Kategoria Hacking w Helionie to kompendium wiedzy dla każdego, kto pragnie zgłębić tajniki cyberbezpieczeństwa, etycznego hakowania i testów penetracyjnych. Odkryj fascynujące książki, które przeniosą Cię w głąb sieci komputerowych, ucząc technik obrony i ataku, socjotechniki, kryptografii oraz bezpieczeństwa danych. Zanurz się w lekturze i poznaj najnowsze strategie, narzędzia i metody, które pozwolą Ci stać się ekspertem w dziedzinie bezpieczeństwa cyfrowego!
Hacking
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Helion
-
Veeam is an infrastructure backup solution for VMware vSphere or Hyper-V to enable VM and server backup. This book takes you through installation best practices, optimizations, and the 3-2-1 rule, before going on to examine repository and proxy-related topics and finally advanced topics such as DataLabs, Instant VM Recovery, and Veeam ONE.
- PDF + ePub + Mobi pkt
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Threat hunting is the act of proactively tracking and eliminating adversaries from your network as early as possible. Practical Threat Intelligence and Data-Driven Threat Hunting covers both threat intelligence and the act of threat hunting from the first steps to advanced practices.
- PDF + ePub + Mobi pkt
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Explore the capabilities of the Roblox platform to create real-world games with this book. You’ll follow a hands-on approach to learning the implementation and associated methodologies and get up and running with Roblox Lua in no time.
- PDF + ePub + Mobi pkt
Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming
-
Python’s latest updates feature numerous packages that can be used to perform critical missions. This Python networking and security book will help you to use Python packages to detect vulnerabilities in web apps and tackle networking challenges. You’ll explore a variety of techniques and tools for networking and security in Python.
- PDF + ePub + Mobi pkt
Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition
-
Promocja
Rootkity i Bootkity pomaga zrozumieć i przeciwdziałać wyrafinowanym, zaawansowanym zagrożeniom, zagrzebanym głęboko w procesie rozruchowym maszyny albo oprogramowaniu układowym UEFI. Z pomocą rozlicznych studiów przypadków i profesjonalnych badań trzech spośród wiodących światowych ekspertów do spraw zabezpieczeń prześledzimy rozwój złośliwego opro- ePub + Mobi pkt
(79,73 zł najniższa cena z 30 dni)
95.20 zł
119.00 zł(-20%) -
AWS is a very popular cloud service that many organizations are implementing into their infrastructure. AWS Penetration Testing is a comprehensive introduction for those who are new to AWS and Ethical hacking, that will have you up-to-speed in no time.
- PDF + ePub + Mobi pkt
AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap AWS Penetration Testing. Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
-
This book provides a comprehensive view of blockchain business models, governance structure, technology landscape, and architecture considerations. It will speed up your understanding and concept development for distributed ledgers.
- PDF + ePub + Mobi pkt
Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition
Nitin Gaur, Anthony O'Dowd, Petr Novotny, Luc Desrosiers, Venkatraman Ramakrishna, Salman A. Baset
-
Promocja
Książka jest kolejną publikacją Ogólnopolskiego Międzyuczelnianego Seminarium Problemy badawcze i projektowe informatyzacji państwa. Celem jej napisania było przybliżenie zagadnień związanych z integracją systemów informatycznych działających w jednej lub kilku firmach, w których zarządzanie dużą liczbą takich systemów staje się kłopotliwe. Książ(49,58 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
After prominent market leaders have been impacted by advanced cyber threats, network security has become a top priority in terms of successfully keeping attackers from breaching networks. This book will help you design a robust network security ecosystem that helps prevent traditional and new and evolving attacks.
- PDF + ePub + Mobi pkt
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
Promocja
Accessible and fun to read, this practical book contains a collection of stories of organizations using blockchain technology in practice. Through deep research and firsthand interviews, authors Sir John Hargrave and Evan Karnoupakis show you how leading-edge organizations have worked to integrate blockchain into their businesses.You'll start by ex- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Biometric technology provides a robust and convenient method for authenticating an individual’s identity using fingerprint, iris, voice, palm print, or facial recognition. Identity Management with Biometrics will help you identify and address the challenges that you will need to consider as you move into the next iteration of identity protec
- PDF + ePub + Mobi pkt
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Mastering Blockchain, Third Edition is the blockchain bible to equip you with extensive knowledge of distributed ledgers, cryptocurrencies, smart contracts, consensus algorithms, cryptography and blockchain platforms such as Ethereum, Bitcoin, and many more.
