the security personnel of many organizations. The effects of human-operated attacks make practical security approaches the need of the hour as proper response and investigation are crucial. This book discusses how to use these approaches, focusing on real-world scenarios and tools.
- PDF + ePub pkt
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Memory forensics is a vital part of modern digital forensic examinations as threat actors have started using memory-based malware more often. This comprehensive guide focuses on the application of modern memory forensics techniques to detect hidden threats in memory and reconstruct user activity based on volatile data.
- PDF + ePub pkt
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
This book covers in detail all the objectives of the SC-200: Microsoft Security Operations Analyst exam. The book offers a blend of theory and practical examples that will not only help you pass this exam but also implement the knowledge in real-world scenarios.
- PDF + ePub pkt
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
-
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.
- PDF + ePub pkt
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
This book is a guide to understanding new-age protocols and algorithms that are emerging for data protection in cybersecurity and information and communications technology (ICT) with the help of examples and use cases. You’ll begin by exploring classical cryptography and later progress to implementing algorithms for security and data privacy
- PDF + ePub pkt
Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
-
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition provides you with an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers.
- PDF + ePub pkt
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
With this guide for developers, you'll learn how to build apps that use common cryptographic operations to improve security and respect user privacy. You'll understand how, when, and why to use safe, modern cryptographic algorithms and libraries in your code. You’ll learn using plenty of code samples in JavaScript for both Node.js and the br
- PDF + ePub pkt
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This book will take you through the latest version of Kali Linux to help you efficiently deal with crucial security aspects such as confidentiality, integrity, availability, and access control.
- PDF + ePub pkt
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition
-
In this paper, we focus on those aspects of cybersecurity that are most relevant to universities, intending to provide academic communities with some knowledge that might be useful in their research, education and administration activities related to cybersecurity. The remaining part of the paper is organised as follows. In Section 2, we p
Cybersecurity Research, Education and Management: University Perspective Cybersecurity Research, Education and Management: University Perspective
-
This book will guide you in improving your security posture and building robust and predictable security operations. You'll learn to design processes for the changing landscape of security operations, from designing defensive architectures to passive defense, blue and purple teaming, threat intelligence agility, measuring business values, and more.
- PDF + ePub pkt
Agile Security Operations. Engineering for agility in cyber defense, detection, and response Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Veeam provides data protection for modern-day technical organizations. This book takes you through installation best practices, optimizations, and the 3-2-1-1-0 rule, before going on to examine repository and proxy-related topics and advanced concepts such as CDP, extended object storage support, Veeam ONE enhancement, and Orchestrator.
- PDF + ePub pkt
Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition
-
A good security posture is essential for an organization's Microsoft 365 tenant. This book will help you to understand how you can design and implement Information Protection within Microsoft 365 to protect your digital estate, on-premises as well as on SaaS platforms.
- PDF + ePub pkt
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Use Microsoft’s own intelligent security service that brings together cloud security and AI to protect your organization. Microsoft Sentinel in Action will help you to gain enough understanding to make the most of Azure services and secure your environment against modern cybersecurity threats.
- PDF + ePub pkt
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
This book is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.
- PDF + ePub pkt
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!
- PDF + ePub pkt
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.
- PDF + ePub pkt
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
CISM is a globally recognized and much sought-after certification in the field of IT security. CISM Certification Guide is aligned with the latest edition of the CISM Review Manual and offers you complete, up-to-date coverage of CISM exam content so you can take the exam with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps penetration testers set up persistence and facilitates lateral movement. This book is a one-of-a-kind resource that covers both the theoretical foundations and a range of privilege escalation techniques and tools for both Windows and Lin
- PDF + ePub + Mobi pkt
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Hands-On Dynamic Story Scripting with the ink Scripting Language shows you how to quickly move from learning the fundamentals of ink, the must-have narrative scripting language for games, to leveraging it to create everything from simple interactive stories to complex narrative-driven projects in Unity.
- PDF + ePub + Mobi pkt
Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects
-
Security is a core component of any well-architected cloud environment and Azure is no different in this regard. With this book, you will learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environments and prepare to take the AZ-500 exam to validate your Azure security knowledge.
- PDF + ePub + Mobi pkt
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
Mastering Microsoft Endpoint Manager will teach you how to manage your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing a new and simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.
- PDF + ePub + Mobi pkt
Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
This book explores how Nmap is one of the most robust tools for network discovery and security auditing. You’ll focus on how you can use it to perform hundreds of different tasks, from OS detection and port scanning to advanced fingerprinting and vulnerability exploitation.
- PDF + ePub + Mobi pkt
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Promocja
Blockchain technology continues to disrupt a wide variety of organizations, from small businesses to the Fortune 500. Today hundreds of blockchain networks are in production, including many built with Hyperledger Fabric. This practical guide shows developers how the latest version of this blockchain infrastructure provides an ideal foundation for d- ePub + Mobi pkt
Hands-On Smart Contract Development with Hyperledger Fabric V2 Hands-On Smart Contract Development with Hyperledger Fabric V2
(211,65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
Elastic security offers enhanced threat hunting capabilities to build active defense strategies. Complete with practical examples and tips, this easy-to-follow guide will help you enhance your security skills by leveraging the Elastic Stack for security monitoring, incident response, intelligence analysis, or threat hunting.
