Kategoria Hacking w Helionie to kompendium wiedzy dla każdego, kto pragnie zgłębić tajniki cyberbezpieczeństwa, etycznego hakowania i testów penetracyjnych. Odkryj fascynujące książki i kursy o hackingu i cyberbezpieczeństwie, które przeniosą Cię w głąb sieci komputerowych, ucząc technik obrony i ataku, socjotechniki, kryptografii oraz bezpieczeństwa danych. Zanurz się w lekturze i poznaj najnowsze strategie, narzędzia i metody, które pozwolą Ci stać się ekspertem w dziedzinie bezpieczeństwa cyfrowego!
Hacking
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Helion
-
Promocja 2za1
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.- PDF + ePub + Mobi pkt
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Promocja 2za1
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis and memory forensics.- PDF + ePub + Mobi pkt
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Promocja 2za1
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.- PDF + ePub + Mobi pkt
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Promocja 2za1
Having a knowledge of design patterns enables you, as a developer, to improve your code base, promote code reuse, and make the architecture more robust. As languages evolve, new features take time to fully understand before they are adopted en masse. The mission of this book is to ease the adoption of the latest trends and provide good practices fo- PDF + ePub + Mobi pkt
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
Promocja 2za1
This book will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do.- PDF + ePub + Mobi pkt
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
Promocja 2za1
We live in an era where cyber security plays an important role. As systems are getting smarter, we now see machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it’s important for pentesters and security researchers to understand how these systems work, and to breach them for te- PDF + ePub + Mobi pkt
Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python
-
Promocja 2za1
Wireshark is a powerful tool for network analysis, a combination of Kali Linux and the Metasploit framework. Wireshark is used to analyze the amount of data that flows through a network - it lets you see what's going on in your network. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.- PDF + ePub + Mobi pkt
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
Promocja 2za1
The Google Cloud Platform is fast emerging as a leading public cloud provider. The GCP, as it is popularly known, is backed by Google’s awe-inspiring engineering expertise and infrastructure and is able to draw upon the goodwill and respect that Google has come to enjoy. The GCP is one of a handful of public cloud providers to offer the full- PDF + ePub + Mobi pkt
Google Cloud Platform for Architects. Design and manage powerful cloud solutions Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Promocja 2za1
Web Applications are the core of any business today, and the need for specialized Application Security experts is increasing these days. Using this book, you will be able to learn Application Security testing and understand how to analyze a web application, conduct a web intrusion test, and a network infrastructure test.- PDF + ePub + Mobi pkt
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
Promocja 2za1
With concrete exercises and examples this book will help you to understand how to deploy a Hyperledger Fabric network. It then proceeds to explain the steps in developing a full fledged decentralized application. You will not only learn how to plan, design and create private networks but also evolve the network as per organizational needs.- PDF + ePub + Mobi pkt
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
Nitin Gaur, Luc Desrosiers, Venkatraman Ramakrishna, Petr Novotny, Salman A. Baset, Anthony O'Dowd
-
Promocja 2za1
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.- PDF + ePub + Mobi pkt
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260) CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Promocja 2za1
Lean Product Management is a handy guide for product managers and anyone embarking on new product development. This book will help readers to align their product strategy by identifying the most viable product, setting up and measuring time-bound metrics, developing a clear product roadmap, and eliminating waste.- PDF + ePub + Mobi pkt
Lean Product Management. Successful products from fuzzy business ideas Lean Product Management. Successful products from fuzzy business ideas
-
Promocja 2za1
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you will be- PDF + ePub + Mobi pkt
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Promocja 2za1
Microservices has evolved as one of the most tangible solutions to make effective and scalable applications. Due to its evolution from ES5 to ES6 stack, Typescript has become one of the most de facto solutions. This book will help you leverage microservices’ power to build robust architecture using reactive programming and Typescript in Node- PDF + ePub + Mobi pkt
TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js
-
Promocja 2za1
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.- PDF + ePub + Mobi pkt
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
Promocja 2za1
Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not only find flaws but also strengthen the security of- PDF + ePub + Mobi pkt
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
Promocja 2za1
With constantly changing business requirements and technical environments, the code needs to evolve too. Building applications using test-driven development process ensures that they work properly irrespective of such changes. In this book, you will learn to make such robust and production-ready applications with C# and .NET.- PDF + ePub + Mobi pkt
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