- PDF + ePub + Mobi pkt
Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition
-
AI and blockchain are catalyzing the pace of enterprise innovation. This book is a guide to learn the basic concepts, analyze use-cases and implement these technologies across various industries such as healthcare, finance, trade, and supply chain. The book also guides you to build applications using Ethereum, machine learning and MóiBit.
- PDF + ePub + Mobi pkt
Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies
-
Kubernetes is a widely used opensource orchestration platform for managing container applications. Developers are not yet aware of the pitfalls of a containerized environment. This book takes you through core security principles, best practices, and real-world use cases to learn mitigation or prevention strategies from known attacks and CVEs.
- PDF + ePub + Mobi pkt
Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments Learn Kubernetes Security. Securely orchestrate, scale, and manage your microservices in Kubernetes deployments
-
MS-500: Microsoft 365 Security Administration offers complete, up-to-date coverage of the MS-500 exam so you can take it with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.
- PDF + ePub + Mobi pkt
Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition
-
Cybersecurity Threats, Malware Trends, and Strategies shares numerous insights about the threats that both public and private sector organizations face and the cybersecurity strategies that can mitigate them.
- PDF + ePub + Mobi pkt
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator.
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence Learn Computer Forensics. A beginner's guide to searching, analyzing, and securing digital evidence
-
Promocja
How can you use data in a way that protects individual privacy but still provides useful and meaningful analytics? With this practical book, data architects and engineers will learn how to establish and integrate secure, repeatable anonymization processes into their data flows and analytics in a sustainable manner.Luk Arbuckle and Khaled El Emam fr- ePub + Mobi pkt
Building an Anonymization Pipeline. Creating Safe Data Building an Anonymization Pipeline. Creating Safe Data
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.
- PDF + ePub + Mobi pkt
Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition
-
Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10.
- PDF + ePub + Mobi pkt
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
-
Azure Sentinel is an intelligent security service from Azure where Microsoft's main focus on developing sentinel is to integrate and bring together cloud security and artificial intelligence into effect. Here readers will gain enough understanding to make the most of Azure services to secure their environment from modern cybersecurity threats.
- PDF + ePub + Mobi pkt
Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems
-
Cybersecurity Attacks: Red Team Strategies is a guide to building and maturing an internal red team program. It highlights the core strategies to measure and improve security awareness, breach detection, and response capabilities. In addition, we will dive into the technical details of tactics and techniques for red teamers of all skill levels.
- PDF + ePub + Mobi pkt
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
A first-hand look into how quantum computing and Blockchain together are redefining industries, including fintech, healthcare, and research. Through a series of interviews with domain experts, Arun also explores the potential of these technologies to transform national and global governance and policies.
- PDF + ePub + Mobi pkt
Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain
-
Hands-On Restful Web Services with Go will help you in understanding the fundamentals of REST and enable you to quickly develop graceful API with the help of Golang's open-source tools and libraries. It can be a developer guide in general that covers all key aspects of API development and standard architecture patterns in application development.
- PDF + ePub + Mobi pkt
Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition
-
A new edition of the bestselling Pandas cookbook updated to pandas 1.x with new chapters on creating and testing, and exploratory data analysis. Recipes are written with modern pandas constructs. This book also covers EDA, tidying data, pivoting data, time-series calculations, visualizations, and more.
- PDF + ePub + Mobi pkt
Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition Pandas 1.x Cookbook. Practical recipes for scientific computing, time series analysis, and exploratory data analysis using Python - Second Edition
-
Cyber Warfare – Truth, Tactics, and Strategies takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools and strategies presented for you to learn how to think about defendin
- PDF + ePub + Mobi pkt
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Blockchain technology will play a disruptive role in the banking and finance sector in the future. Experts estimate that it will save up to 20 billion dollars annually. You will build full-fledged financial applications using blockchain. It will aid you in building more secure and transparent workflows and re-engineering your business processes.