- PDF + ePub + Mobi pkt
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Antivirus Bypass Techniques follows a unique approach that will help you explore the security landscape, understand the fundamentals of antivirus software, and put antivirus bypass techniques to use. This book will enable you to bypass antivirus software solutions in order to develop efficient antivirus software.
- PDF + ePub + Mobi pkt
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Get hands-on with practical ethical hacking from scratch using Python. With the help of step-by-step instructions and practical exercises, you'll develop tools that provide detailed insights into the ethical hacking thought process. This book also covers aspects of network and system hacking along with defense techniques.
- PDF + ePub + Mobi pkt
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.
- PDF + ePub + Mobi pkt
Malware Analysis Techniques. Tricks for the triage of adversarial software Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Zscaler Cloud Security Essentials will show you how to leverage the power of Zscaler by jumping right into the design, deployment, and support of a customized Zscaler solution. You'll discover the capabilities of Zscaler through real-world deployment and explore Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) in detail.
- PDF + ePub + Mobi pkt
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Every minute of the day, there are petabytes of data exchanged between our homes, cars, businesses, and IoT devices. But just what exactly is involved when using cryptographic techniques? Modern Cryptography for Cybersecurity Professionals will help you to understand common cryptographic techniques and terms used today to secure our data.
- PDF + ePub + Mobi pkt
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
The Cisco Certified CyberOps Associate 200-201 certification exam helps you gain the skills and knowledge needed to prevent, detect, analyze, and respond to cybersecurity incidents. This book offers complete up-to-date coverage of the 200-201 exam so you can confidently pass first time while getting hands-on cybersecurity experience.
- PDF + ePub + Mobi pkt
Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
-
Information security strategies and best practices help in filling the gap that exists between theory and reality. The book starts by showing you how to implement risk management and governance structures into your organization and goes on to cover the best methods for operationalizing your information security strategy.
- PDF + ePub + Mobi pkt
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
This book covers the finer details of microcontrollers and low-powered embedded device programming with TinyGo. You’ll work through a range of interactive and real-world embedded projects that will help you to build creative thinking and understand a variety of TinyGo features and capabilities for programming hardware and multiple input devi
- PDF + ePub + Mobi pkt
Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation
-
Hardware security has become a major concern in recent times making it crucial for companies and end users to focus on protecting hardware. If you’re a security practitioner who is more familiar with software and binary hacking or someone looking to repurpose devices, this book will demonstrate how to approach hardware hacking of embedded de
- PDF + ePub + Mobi pkt
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
This book is a comprehensive guide for organizations on how to prepare for cyber-attacks and control cyber threats and network security breaches in a way that decreases damage, recovery time, and costs, facilitating the adaptation of existing strategies to cloud-based environments.
- PDF + ePub + Mobi pkt
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Veeam is an infrastructure backup solution for VMware vSphere or Hyper-V to enable VM and server backup. This book takes you through installation best practices, optimizations, and the 3-2-1 rule, before going on to examine repository and proxy-related topics and finally advanced topics such as DataLabs, Instant VM Recovery, and Veeam ONE.
- PDF + ePub + Mobi pkt
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Threat hunting is the act of proactively tracking and eliminating adversaries from your network as early as possible. Practical Threat Intelligence and Data-Driven Threat Hunting covers both threat intelligence and the act of threat hunting from the first steps to advanced practices.
- PDF + ePub + Mobi pkt
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Explore the capabilities of the Roblox platform to create real-world games with this book. You’ll follow a hands-on approach to learning the implementation and associated methodologies and get up and running with Roblox Lua in no time.
- PDF + ePub + Mobi pkt
Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming
-
Python’s latest updates feature numerous packages that can be used to perform critical missions. This Python networking and security book will help you to use Python packages to detect vulnerabilities in web apps and tackle networking challenges. You’ll explore a variety of techniques and tools for networking and security in Python.
- PDF + ePub + Mobi pkt
Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition
-
Promocja
Rootkity i Bootkity pomaga zrozumieć i przeciwdziałać wyrafinowanym, zaawansowanym zagrożeniom, zagrzebanym głęboko w procesie rozruchowym maszyny albo oprogramowaniu układowym UEFI. Z pomocą rozlicznych studiów przypadków i profesjonalnych badań trzech spośród wiodących światowych ekspertów do spraw zabezpieczeń prześledzimy rozwój złośliwego opro- ePub + Mobi pkt
(79,73 zł najniższa cena z 30 dni)
95.20 zł
119.00 zł(-20%) -
AWS is a very popular cloud service that many organizations are implementing into their infrastructure. AWS Penetration Testing is a comprehensive introduction for those who are new to AWS and Ethical hacking, that will have you up-to-speed in no time.