Promocja 2za1
A key problem of software development today is the software bloat, where huge toolchains and development environments are needed in software coding and deployment. Red significantly reduces this bloat by offering a minimal but complete toolchain. This is the first introductory book on Red, and it will get you up and running as quickly as possible.- PDF + ePub + Mobi pkt
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
Promocja 2za1
pfSense is open source router/firewall software based on FreeBSD. This book shows how to install and customize pfSense in a variety of scenarios, providing many concrete examples.- PDF + ePub + Mobi pkt
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
Promocja 2za1
This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.- PDF + ePub + Mobi pkt
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Promocja 2za1
Windows Server 2016 is an operating system designed to run on today’s highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the s- PDF + ePub + Mobi pkt
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016 Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Promocja 2za1
Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to you. Yo- PDF + ePub + Mobi pkt
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Promocja 2za1
Serverless architectures allow you to build and run applications and services without having to manage the infrastructure. Many companies have adopted this architecture to save cost and improve scalability. This book will help you design serverless architectures for your applications with AWS and Python.- PDF + ePub + Mobi pkt
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Promocja 2za1
Organizations have started to adapt to hybrid cloud solutions in order to leverage advantages such as untested workloads, cloud-bursting, cloud service brokering, and more. The major goal of this book is to help developers maximize their existing skills and overcome the complexities of developing flexible and unified apps on the cloud.- PDF + ePub + Mobi pkt
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Promocja 2za1
Serverless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes. For good reason, serverless-based applications handle many of the problems developers face when running systems and servers such as fault-tolerance, centralized logging, horizontal scalability, and deployments, to name a few. Ad- PDF + ePub + Mobi pkt
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Promocja 2za1
Kubernetes provides a means to describe what your application needs and how it should run by orchestrating containers on your behalf to operate your software across a single, dozens, or hundreds of machines. Originally created and open sourced from Google, you can use their technology to help run, test, and scale your applications regardless of whi- PDF + ePub + Mobi pkt
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Promocja 2za1
Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. The blockchain technology is the backbone of cryptocurrency and it is gaining popularity with people who work in the finance, government, and arts sectors. This book is an up-to-date, one-stop guide to this leading technology and its implementation- PDF + ePub + Mobi pkt
Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition
-
Promocja 2za1
This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. By the end of this book, you’ll know how to analyze the traffic, find patterns of various offending tra- PDF + ePub + Mobi pkt
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Promocja
Promocja 2za1
Oto Franek Runtime skompromitowany eks-komisarz, bezduszny detektyw, ekspert poszukiwań. Gdy komenda główna policji zostaje obrabowana, to Franek Runtime i jego niezwykłe umiejętności pozwolą schwytać winnych. W tym opowiadaniu kryminalnym dowiesz się jak korzystać z narzędzi algorytmicznych, aby rozwiązać sprawę. Franek Runtime binarnie prz- ePub + Mobi pkt
Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach
(51,20 zł najniższa cena z 30 dni)
51.20 zł
64.00 zł(-20%) -
Promocja 2za1
Continuous deployment and Agile methodology have enabled huge advances in modern applications. This book will enable the reader to make use of this rapidly evolving technology to build highly scalable applications within AWS using different architectures.- PDF + ePub + Mobi pkt
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
Promocja 2za1
VMware NSX is a software-based networking and security virtualization platform that delivers an operational model of a virtual machine for the network. By virtualizing the network, NSX breaks through current physical network barriers and enables data center operators to achieve better speed and agility with reduced costs.- PDF + ePub + Mobi pkt
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
Promocja 2za1
In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best security- PDF + ePub + Mobi pkt
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Promocja 2za1
Viktor Farcic’s latest book, The DevOps 2.2 Toolkit: Self-Sufficient Docker Clusters, takes you deeper into Docker, teaching you with a mixture of theory and hands-on how to successfully build both self-adaptive and self-healing-based systems.- PDF + ePub + Mobi pkt
The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters
-
Promocja 2za1
Customizing networks and controlling the traffic flow is becoming a must for all the modern solutions, even if these solutions exist on Azure, on-premises or a combination of both.In this book, you will learn all Azure networking solutions and spanning them across Azure and On-premises, and how to build a highly available environment by them.- PDF + ePub + Mobi pkt
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions
-
Promocja 2za1