- PDF + ePub + Mobi pkt
Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar Blockchain Development for Finance Projects. Building next-generation financial applications using Ethereum, Hyperledger Fabric, and Stellar
-
With six new chapters, Deep Reinforcement Learning Hands-On Second edition is completely updated and expanded with the very latest reinforcement learning (RL) tools and techniques, providing you with an introduction to RL, as well as the hands-on ability to code intelligent learning agents to perform a range of practical tasks.
- PDF + ePub + Mobi pkt
Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition
-
With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety.
- PDF + ePub + Mobi pkt
Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe
-
Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book that covers the very latest security threats and defense strategies, updated for 2020.
- PDF + ePub + Mobi pkt
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Electron is one of the most popular JavaScript frameworks for building cross-platform desktop applications. This project-based guide will help you explore the components of the Electron framework and its integration with other JS libraries to build real-world desktop apps with an increasing level of complexity.
- PDF + ePub + Mobi pkt
Electron Projects. Build over 9 cross-platform desktop applications from scratch Electron Projects. Build over 9 cross-platform desktop applications from scratch
-
The MS-101 exam is part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path in which users learn to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This book offers complete, up-to-date coverage of the MS-101 exam so you can take them with confidence, fully equipped to pass the first time.
- PDF + ePub + Mobi pkt
Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365 Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365
-
This book helps data scientists and cybersecurity experts on implementing the latest AI techniques in cybersecurity. Concrete and clear steps for implementing ML security systems are provided, saving you months in research and development. By the end of this book, you will be able to build defensive systems to curb cybersecurity threats.
- PDF + ePub + Mobi pkt
Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python
-
The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication.
- PDF + ePub + Mobi pkt
Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Learn Kali Linux 2019. Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
-
Get ready to pass your CompTIA Security+ certification exam with the elaborate and complete practice that Security+? Practice Tests will provide you. From detailed explanations of the six domains to full-length practice tests, you’ll gain complete knowledge of what this test contains and how to ace it.
- PDF + ePub pkt
Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam Security+(R) Practice Tests. Prepare for, practice, and pass the CompTIA Security+ exam
-
This book will cover use-cases on how blockchain is currently being used in the industry - catering to key decision-makers within an organization. It also addresses the real problems and technical difficulties in implementing blockchain, and the various blockchain strategies being adopted by popular organizations all over the world.
- PDF + ePub + Mobi pkt
Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business Blockchain for Decision Makers. A systematic guide to using blockchain for improving your business
-
Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.
- PDF + ePub + Mobi pkt
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Blockchain empowers enterprises to scale out in a unique way, allowing them to build and manage blockchain business networks. This book offers an exploration of distributed ledger technology, blockchain, and Hyperledger fabric along with blockchain-as-a-service (BaaS).
- PDF + ePub + Mobi pkt
Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise Oracle Blockchain Services Quick Start Guide. A practical approach to implementing blockchain in your enterprise
-
This Learning Path is your comprehensive guide to making machine data accessible across your organization using advanced dashboards. With over 80 realistic examples, you'll get several recipes to use Splunk and transform your data into business-critical insights.
- PDF + ePub + Mobi pkt
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
This book will cover all the new features that have been introduced in TensorFlow 2.0 especially the major highlight, including eager execution and more. You will learn how to make the best use of these features to migrate your codes from TensorFlow 1.x to TensorFlow 2.0 in a seamless way.
- PDF + ePub + Mobi pkt
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
With this book, you will learn to write production-ready smart contracts for the Ethereum blockchain. Finally, with the help of comprehensive examples, you will learn how to add security to smart contracts and then delve into the various security considerations that must be paid attention to.
- PDF + ePub + Mobi pkt
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
This Learning Path is your easy reference to know all about penetration testing or ethical hacking. With more than 100 recipes, you'll become a master of the most widely used penetration testing framework and easily tackle command injection flaws, crypto implementation layers, and web application security holes.
- PDF + ePub + Mobi pkt
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
-
Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.