- PDF + ePub + Mobi pkt
AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
-
This book provides a comprehensive view of blockchain business models, governance structure, technology landscape, and architecture considerations. It will speed up your understanding and concept development for distributed ledgers.
- PDF + ePub + Mobi pkt
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
Nitin Gaur, Anthony O'Dowd, Petr Novotny, Luc Desrosiers, Venkatraman Ramakrishna, Salman A. Baset
-
Promocja
Książka jest kolejną publikacją Ogólnopolskiego Międzyuczelnianego Seminarium Problemy badawcze i projektowe informatyzacji państwa. Celem jej napisania było przybliżenie zagadnień związanych z integracją systemów informatycznych działających w jednej lub kilku firmach, w których zarządzanie dużą liczbą takich systemów staje się kłopotliwe. Książ(49,58 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
After prominent market leaders have been impacted by advanced cyber threats, network security has become a top priority in terms of successfully keeping attackers from breaching networks. This book will help you design a robust network security ecosystem that helps prevent traditional and new and evolving attacks.
- PDF + ePub + Mobi pkt
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
Dlaczego cyberbezpieczeństwo jest ważne?
W dzisiejszym świecie, w którym wiele aspektów naszego życia jest związanych z technologią, zrozumienie zasad cyberbezpieczeństwa jest niezwykle istotne. Nasze książki nie tylko omawiają najważniejsze rodzaje cyberbezpieczeństwa, ale także wyjaśniają, dlaczego to zagadnienie jest tak kluczowe dla każdej organizacji i jednostki. Bowiem każdego dnia jesteśmy narażeni na różnorodne zagrożenia płynące z sieci, od nieuczciwych praktyk hakerów do przypadkowych ataków malware. W księgarni internetowej Helion.pl znajdziesz bogaty wybór książek o hakowaniu, które pomogą Ci przede wszystkim zrozumieć co to jest hakowanie, jak zostać etycznym hakerem, co to znaczy być specjalistą w dziedzinie cybersecurity oraz jak dbać o bezpieczeństwo danych.
Podstawy hackingu – książki dla początkujących specjalistów cyberbezpieczeństwa
Niezależnie od tego, czy dopiero zaczynasz swoją przygodę z cyberbezpieczeństwem, czy jesteś doświadczonym specjalistą, posiadamy książki, które sprostają Twoim oczekiwaniom. Oferujemy bogatą kolekcję książek na temat hackingu, testów penetracyjnych oraz podstaw i zaawansowanych zagadnień cyberbezpieczeństwa. Jedną z nich jest "Cybersecurity w pytaniach i odpowiedziach". Dla początkujących, polecamy także "Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności". To praktyczny poradnik hakera, w którym znajdziesz materiały wprowadzające do podstaw hackingu. Jeśli interesuje Cię, jak dbać o dane w swojej organizacji, pomocna okaże się książka "Bezpieczeństwo sieci firmowej. Kontrola ruchu wychodzącego".
Dla bardziej zaawansowanych oferujemy także publikacje na temat etycznego hackingu, takie jak "Etyczny haking. Praktyczne wprowadzenie do hakingu" oraz "Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze", które wprowadzą Cię w świat testów penetracyjnych oraz profesjonalnych wskazówek na temat tego, jak chronić się przed atakami. Dodatkowo, znajdziesz u nas kursy cyberbezpieczeństwa, które także mogą Cię zainteresować.
Odkryj świat kryptografii, socjotechnik i bezpieczeństwa danych
Jeśli jesteś osobą, która pragnie jeszcze bardziej zgłębić wiedzę w zakresie bezpieczeństwa danych i bezpieczeństwa sieci lub zainteresowała Cię informatyka śledcza, to u nas również znajdziesz książki o tej tematyce. A jeśli chcesz wiedzieć więcej o technikach manipulacji, polecamy pozycję "Socjotechnika. Sztuka zdobywania władzy nad umysłami.I". Dla zainteresowanego kryptografią polecamy "Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym". To doskonałe materiały dla profesjonalistów, którzy chcą poszerzyć swoją wiedzę i umiejętności.
Mamy nadzieję, że znalazłeś tu inspirujące pozycje, które pomogą Ci rozwijać umiejętności i wiedzę w dziedzinie hakowania i cyberbezpieczeństwa. Niezależnie od tego, czy jesteś początkującym entuzjastą, doświadczonym specjalistą, czy po prostu pragniesz zrozumieć, jak zabezpieczyć swoją prywatność online, nasza oferta książek dostarczy Ci niezbędnych zasobów i informacji. Odkrywaj tajemnice blockchaina, OSINT, IoT i chmury obliczeniowej, a także ucz się programowania w Pythonie dla bezpieczeństwa sieci. Pamiętaj, że wiedza to najważniejsze narzędzie w walce z cyberzagrożeniami. Dzięki najlepszym książkom o cyberbezpieczeństwie zdobędziesz umiejętności, które są cenione na rynku pracy. Powodzenia!