This book covers everything you need to set up a Kali Linux lab, the latest generation of the BackTrack Linux penetration testing and security auditing Linux distribution. Learn how to use the hundred tools Kali Linux has so you can manage security tasks such as penetration testing, forensics, and reverse engineering.- PDF + ePub + Mobi pkt
Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition
-
Promocja 2za1
Agile software development helps to minimize the risk of failure in product development, as it enables you to quickly adapt to the changing environment and the varying needs of your customers, by improving your communication and collaboration skills.- PDF + ePub + Mobi pkt
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Promocja 2za1
Python is a very powerful, high-level, object-oriented programming language. It has swiftly developed over the years to become the language of choice for software developers due to its simplicity. This book takes you through varied and real-life projects. The examples start with the basics and gradually increase in complexity, helping boost your sk- PDF + ePub + Mobi pkt
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
Promocja 2za1
This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices , modern operating systems and help you secure high security environments.- PDF + ePub + Mobi pkt
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Promocja 2za1
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with Insigh- PDF + ePub + Mobi pkt
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal
-
Promocja 2za1
Ethereum is a public, blockchain-based distributed computing platform featuring smart contract functionality. In this book, you’ll learn about Ethereum and Smart Contracts, and we cover the Ethereum virtual machine (EVM) in detail. Then, you’ll get acquainted with DApps and DAOs and they how work. At the end of this book, we discuss B- PDF + ePub + Mobi pkt
Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity Ethereum Smart Contract Development. Build blockchain-based decentralized applications using solidity
-
Promocja 2za1
Test-Driven Development (TDD) is a methodology that helps you to write as little as code as possible to satisfy the software requirements, and that what you've written does what its supposed to do. If you're looking for a practical resource on Test-Driven Development this is the book for you. You've found a practical end to end guide that will help- PDF + ePub + Mobi pkt
Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript Practical Test-Driven Development using C# 7. Unleash the power of TDD by implementing real world examples under .NET environment and JavaScript
-
Promocja 2za1
AWS is currently the market leader in the public cloud market.With the increasing global interest in leveraging cloud infrastructure, AWS Cloud from Amazon offers a cutting-edge platform for architecting, building, and deploying web-scale cloud applications. This book will help you in performing these tasks easily.- PDF + ePub + Mobi pkt
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Promocja 2za1
Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic forensics- PDF + ePub + Mobi pkt
Security with Go. Explore the power of Golang to secure host, web, and cloud services Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Promocja 2za1
Jira Software is an agile project management tool that supports any agile methodology, be it scrum, Kanban, or your own unique flavor. From agile boards to reports, you can plan, track, and manage all your agile software development projects from a single tool. Jira Software brings the power of agile methodology to Atlassian Jira.With this practica- PDF + ePub + Mobi pkt
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Promocja 2za1
With cybercrime on a rise, cybersecurity has become extremely vital to industries. Companies have started adopting more stringent ways of preventing system breaches. This book will explore Red Team tactics that can be used in penetration for accessing sensitive data and Blue Team tactics that can help you defend your system from complex attacks.- PDF + ePub + Mobi pkt
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Promocja 2za1
Kotlin has been the buzzword among developers ever since the release of new features in Kotlin 1.1. With Google's announcement of introducing first class support for Kotlin in their Android ecosystem, it's high time that Kotlin is realized as a mainstream language. Microservices aids in designing scalable, easy-to-maintain web applications. If you- PDF + ePub + Mobi pkt
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0 Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Promocja 2za1
Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics, Second Edition and it delves into the concepts of mobile forensics and its importance in today’s world.- PDF + ePub + Mobi pkt
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
-
Promocja 2za1
The Selenium WebDriver 3.x Technology is an open source API available to test both Browser and Mobile applications. It is completely platform independent in that tests built for 1 browser or mobile device will also work on all other browsers and mobile devices. The technology supports all major development languages which allows it to be tied direc- PDF + ePub + Mobi pkt
Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG Selenium Framework Design in Data-Driven Testing. Build data-driven test frameworks using Selenium WebDriver, AppiumDriver, Java, and TestNG
-
Promocja 2za1
For the past couple of decades, Linux has been extremely popular with systems administrators, for everything from creating networks and servers to automating their entire working environment. However, security has always been the major concern. With not many resources available in the Linux security domain, this book will be an invaluable resource- PDF + ePub + Mobi pkt
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Promocja 2za1