- PDF + ePub + Mobi pkt
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure your i
- PDF + ePub + Mobi pkt
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
With Red Hat Enterprise Essentials you will run and operate Red Hat Linux 8 learn to securely administer a server or a system using Linux commands.
- ePub pkt
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world.
- PDF + ePub + Mobi pkt
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). This book teaches you various penetration testing techniques in order to become
- PDF + ePub + Mobi pkt
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
ABAP is an established and complex programming language in the IT industry. This book will give you confidence in using the latest ABAP programming techniques and applying legacy constructions with the help of practical examples.
- PDF + ePub + Mobi pkt
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Starting with the technical foundations of blockchain, this Learning Path takes you deep into the theoretical and technical foundations of the technology to transform you into an expert of decentralized applications and blockchain.
- PDF + ePub + Mobi pkt
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
This essential guide will help any blockchain practitioner gain expertise in developing complete STO and stablecoins DApps. This book provides a quick introduction to basic ICO and STO concepts, and their differences. It will also help readers compile, test, and deploy their own contracts by altering the code provided in the book.
- PDF + ePub + Mobi pkt
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
This Learning Path focuses on showing you how to leverage the benefits of the cloud and create applications that are high in performance and availability. It teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud.
- PDF + ePub + Mobi pkt
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
C# and .NET Core makes network programming the enjoyable experience it should be. This book will get you started with the basics of network programming as they relate to C#. We will then dig into the core topics of the network layer. You'll also learn to make sockets connections as well and develop practical client-side applications in this book.
- PDF + ePub + Mobi pkt
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
This Learning Path is your easy reference to explore and build blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Starting with the basics of blockchain, this Learning Path teaches you all that you need to know to develop your own private and public blockchain networks.
- PDF + ePub + Mobi pkt
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
Salman A. Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
-
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.
- PDF + ePub + Mobi pkt
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7 Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Mastering Distributed Tracing provides comprehensive coverage of the tracing field. Solve problems through code instrumentation with open standards, and learn how to profile complex systems. The book will also prepare you to operate and enhance your own tracing infrastructure.
- PDF + ePub + Mobi pkt
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Data structures and algorithms help you to understand computational complexity and write efficient code. Kotlin data structures and algorithms enable you to write code that runs faster which is important in the web and mobile world. This book takes you through the techniques that you can use in your regular production environment.
- PDF + ePub + Mobi pkt
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get started with executing an application penetration test and be sure of the results.
- PDF + ePub + Mobi pkt
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine VR Quick Start Guide introduces designers to the guidelines and design processes necessary to build interactive VR experiences. Learn to use User Experience design techniques and Blueprint programming to create virtual reality gameplay for HTC Vive, Oculus Rift, PSVR, and Windows Mixed Reality headsets.
- PDF + ePub + Mobi pkt
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4 Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
With this Learning Path, you will be able to easily solve complex programming challenges using advanced features of C#. You'll structure and build scalable, optimized, and robust applications in C#7 and .NET, and with the newly-acquired TDD skills, you'll be ready to enter the market not only as a C# pro, but also as a TDD expert.
- PDF + ePub + Mobi pkt
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C# Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
-
This book is for Python developers to implement various components of end-to-end decentralized applications such as cryptocurrencies, smart contracts, wallet and more. You will use the example-based approach using various libraries from Python ecosystem to build efficient and powerful blockchain applications at work or projects.
- PDF + ePub + Mobi pkt
Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python
-
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.
- PDF + ePub + Mobi pkt
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoints and create robust defense strategies.
- PDF + ePub + Mobi pkt
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concepts that will come in handy when making robust cybersecurity tools and custom exploits.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Microsoft Azure has numerous effective solutions but the biggest challenge that architects and administrators face is implementing these solutions appropriately. This Learning Path focuses on various scenarios that will help overcome the challenge of implementing Azure solutions while helping you prepare for the Microsoft Architect exam.
- PDF + ePub + Mobi pkt
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, Namit Tanasseri, Rahul Rai
-
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
The serverless architecture allows you to build and run applications and services without having to manage the infrastructure which saves cost and improves scalability. In this book, you will learn to harness serverless technology to reduce production time, minimize cost and have the freedom to customize your code, without hindering functionality.
- PDF + ePub + Mobi pkt
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
This is a comprehensive guide to help you understand the current threats faced by the financial cyberspace and how to go about it and secure your financial landscape. The book will take you on a journey from identifying the attackers to securing your financial transactions and assets. The book then take you through the updates needed for procedures
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Functional programming is a very powerful programming paradigm that can help us to write better code. This book presents essential functional and reactive programming concepts in a simplified manner using Typescript.
- PDF + ePub + Mobi pkt
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Mastering Kali Linux for Advanced Penetration Testing, Third Edition will guide you through proven techniques to test your infrastructure security using Kali Linux. From selecting the most effective tools to carrying out advanced pentesting in highly secure environments, this book will help you gain the expertise you need to advance in your career.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain has the potential to change the world and has become the hottest field in the tech sector now. Blockchain for Business is a comprehensive guide that enables you to fully understand the far-reaching applications beyond Bitcoin and empowers you to make fully-informed decisions.
- PDF + ePub + Mobi pkt
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. Learn blockchain from first concepts to algorithms explained in Python.
- PDF + ePub + Mobi pkt
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
IoT and Blockchain are not limited to certain industries or use cases. Almost any business with a network and IoT device can reduce costs, improve business efficiency, and remove single points of failure in networks by implementing Blockchain. This book will help you implement an end-to-end Blockchain and IoT solution using best practices.
- PDF + ePub + Mobi pkt
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
The book will allow readers to implement smart solutions to their existing cybersecurity products and effectively build intelligent solutions which cater to the needs of the future. By the end of this book, you will be able to build, apply, and evaluate machine learning algorithms to identify various cybersecurity potential threats.
- PDF + ePub + Mobi pkt
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Hands-On Enterprise Application Development with Python explains how Python has matured to become a suitable programming language to build robust applications that scale easily to manage the requirements of the enterprise. The book will explore features of Python 3.7, tested frameworks and tools and best programming practices for developing scalabl
- PDF + ePub + Mobi pkt
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3 Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
This book will introduce you to Android forensics helping you to set up a forensic environment, handle mobile evidence, analyze how and where common applications store their data. You will also learn to identify malware on a device, and how to analyze it.
- PDF + ePub + Mobi pkt
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
C++ is a general-purpose programming language with a bias towards systems programming. This book provides a detailed walkthrough of the C, C++ and POSIX standards and enables a firm understanding of various system calls for UNIX systems. Topics include console and file IO, memory management, sockets, time interface, process and thread management
- PDF + ePub + Mobi pkt
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17 Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
Understanding the history of the Deep Web, its current state, and its possible evolution, can help you, the reader; better understand the dangers and risks that exist out there. This book helps you access the Deep Web and the Dark Net and also protect yourself while browsing the Deep Web.
- PDF + ePub + Mobi pkt
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions.
- PDF + ePub + Mobi pkt
CentOS Quick Start Guide. Get up and running with CentOS server administration CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Microsoft Azure is a cloud computing platform that helps you build, deploy, and manage applications to overcome your business challenges. This book covers the commonly used Azure services and also explains how you effectively integrate and utilize them.
- PDF + ePub + Mobi pkt
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Swift is continuing to gain traction not only amongst mobile developers but also as a server-side language. This book demonstrates how to apply design patterns and best practices in real-life situations, for new or already existing projects. By the end of the book, you’ll able to build applications that are scalable, faster and easier to ma
- PDF + ePub + Mobi pkt
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide will show you how to create distributed blockchain applications which do not depend on a central server or datacenter. Starting with the basic principles of blockchain architecture exploring cryptography, you will then study consensus protocols, initial coin offerings, crypto-mining, DApp deployment, Ethereum applicatio
- PDF + ePub + Mobi pkt
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
pfSense is a FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. This book focuses on configuring essential and other commonly used pfSense services; such as traffic shaping, redundancy, high availability, static and dynamic routing, backup and restoration of pfSense, and diagnostic tools.