Modern day businesses and enterprises are moving to cloud simply to improve efficiency and speed, achieve flexibility and cost-effectiveness, and for on-demand cloud services. However, enterprise cloud security remains a major concern for many businesses because migrating to the public cloud requires transferring some control over organizational as- PDF + ePub + Mobi pkt
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Promocja 2za1
A step-by-step guide to quickly set up Jenkins across various platforms and create a Continuous Integration and Continuous Delivery pipeline using all the new features introduced in Jenkins 2.x such as Pipeline as a Code, Multibranch pipeline, Blue Ocean Plugin, and more.- PDF + ePub + Mobi pkt
Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition
-
Promocja 2za1
This book brings with it an array of practical recipes for performing forensic examinations on mobile devices. It will show you how to treat data extraction, recovering, and decoding data on the mobile operating systems such as Android, iOS, Windows Mobile, and BlackBerry OS.- PDF + ePub + Mobi pkt
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Promocja 2za1
Wireshark is a popular and powerful tool used to analyze the bits and bytes that are flowing through a network. Packet captures displayed in Wireshark give you an insight into the security and flaws of different protocols, which will help you perform the security research and protocol debugging.- PDF + ePub + Mobi pkt
Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively Wireshark Revealed: Essential Skills for IT Professionals. Get up and running with Wireshark to analyze your network effectively
-
Promocja 2za1
The security of wireless networks is more important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking features of Kali Linux.- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Promocja 2za1
Security automation is one of the most interesting skills to have nowadays. With over 750 automation modules, Ansible makes it easy for you to secure any part of your system—be it setting firewalls, providing authentication to users and groups, or setting custom security policies. It allows you to write automation procedures once and use the- PDF + ePub + Mobi pkt
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
Promocja 2za1
: Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.- PDF + ePub + Mobi pkt
Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks
-
Promocja 2za1
IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices. You will learn how to identify vulnerabilities in IoT device architect- PDF + ePub + Mobi pkt
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Promocja 2za1
Penetration testing is the use of tools and code to attack a system in order to assess its vulnerabilities to external threats. Python allows pen testers to create their own tools.This book provides quick Python recipes to let defense analysts work on their own on the path to discovering, and recovering from, vulnerabilities.- PDF + ePub + Mobi pkt
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Promocja 2za1
The Lean methodology is a hit in startup land. It’s a movement that keeps growing – it will soon be the ultimate methodology for creating a startup that succeeds. That may sound great from a theoretical point of view, but what does that mean for you as an Android or iOS developer? By adopting Lean development principles, it’s- PDF + ePub + Mobi pkt
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Promocja 2za1
Spring Security 4.2 is an incremental guide that will teach you how to protect your application from malicious users. Through this book, you will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples.- PDF + ePub + Mobi pkt
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Promocja 2za1
Since its inception, Git has attracted skilled developers due to its robust, powerful, and reliable features. It's incredibly fast branching ability transformed a piece of code from a niche tool for former Linux Kernel developers into a mainstream distributed versioning system. This book will help you overcome this fear and become adept in all the- PDF + ePub + Mobi pkt
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Promocja 2za1
Java Programming for Beginners is an excellent introduction to the world of Java programming, taking you through the basics of Java syntax and the complexities of object-oriented programming. Whether you’re a beginner to programming, or approaching an object-oriented language for the first time, this book delivers the focused training you ne- PDF + ePub + Mobi pkt
Java Programming for Beginners. Learn the fundamentals of programming with Java Java Programming for Beginners. Learn the fundamentals of programming with Java
-
Promocja 2za1
This book will focus on the most latest release of Jenkins that is 2.32, with the latest features such as pipeline as code, new setup experience, and improved UI. With all new pipeline as code you will be able to build simple or advanced pipeline easily and rapidly, hence improving your teams productivity.- PDF + ePub + Mobi pkt
Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition Jenkins 2.x Continuous Integration Cookbook. Over 90 recipes to produce great results using pro-level practices, techniques, and solutions - Third Edition
-
Promocja 2za1
Security is a key ingredient when it comes to workloads deployed in cloud. Security is highest priority for any organization and it is considered job zero at AWS. Our book will dig deep into the achieving end to end automated security for all workloads deployed, running and stored in AWS cloud.- PDF + ePub + Mobi pkt
Mastering AWS Security. Create and maintain a secure cloud ecosystem Mastering AWS Security. Create and maintain a secure cloud ecosystem
-
Promocja 2za1
OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications.- PDF + ePub + Mobi pkt