- PDF + ePub + Mobi pkt
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what the field is about, the book solves that problem. The book allows readers to train themselves as bug b
- PDF + ePub + Mobi pkt
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
This book covers all the relevant concepts and phases of the blockchain development cycle. It will walk you through a step-by-step process to build three blockchain projects with differing complexity levels and hurdles. By the end of this book, you will be ready to tackle common issues in the blockchain ecosystem.
- PDF + ePub + Mobi pkt
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Mastering Vim will introduce you to the wonderful world of Vim by example of working with Python code and tools in a project-based fashion. This book will prompt you to make Vim your primary IDE as you will learn to use it for any programming language.
- PDF + ePub + Mobi pkt
Mastering Vim. Build a software development environment with Vim and Neovim Mastering Vim. Build a software development environment with Vim and Neovim
-
Docker is an open source software platform that helps you with creating, deploying, and running your applications using containers. This book is your ideal introduction to Docker and containerization.
- PDF + ePub + Mobi pkt
Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications
-
Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master the art of using reverse engineering.
- PDF + ePub + Mobi pkt
Mastering Reverse Engineering. Re-engineer your ethical hacking skills Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
In this book, you’ll build a complete system with both back-end and front-end products, including ASP.NET Core, Entity Framework, TypeScript, Angular, React, Vue, and Azure. This book covers more than just implementation, as you gain additional knowledge in more relevant areas, including deployment, monitoring, and debugging.
- PDF + ePub + Mobi pkt
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
Selenium WebDriver is a platform-independent API for automating testing of both browser and mobile applications. It is also a core technology in many other browser automation tools, APIs and frameworks. This book will guide you through the WebDriver APIs that are used in automation tests.
- PDF + ePub + Mobi pkt
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3 Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
This second edition of Kali Linux 2: Windows Penetration Testing provides approaches and solutions to the issues of modern penetration testing for a Microsoft Windows environment. As a pen tester, you need to be able to understand and use the best available tools - this book addresses these needs with maximum in a cost and time efficient way.
- PDF + ePub + Mobi pkt
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
In recent years, the C# and .NET ecosystem has grown so explosively that it's nearly impossible to keep up. This collection of programming challenges helps you explore some of the less-traveled byways of programming concepts in general and C# in particular.
- PDF + ePub + Mobi pkt
The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems
-
Promocja
Książka obejmuje wyjątkowy zestaw tematów, którego nie znajdziesz nigdzie indziej i odpowiada na pytanie, jak przezwyciężyć przeszkody wyłaniające się wraz z rozwojem rynku i rozpowszechnianiem w świadomości konsumentów start-upów opartych na blockchainie. Książkę otwiera szkic o historii technologii blockchain i omówienie podstaw kryptografii, na- ePub + Mobi pkt
(49,58 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
Blockchain across Oracle is a professional orientation for Oracle developers to get up to speed with the details and implications of the Blockchain across Oracle. Learn everything from Blockchain concepts, through to working with Oracle Blockchain Cloud Service, expert guidance on the effects of the Blockchain on key markets, and the impact to Orac
- PDF + ePub + Mobi pkt
Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers
-
Tokenomics is the economy of the new world of cryptocurrencies, blockchain, and ICOs. This book is a deep-dive into the economics and technology of tokens, and how this will lead to a new tokenized economy. This is a no-holds-barred, in-depth exploration of how it all works, and how you can participate in tokenizing the world.
- PDF + ePub + Mobi pkt
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
-
CompTIA Security+ Certification Guide makes the most complex Security+ concepts easy to understand despite having no prior knowledge. It offers exam tips in every chapter along with access to practical exercises and exam checklist that map to the exam objectives and it is the perfect study guide to help you pass CompTIA Security+ SY0-501 exam.
- PDF + ePub + Mobi pkt
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Java is one of the most commonly used software languages by programmers and developers. Are you from a non-technical background looking to master Java for your automation needs? Then Hands-On Automation Testing with Java for Beginners is for you.
- PDF + ePub + Mobi pkt
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Industrial Internet is the integration of complex physical machines and networked sensors and software. Increasing the number of sensors in industrial equipment is going to increase the data being captured, which needs to be analyzed. This book is a one-stop guide for software professionals to design, build, manage, and operate IIoT applications.
- PDF + ePub + Mobi pkt
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli
-
Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be able to determine the security state of the client's network and recommend remediations accordingly.