OAuth 2.0 Cookbook. Protect your web applications using Spring Security OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Promocja 2za1
With ever-improving and ever-changing cyber threats, businesses need to be on their toes to ensure their safety. This comprehensive book takes you from understanding the basics of cyber security and industrial protocols to building robust industrial control systems. Through real-world scenarios, you will understand vulnerabilities and will be equip- PDF + ePub + Mobi pkt
Industrial Cybersecurity. Efficiently secure critical infrastructure systems Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Promocja 2za1
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book will be packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) as per your requirements and move on to core functionalities.- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Promocja 2za1
Learn about design patterns and best practices required with the Spring Framework to solve common problems when designing an application or system. This book not only covers the essential GoF design patterns but also those patterns, considerations, and best practices required at different stages in Application Development. It will demonstrate the R- PDF + ePub + Mobi pkt
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Promocja 2za1
Odoo is a Python-based ERP system and is completely open source. Odoo is a comprehensive suite of business applications offering a wealth of functionalities that can be deployed to meet your business needs.- PDF + ePub + Mobi pkt
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Promocja 2za1
Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed for the present while keeping the future in mind. This book talks about how to design and implement enterprise ne- PDF + ePub + Mobi pkt
Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs
-
Promocja 2za1
In Understanding Software, Max Kanat-Alexander, Technical Lead for Code Health at Google, brings you his writings and thoughts so that your code and your life as a developer can be healthy, avoid complexity, and embrace simplicity. Why make life hard when making software can be simple?- PDF + ePub + Mobi pkt
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
Promocja 2za1
The Junos automation toolkit is part of the standard Junos OS available on all switches, routers, and security devices running Junos OS. Junos automation simplifies complex configurations and reduces potential configuration errors.This book is a set of powerful recipes that will cover all you need to know about implementing Junos Automation to auto- PDF + ePub + Mobi pkt
JUNOS Automation Cookbook. Automate network devices on Juniper's operating system JUNOS Automation Cookbook. Automate network devices on Juniper's operating system
-
Promocja 2za1
With rapid adaptation of the cloud platform, the need for cloud certification has also increased. This is your one stop solution and will help you transform yourself from zero to certified. This guide will help you gain technical expertise in the AWS platform and help you start working with various AWS Services.- PDF + ePub + Mobi pkt
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Promocja 2za1
Go is a modern systems programming language, which allows the creation of systems applications and modules just above any kernel, e.g. Linux, and container, e.g. Docker. This book explains thread-safe and concurrent Go, and goes into writing server, cloud and systems-level applications. No more C style memory management, for instance. If you want t- PDF + ePub + Mobi pkt
Go Systems Programming. Master Linux and Unix system level programming with Go Go Systems Programming. Master Linux and Unix system level programming with Go
-
Promocja 2za1
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need fo- PDF + ePub + Mobi pkt
Kali Linux Cookbook. Effective penetration testing solutions - Second Edition Kali Linux Cookbook. Effective penetration testing solutions - Second Edition
-
Promocja 2za1
Microsoft’s launch of Windows 10 is a step toward satisfying the enterprise administrator’s needs for management and user experience customization. This book provides the enterprise administrator with the knowledge needed to fully utilize the advanced feature set of Windows 10 Enterprise.- PDF + ePub + Mobi pkt
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Promocja
Promocja 2za1
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how you- ePub + Mobi pkt
Network Security Through Data Analysis. From Data to Action. 2nd Edition Network Security Through Data Analysis. From Data to Action. 2nd Edition
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja 2za1
C++ has come a long way and has now been adopted in several contexts. Its key strengths are its software infrastructure and resource-constrained applications. The C++ 17 release will change the way developers write code and this book will help you master your developing skills with C++.- PDF + ePub + Mobi pkt
Mastering C++ Programming. Modern C++ 17 at your fingertips Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Promocja 2za1
Imagine creating and testing Java EE applications on Apache Tomcat Server or Wildfly Application Server in minutes along with deploying and managing Java applications swiftly. Sounds too good to be true? But you have a reason to cheer as such scenarios are only possible by leveraging Docker and Kubernetes.- PDF + ePub + Mobi pkt
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Promocja 2za1
Everything humans interact with has an experience associated with it. Some are good, some are bad, but only recently have we begun to consciously design these experiences. We are now at a point in time when experience-design has suddenly exploded into the consciousness of business people and ordinary people all over the world. This book addressees- PDF + ePub + Mobi pkt
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Promocja 2za1
Serverless architecture allows you to build and run applications and services without having to manage the infrastructure. Many companies have started adopting serverless architecture for their applications to save costs and improve scalability. This book will give you all the information you need to set up and deploy applications to Azure Serverle- PDF + ePub + Mobi pkt
Serverless computing in Azure with .NET. Build, test, and automate deployment Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Promocja 2za1
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. Whether talking about digital forensics conducted by law enforcement or a corporate security department, the simple fact is that forens- PDF + ePub + Mobi pkt
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Promocja 2za1
Got some experience of Angular under your belt? Want to learn everything about using advanced features for developing websites? This book is everything you need for the deep understanding of Angular that will set you apart from the developer crowd.Angular has introduced a new way to build applications. Creating complex and rich web applications, wi- PDF + ePub + Mobi pkt
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula
-
Promocja 2za1
This book is an all-purpose toolkit for your programming career. It is split up into three main topic areas: Coder Skills, Freelancer Skills, and Career Skills to help you identify and answer the key questions and stumbling blocks that programmers encounter. It is a comprehensive guide containing more than 50 insights and methodologies that you can- PDF + ePub + Mobi pkt
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Promocja 2za1
Java is a powerful language that has applications in a wide variety of fields. Right from playing games on your computer to performing banking transactions, Java is at the heart of everything. With this book, you will get a deep understanding of this robust programming language and how it can make your life easier. This collection of projects will- PDF + ePub + Mobi pkt
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Promocja 2za1
Metasploit for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. This book would help the reader absorb the essential concepts on using Metasploit framework for comprehensive penetration testing. By the end of the book, the reader would feel confident- PDF + ePub + Mobi pkt
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Promocja 2za1
Over the past years, all kind of companies from start-ups to giant enterprises started their move to public cloud providers in order to save their costs and reduce the operation effort needed to keep their shops open. Now it is even possible to craft a complex software system consisting of many independent micro-functions that will run only when th- PDF + ePub + Mobi pkt
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Promocja 2za1
Mastering Kali Linux for Advanced Penetration Testing will provide you with a number or proven techniques to defeat the latest defences on the networks using Kali Linux. From selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Promocja 2za1
Spring 5.0 is due to arrive with a myriad of new and exciting features that will change the way we’ve used the framework so far. This book will show you this evolution—from solving the problems of testable applications to building distributed applications on the Cloud.- PDF + ePub + Mobi pkt
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Promocja 2za1
Kali Linux 2016.2 is the next generation of Back Track 5, which is one of the best open-source penetration tool kits. Mastering Kali Linux for Web Penetration Testing will assist you in responsibly exposing identifying, and disclosing weaknesses and flaws in web applications at all stages of development.- PDF + ePub + Mobi pkt
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Promocja 2za1
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.- PDF + ePub + Mobi pkt
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
Promocja 2za1
DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and the IT operations team. The main goal of DevOps is to automate the software development process with proper processes that involve people to change the culture. This book will follow a bootcamp approach, which will- PDF + ePub + Mobi pkt
-
Promocja 2za1
With the ever-increasing amount of data flowing in today’s world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2- PDF + ePub + Mobi pkt
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Promocja 2za1
Akka is an open source toolkit that simplifies the construction of distributed and concurrent applications on the JVM. This book will teach you how to develop reactive applications in Scala using the Akka framework.- PDF + ePub + Mobi pkt
Akka Cookbook. Recipes for concurrent, fast, and reactive applications Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Promocja 2za1
Do you want to create better products and innovative solutions? User experience maps will help you understand users, gain strategic insights, and improve communication with stakeholders. Maps can also champion user-centricity within the organizationTwo advanced mapping techniques will be revealed for the first time in print, the behavioural change- PDF + ePub + Mobi pkt
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Promocja 2za1
This is the second edition of ‘Nmap 6: Network Exploration and Security Auditing Cookbook’. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security audit- PDF + ePub + Mobi pkt
Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition Nmap: Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Second Edition
-
Promocja 2za1