- PDF + ePub + Mobi pkt
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7 Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Nowadays, configuring a network and automating security protocols are quite difficult to implement. However, using Python makes it easy to automate this whole process. This book explains the process of using Python for building networks, detecting network errors, and performing different security protocols using Python Scripting.
- PDF + ePub + Mobi pkt
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity.
- PDF + ePub + Mobi pkt
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
This book will help you build real-world decentralized blockchain applications highlighting the principles of peer-to-peer systems, smart contracts, interoperability, privacy and more. You will be aware of the process flow and the growing company needs so you can incorporate and scale them in your own enterprise
- PDF + ePub + Mobi pkt
Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features
-
The purpose of the Burp Suite Cookbook is to provide web application penetration testers with hands-on examples of how to use Burp Suite to perform web assessments. The book gives detailed screenshots demonstrating how to perform various attacks in Burp including Cross-site Scripting (XSS), SQL Injection, Cross-site Request Forgery, XML External E
- PDF + ePub + Mobi pkt
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
This book will provide you with practical recipes to manage the build system using CMake. You will be taken through a series of task-based examples that demonstrate how to employ the CMake toolbox to build portable and modular code and to minimize the code complexity of the build infrastructure.
- PDF + ePub + Mobi pkt
CMake Cookbook. Building, testing, and packaging modular software with modern CMake CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Viktor Farcic’s latest book, The DevOps 2.3 Toolkit: Kubernetes, will take you on a hands-on journey with Viktor into the world of Kubernetes, and the tools not only behind the official project but also the wide-range of third-party apps that are available for you to use.
- PDF + ePub + Mobi pkt
The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale
-
Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.
- PDF + ePub + Mobi pkt
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Ethereum is an open-source, public, Blockchain-based distributed computing platform, and operating system featuring smart contract functionality which builds decentralized applications. If you want to get started with Ethereum and Solidity or you are among the many developers already working with this platform, this book is your one-stop guide.
- PDF + ePub + Mobi pkt
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Kotlin is a general purpose, object-oriented language that primarily targets the JVM and Android. Intended to be a better alternative to Java, its main goals are high interoperability with Java and increased developer productivity. Kotlin is still a new language and this book will help you to learn the core Kotlin features and get your ready for d
- PDF + ePub + Mobi pkt
Kotlin Quick Start Guide. Core features to get you ready for developing applications Kotlin Quick Start Guide. Core features to get you ready for developing applications
-
Blockchain and Bitcoin are currently the talk of the town. This book will start with an introduction to the fundamental concepts of Blockchain and it will take you through its various features and challenges. By the end of this book, you will learn to implement the Blockchain technology for securing your cryptocurrency.
- PDF + ePub + Mobi pkt
Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications
-
Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model.
- PDF + ePub + Mobi pkt
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Real-World SRE is a practical guide for surviving a system outage. Nat Welch’s step-by-step framework will help you to navigate a crisis when the stakes are high.
- PDF + ePub + Mobi pkt
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
Bitcoin is a cryptocurrency that’s changing the face of online payments. This book will help you understand everything related to Bitcoin architecture. By the end, you’ll be able to mine Bitcoins, accept Bitcoin payments, and work with the basics of Blockchain technology to create simple distributed ledgers.
- PDF + ePub + Mobi pkt
Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python
-
This book is a comprehensive guide to help developers, architects, and senior programmers advance their career in the software architecture domain. You'll understand the expectations of users and other stakeholders from the point of view of an architect and will learn to communicate your architecture to the relevant stakeholders.
- PDF + ePub + Mobi pkt
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
This book applies the core principles and ideas of Blockchain in your existing applications. You will understand the key areas of Blockchain architecture along with the challenges faced with an easy-to-follow guide. You will not only be able to solve current and future problems around Blockchain but also build efficient decentralized applications.
- PDF + ePub + Mobi pkt
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain.
- PDF + ePub + Mobi pkt
Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux
-
This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.
- PDF + ePub + Mobi pkt
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
This book covers everything the reader needs to know to get pfSense up and running, as well as how to configure core pfSense services to both secure and optimize their networks, third party packages that extend the functionality of pfSense, and the basics of diagnostics and troubleshooting networks.