Metasploit Bootcamp will enable readers to gain hands-on knowledge on Penetration testing with Metasploit in various environments using a boot camp style approach. The readers will learn about Scanning, fingerprinting and exploiting different software. They will also learn about testing on services like Databases, VOIP and other known and unknown s- PDF + ePub + Mobi pkt
Metasploit Bootcamp. The fastest way to learn Metasploit Metasploit Bootcamp. The fastest way to learn Metasploit
-
Promocja 2za1
This book will walk you through all the concepts and tools that Microsoft Azure has to offer and how these can be used in the DevOps environment. You will be introduced to use and management of Visual Studio Team Services (VSTS), so that you can understand the structure of the application that we will use as a sample throughout the book. You will u- PDF + ePub + Mobi pkt
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Promocja 2za1
Software architecture or creating a blueprint design for a particular software application is not a walk in the park. The two biggest challenges in software architecture are keeping architecture in sync, first, with the requirements as they are uncovered or evolve and, next, with the implementation as it gets built and evolves.- PDF + ePub + Mobi pkt
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Promocja 2za1
Microsoft .NET has always been the preferred framework for developing Enterprise applications that target the Windows platform. However, the release of .NET Core empowers senior developers and enterprise architects to think out of the box, and use .NET Core to design and develop robust applications that target multiple platforms.- PDF + ePub + Mobi pkt
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Promocja 2za1
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo- PDF + ePub + Mobi pkt
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Promocja 2za1
Walmart’s OneOps is an open source DevOps platform that is used for cloud and application lifecycle management. It can manage critical and complex application workload on any multi cloud-based infrastructure and revolutionizes the way administrators, developers, and engineers develop and launch new products.- PDF + ePub + Mobi pkt
-
Promocja
Promocja 2za1
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, to- ePub + Mobi pkt
Defensive Security Handbook. Best Practices for Securing Infrastructure Defensive Security Handbook. Best Practices for Securing Infrastructure
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja 2za1
In this short book, we take an in-depth look at lambdas in Java and their supporting features. It covers essential topics, such as functional interfaces and type inference, and the key differences between lambdas and closures.- PDF + ePub + Mobi pkt
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
Promocja 2za1
Software testing is a crucial aspect of any development process if one wants to build a high-quality product. With the increase in app usage, the need for testing has only grown leaps and bounds.- PDF + ePub + Mobi pkt
Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains
-
Promocja 2za1
Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. Mastering Blockchain is a comprehensive guide to this leading, cutting-edge technology and its implementation in the real world.- PDF + ePub + Mobi pkt
Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks
-
Promocja 2za1
- PDF + ePub + Mobi pkt
-
Promocja 2za1
QGIS is a desktop geographic information system that facilitates data viewing, editing, and analysis. Based on version QGIS 2.18, this book will teach you how to write Python code that works with spatial data to automate geoprocessing tasks in QGIS.- PDF + ePub + Mobi pkt
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
Promocja 2za1
- PDF + ePub + Mobi pkt
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
Promocja 2za1
- PDF + ePub + Mobi pkt
Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool Zabbix: Enterprise Network Monitoring Made Easy. Ultimate open source, real-time monitoring tool
-
Promocja 2za1
- PDF + ePub + Mobi pkt
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights .NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
Promocja 2za1
- PDF + ePub + Mobi pkt
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Promocja 2za1
- PDF + ePub + Mobi pkt
Penetration Testing: A Survival Guide. A Survival Guide Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran
-
Promocja
Promocja 2za1
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other informatio- ePub + Mobi pkt
The Internet of Risky Things. Trusting the Devices That Surround Us The Internet of Risky Things. Trusting the Devices That Surround Us
(92,65 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
Promocja 2za1
- PDF + ePub + Mobi pkt
Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition
-
Promocja
Promocja 2za1
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’ll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities,- ePub + Mobi pkt
Network Security Assessment. Know Your Network. 3rd Edition Network Security Assessment. Know Your Network. 3rd Edition
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja 2za1
The second edition of Penetration Testing with Raspberry Pi will show you how to use Raspberry Pi 3 to develop a portable, cost-efficient hacking tool with Kali Linux 2. You’ll be able to get hands-on with pentesting and explore a variety of essential techniques.- PDF + ePub + Mobi pkt
Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition Penetration Testing with Raspberry Pi. A portable hacking station for effective pentesting - Second Edition
-
Promocja 2za1
- PDF + ePub + Mobi pkt
Docker Networking Cookbook. Click here to enter text Docker Networking Cookbook. Click here to enter text
-
Promocja
Promocja 2za1
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja 2za1
- PDF + ePub + Mobi pkt
Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does! Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!
Dlaczego cyberbezpieczeństwo jest ważne?
W dzisiejszym świecie, w którym wiele aspektów naszego życia jest związanych z technologią, zrozumienie zasad cyberbezpieczeństwa jest niezwykle istotne. Nasze książki nie tylko omawiają najważniejsze rodzaje cyberbezpieczeństwa, ale także wyjaśniają, dlaczego to zagadnienie jest tak kluczowe dla każdej organizacji i jednostki. Bowiem każdego dnia jesteśmy narażeni na różnorodne zagrożenia płynące z sieci, od nieuczciwych praktyk hakerów do przypadkowych ataków malware. W księgarni internetowej Helion.pl znajdziesz bogaty wybór książek o hakowaniu, które pomogą Ci przede wszystkim zrozumieć co to jest hakowanie, jak zostać etycznym hakerem, co to znaczy być specjalistą w dziedzinie cybersecurity oraz jak dbać o bezpieczeństwo danych.
Podstawy hackingu – książki i kursy dla początkujących specjalistów cyberbezpieczeństwa
Niezależnie od tego, czy dopiero zaczynasz swoją przygodę z cyberbezpieczeństwem, czy jesteś doświadczonym specjalistą, posiadamy książki o cyberbezpieczeństwie, które sprostają Twoim oczekiwaniom. Oferujemy bogatą kolekcję książek na temat hackingu, testów penetracyjnych oraz podstaw i zaawansowanych zagadnień cyberbezpieczeństwa. Jedną z nich jest "Cybersecurity w pytaniach i odpowiedziach". Dla początkujących, polecamy także "Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności". To praktyczny poradnik hakera, w którym znajdziesz materiały wprowadzające do podstaw hackingu. Jeśli interesuje Cię, jak dbać o dane w swojej organizacji, pomocna okaże się książka "Bezpieczeństwo sieci firmowej. Kontrola ruchu wychodzącego".
Dla bardziej zaawansowanych oferujemy także publikacje na temat etycznego hackingu, takie jak "Etyczny haking. Praktyczne wprowadzenie do hakingu" oraz "Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze", które wprowadzą Cię w świat testów penetracyjnych oraz profesjonalnych wskazówek na temat tego, jak chronić się przed atakami. Dodatkowo, znajdziesz u nas kursy cyberbezpieczeństwa, które także mogą Cię zainteresować.
Odkryj świat kryptografii, socjotechnik i bezpieczeństwa danych z książkami o hackingu i cyberbezpieczeństwie
Jeśli jesteś osobą, która pragnie jeszcze bardziej zgłębić wiedzę w zakresie bezpieczeństwa danych i bezpieczeństwa sieci lub zainteresowała Cię informatyka śledcza, to u nas również znajdziesz książki o tej tematyce. A jeśli chcesz wiedzieć więcej o technikach manipulacji, polecamy pozycję "Socjotechnika. Sztuka zdobywania władzy nad umysłami.I". Dla zainteresowanego kryptografią polecamy "Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym". To doskonałe materiały dla profesjonalistów, którzy chcą poszerzyć swoją wiedzę i umiejętności.
Mamy nadzieję, że znalazłeś tu inspirujące pozycje, które pomogą Ci rozwijać umiejętności i wiedzę w dziedzinie hakowania i cyberbezpieczeństwa. Niezależnie od tego, czy jesteś początkującym entuzjastą, doświadczonym specjalistą, czy po prostu pragniesz zrozumieć, jak zabezpieczyć swoją prywatność online, nasza oferta książek o hackingu dostarczy Ci niezbędnych zasobów i informacji. Odkrywaj tajemnice blockchaina, OSINT, IoT i chmury obliczeniowej, a także ucz się programowania w Pythonie dla bezpieczeństwa sieci. Pamiętaj, że wiedza to najważniejsze narzędzie w walce z cyberzagrożeniami. Dzięki najlepszym książkom o cyberbezpieczeństwie zdobędziesz umiejętności, które są cenione na rynku pracy. Powodzenia!
Sprawdź także książki o programowaniu w naszej ofercie.