- PDF + ePub + Mobi pkt
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Penetration testing is highly competitive, and it’s easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.
- PDF + ePub + Mobi pkt
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
Dlaczego cyberbezpieczeństwo jest ważne?
W dzisiejszym świecie, w którym wiele aspektów naszego życia jest związanych z technologią, zrozumienie zasad cyberbezpieczeństwa jest niezwykle istotne. Nasze książki nie tylko omawiają najważniejsze rodzaje cyberbezpieczeństwa, ale także wyjaśniają, dlaczego to zagadnienie jest tak kluczowe dla każdej organizacji i jednostki. Bowiem każdego dnia jesteśmy narażeni na różnorodne zagrożenia płynące z sieci, od nieuczciwych praktyk hakerów do przypadkowych ataków malware. W księgarni internetowej Helion.pl znajdziesz bogaty wybór książek o hakowaniu, które pomogą Ci przede wszystkim zrozumieć co to jest hakowanie, jak zostać etycznym hakerem, co to znaczy być specjalistą w dziedzinie cybersecurity oraz jak dbać o bezpieczeństwo danych.
Podstawy hackingu – książki dla początkujących specjalistów cyberbezpieczeństwa
Niezależnie od tego, czy dopiero zaczynasz swoją przygodę z cyberbezpieczeństwem, czy jesteś doświadczonym specjalistą, posiadamy książki, które sprostają Twoim oczekiwaniom. Oferujemy bogatą kolekcję książek na temat hackingu, testów penetracyjnych oraz podstaw i zaawansowanych zagadnień cyberbezpieczeństwa. Jedną z nich jest "Cybersecurity w pytaniach i odpowiedziach". Dla początkujących, polecamy także "Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności". To praktyczny poradnik hakera, w którym znajdziesz materiały wprowadzające do podstaw hackingu. Jeśli interesuje Cię, jak dbać o dane w swojej organizacji, pomocna okaże się książka "Bezpieczeństwo sieci firmowej. Kontrola ruchu wychodzącego".
Dla bardziej zaawansowanych oferujemy także publikacje na temat etycznego hackingu, takie jak "Etyczny haking. Praktyczne wprowadzenie do hakingu" oraz "Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze", które wprowadzą Cię w świat testów penetracyjnych oraz profesjonalnych wskazówek na temat tego, jak chronić się przed atakami. Dodatkowo, znajdziesz u nas kursy cyberbezpieczeństwa, które także mogą Cię zainteresować.
Odkryj świat kryptografii, socjotechnik i bezpieczeństwa danych
Jeśli jesteś osobą, która pragnie jeszcze bardziej zgłębić wiedzę w zakresie bezpieczeństwa danych i bezpieczeństwa sieci lub zainteresowała Cię informatyka śledcza, to u nas również znajdziesz książki o tej tematyce. A jeśli chcesz wiedzieć więcej o technikach manipulacji, polecamy pozycję "Socjotechnika. Sztuka zdobywania władzy nad umysłami.I". Dla zainteresowanego kryptografią polecamy "Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym". To doskonałe materiały dla profesjonalistów, którzy chcą poszerzyć swoją wiedzę i umiejętności.
Mamy nadzieję, że znalazłeś tu inspirujące pozycje, które pomogą Ci rozwijać umiejętności i wiedzę w dziedzinie hakowania i cyberbezpieczeństwa. Niezależnie od tego, czy jesteś początkującym entuzjastą, doświadczonym specjalistą, czy po prostu pragniesz zrozumieć, jak zabezpieczyć swoją prywatność online, nasza oferta książek dostarczy Ci niezbędnych zasobów i informacji. Odkrywaj tajemnice blockchaina, OSINT, IoT i chmury obliczeniowej, a także ucz się programowania w Pythonie dla bezpieczeństwa sieci. Pamiętaj, że wiedza to najważniejsze narzędzie w walce z cyberzagrożeniami. Dzięki najlepszym książkom o cyberbezpieczeństwie zdobędziesz umiejętności, które są cenione na rynku pracy. Powodzenia!