Kategoria Hacking w Helionie to kompendium wiedzy dla każdego, kto pragnie zgłębić tajniki cyberbezpieczeństwa, etycznego hakowania i testów penetracyjnych. Odkryj fascynujące książki i kursy o hackingu i cyberbezpieczeństwie, które przeniosą Cię w głąb sieci komputerowych, ucząc technik obrony i ataku, socjotechniki, kryptografii oraz bezpieczeństwa danych. Zanurz się w lekturze i poznaj najnowsze strategie, narzędzia i metody, które pozwolą Ci stać się ekspertem w dziedzinie bezpieczeństwa cyfrowego!
Hacking
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Helion
-
- PDF + ePub + Mobi pkt
Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools
-
Are you interested in digital forensics? Practical Windows Forensics takes a step-by-step approach to helping you understand how to perform forensic analysis on Windows-based systems. You’ll explore expert tips, techniques, and more in this hands-on guide.
- PDF + ePub + Mobi pkt
Practical Windows Forensics. Leverage the power of digital forensics for Windows systems Practical Windows Forensics. Leverage the power of digital forensics for Windows systems
-
Do you want to understand how to defend your organization and prevent vulnerabilities in your IoT ecosystem? The Practical Internet of Things Security book will show you how to do this effectively with the help of detailed explanations, examples, and expert tips.
- PDF + ePub + Mobi pkt
Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities
-
- PDF + ePub + Mobi pkt
Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks
-
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.
- PDF + ePub + Mobi pkt
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Promocja
W 2015 roku minęło osiemnaście lat od pierwszego seminarium nt. Techniczne Aspekty Przestępczości Teleinformatycznej (TAPT) zorganizowanego w Wyższej Szkole Policji w Szczytnie. Pierwsze dwie edycje seminarium gromadziły po ok. 80 uczestników, prawie wyłącznie z jednostek organizacyjnych Policji. Z czasem przybywało uczestników i w os(17,08 zł najniższa cena z 30 dni)
17.08 zł
21.35 zł(-20%) -
Promocja
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how and why everyone- ePub + Mobi pkt
Identity and Data Security for Web Development. Best Practices Identity and Data Security for Web Development. Best Practices
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data Oracle Database 12c Security Cookbook. Secure your Oracle Database 12c with this valuable Oracle support resource, featuring more than 100 solutions to the challenges of protecting your data
-
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python
-
- PDF + ePub + Mobi pkt
Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition
-
- PDF + ePub + Mobi pkt
Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide! Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!
-
- PDF + ePub + Mobi pkt
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition
-
- PDF + ePub + Mobi pkt
Practical Linux Security Cookbook. Click here to enter text Practical Linux Security Cookbook. Click here to enter text
-
- PDF + ePub + Mobi pkt
Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337 Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337
-
- PDF + ePub + Mobi pkt
Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition
-
Promocja
Publikacja składa się z trzech podstawowych części. Pierwsza z nich porusza historie rozwoju informatyki i metod zabezpieczenia informacji. W drugiej części przedstawione są aktualne rozwiązania związane z szyfrowaniem informacji, autentyfikacją użytkownika oraz omówiona została kwestia ochrony przechowywanej informacji. Ponieważ niekt&oacutBezpieczeństwo rozproszonych systemów informatycznych Bezpieczeństwo rozproszonych systemów informatycznych
(26,40 zł najniższa cena z 30 dni)
26.40 zł
33.00 zł(-20%) -
Promocja
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 Kali Linux Web Penetration Testing Cookbook. Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2
-
- PDF + ePub + Mobi pkt
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
- PDF + ePub + Mobi pkt
iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
-
- PDF + ePub + Mobi pkt
Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests
-
- PDF + ePub + Mobi pkt
Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board
-
- PDF + ePub + Mobi pkt
Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework
-
Promocja
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether yo- ePub + Mobi pkt
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis Packet Analysis with Wireshark. Leverage the power of Wireshark to troubleshoot your networking issues by using effective packet analysis techniques and performing improved protocol analysis
-
- PDF + ePub + Mobi pkt
ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around ASP.NET Web API Security Essentials. Take the security of your ASP.NET Web API to the next level using some of the most amazing security techniques around
-
- PDF + ePub + Mobi pkt
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0 Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
- PDF + ePub + Mobi pkt
Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know
-
Promocja
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provides you with the latest information on how to thwart security threats at several levels, including new areas such as microservices. You’ll learn how to help protect your app no matter where it ru- ePub + Mobi pkt
Security for Web Developers. Using JavaScript, HTML, and CSS Security for Web Developers. Using JavaScript, HTML, and CSS
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Mastering Python Forensics. Master the art of digital forensics and analysis with Python Mastering Python Forensics. Master the art of digital forensics and analysis with Python
-
- PDF + ePub + Mobi pkt
Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
-
- PDF + ePub + Mobi pkt
Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests
-
Promocja
Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical solutions that you can implement right away.Id- ePub + Mobi pkt
(80,73 zł najniższa cena z 30 dni)
80.73 zł
94.99 zł(-15%) -
- PDF + ePub + Mobi pkt
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
Promocja
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of- ePub + Mobi pkt
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
(92,65 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
Promocja
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious- ePub + Mobi pkt
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
- PDF + ePub + Mobi pkt
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
Promocja
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level s- ePub + Mobi pkt
Accumulo. Application Development, Table Design, and Best Practices Accumulo. Application Development, Table Design, and Best Practices
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Learn the data skills necessary for turning large sequencing datasets into reproducible and robust biological findings. With this practical guide, you’ll learn how to use freely available open source tools to extract meaning from large complex biological data sets.At no other point in human history has our ability to understand life’s c- ePub + Mobi pkt
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance
-
Promocja
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to cor- ePub + Mobi pkt
Hadoop Security. Protecting Your Big Data Platform Hadoop Security. Protecting Your Big Data Platform
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
Benjamin May, Cameron Buchanan, Andrew Mabbitt, Dave Mound, Terry Ip
-
- PDF + ePub + Mobi pkt
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Promocja
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own th- ePub + Mobi pkt
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
- PDF + ePub + Mobi pkt
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
- PDF + ePub + Mobi pkt
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
- PDF + ePub + Mobi pkt
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
- PDF + ePub + Mobi pkt
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
- PDF + Mobi pkt
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
- PDF + ePub + Mobi pkt
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
-
- PDF + ePub + Mobi pkt
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
- PDF + ePub + Mobi pkt
JavaScript Security. Learn JavaScript security to make your web applications more secure JavaScript Security. Learn JavaScript security to make your web applications more secure
-
- PDF + ePub + Mobi pkt
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
- PDF + ePub + Mobi pkt
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
Cyfrowy świat już nieodwołalnie wkroczył w nasze życie, lecz czy przyniósł same korzyści? Wydawało się, że wraz z rozwojem Internetu będzie się poszerzać sfera wolności, lecz stało się coś wręcz przeciwnego. Ujawniona przez Edwarda Snowdena skala powszechnego szpiegostwa z wykorzystaniem globalnej sieci Internet wskazuje, że wolności jest co
-
- PDF + ePub + Mobi pkt
Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning
-
- PDF + ePub + Mobi pkt
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual
-
- PDF + ePub + Mobi pkt
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Co to jest nowy malware i czy jest się czego bać? Cyfrowy świat już na dobre wkroczył w nasze życie, lecz czy na pewno przyniósł same dobrodziejstwa? Wielu z nas tak zauroczyło się tym cyfrowym jarmarkiem różności, że się nad tym nie zastanawia... Zagrożenia w wirtualnym świecie są bagatelizowane, a nawet świadomie ignorowane &nda
-
- PDF + ePub + Mobi pkt
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
- PDF + ePub + Mobi pkt
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
- PDF + ePub + Mobi pkt
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
- PDF + ePub + Mobi pkt
Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox
-
- PDF + ePub + Mobi pkt
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan
-
- PDF + ePub + Mobi pkt
Network Analysis using Wireshark Cookbook. This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues Network Analysis using Wireshark Cookbook. This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues
-
- PDF + ePub + Mobi pkt
Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress
-
- PDF + ePub + Mobi pkt
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
- PDF + ePub + Mobi pkt
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
- PDF + ePub + Mobi pkt
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
- PDF + ePub + Mobi pkt
VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud
-
- PDF + ePub + Mobi pkt
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
- PDF + ePub + Mobi pkt
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
- PDF + ePub + Mobi pkt
Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment
-
- PDF + ePub + Mobi pkt
SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features
-
- PDF + ePub + Mobi pkt
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
Darla Nykamp, Joseph Anderson, Jayasree Nampalli, Mari Heiser, Timothy Speed
-
- PDF + ePub + Mobi pkt
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
- PDF + ePub + Mobi pkt
Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness
-
- PDF + ePub + Mobi pkt
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
- PDF + ePub + Mobi pkt
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
- PDF + ePub + Mobi pkt
Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website
-
Ochrona danych osobowych. Poradnik dla przedsiębiorców Ochrona danych osobowych. Poradnik dla przedsiębiorców
-
- PDF + ePub + Mobi pkt
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
- PDF + ePub + Mobi pkt
SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM
-
- PDF + ePub + Mobi pkt
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
- PDF + ePub + Mobi pkt
Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
-
- PDF + ePub + Mobi pkt
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
Promocja
With this practical book, you’ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high- ePub + Mobi pkt
Effective Monitoring and Alerting. For Web Operations Effective Monitoring and Alerting. For Web Operations
(59,42 zł najniższa cena z 30 dni)
59.42 zł
69.90 zł(-15%) -
- PDF + ePub + Mobi pkt
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
- PDF + ePub + Mobi pkt
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
- PDF + ePub + Mobi pkt
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
- PDF + ePub + Mobi pkt
Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting
-
- PDF + ePub + Mobi pkt
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
-
- PDF + ePub + Mobi pkt
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Promocja
"Zakaz Stękania" to idea Michała Wawrzyniaka, z którą utożsamiają się dziesiątki tysięcy osób na świecie. Osiołek Ici Ici, który jest jej ucieleśnieniem, codziennie inspiruje ich do tego, aby: nie gadać, ale działać, nie narzekać, tylko szukać rozwiązań, wyładować i oczyścić emocje w pozytywny sposób.- PDF + ePub + Mobi pkt
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’- ePub + Mobi pkt
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
(50,91 zł najniższa cena z 30 dni)
50.91 zł
59.90 zł(-15%) -
Promocja
Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of thousands of IT profes- ePub + Mobi pkt
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
(55,24 zł najniższa cena z 30 dni)
55.24 zł
64.99 zł(-15%) -
Promocja
Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been col- ePub + Mobi pkt
Privacy and Big Data. The Players, Regulators, and Stakeholders Privacy and Big Data. The Players, Regulators, and Stakeholders
(63,74 zł najniższa cena z 30 dni)
63.74 zł
74.99 zł(-15%) -
Promocja
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Ne- ePub + Mobi pkt
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
(203,15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Promocja
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secu- ePub + Mobi pkt
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX pl- ePub + Mobi pkt
JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
(203,15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Promocja
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is- ePub + Mobi pkt
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
(84,92 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
Promocja
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Be- ePub + Mobi pkt
Beautiful Security. Leading Security Experts Explain How They Think Beautiful Security. Leading Security Experts Explain How They Think
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techn- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence- ePub + Mobi pkt
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
(84,92 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
- PDF + ePub + Mobi pkt
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Promocja
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad- ePub + Mobi pkt
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and
-
Promocja
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and kee- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Promocja
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of special- ePub + Mobi pkt
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all t- ePub + Mobi pkt
The Internet: The Missing Manual. The Missing Manual The Internet: The Missing Manual. The Missing Manual
(72,24 zł najniższa cena z 30 dni)
72.24 zł
84.99 zł(-15%)
Dlaczego cyberbezpieczeństwo jest ważne?
W dzisiejszym świecie, w którym wiele aspektów naszego życia jest związanych z technologią, zrozumienie zasad cyberbezpieczeństwa jest niezwykle istotne. Nasze książki nie tylko omawiają najważniejsze rodzaje cyberbezpieczeństwa, ale także wyjaśniają, dlaczego to zagadnienie jest tak kluczowe dla każdej organizacji i jednostki. Bowiem każdego dnia jesteśmy narażeni na różnorodne zagrożenia płynące z sieci, od nieuczciwych praktyk hakerów do przypadkowych ataków malware. W księgarni internetowej Helion.pl znajdziesz bogaty wybór książek o hakowaniu, które pomogą Ci przede wszystkim zrozumieć co to jest hakowanie, jak zostać etycznym hakerem, co to znaczy być specjalistą w dziedzinie cybersecurity oraz jak dbać o bezpieczeństwo danych.
Podstawy hackingu – książki i kursy dla początkujących specjalistów cyberbezpieczeństwa
Niezależnie od tego, czy dopiero zaczynasz swoją przygodę z cyberbezpieczeństwem, czy jesteś doświadczonym specjalistą, posiadamy książki o cyberbezpieczeństwie, które sprostają Twoim oczekiwaniom. Oferujemy bogatą kolekcję książek na temat hackingu, testów penetracyjnych oraz podstaw i zaawansowanych zagadnień cyberbezpieczeństwa. Jedną z nich jest "Cybersecurity w pytaniach i odpowiedziach". Dla początkujących, polecamy także "Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności". To praktyczny poradnik hakera, w którym znajdziesz materiały wprowadzające do podstaw hackingu. Jeśli interesuje Cię, jak dbać o dane w swojej organizacji, pomocna okaże się książka "Bezpieczeństwo sieci firmowej. Kontrola ruchu wychodzącego".
Dla bardziej zaawansowanych oferujemy także publikacje na temat etycznego hackingu, takie jak "Etyczny haking. Praktyczne wprowadzenie do hakingu" oraz "Cyberbezpieczeństwo dla zaawansowanych. Skuteczne zabezpieczenia systemu Windows, Linux, IoT i infrastruktury w chmurze", które wprowadzą Cię w świat testów penetracyjnych oraz profesjonalnych wskazówek na temat tego, jak chronić się przed atakami. Dodatkowo, znajdziesz u nas kursy cyberbezpieczeństwa, które także mogą Cię zainteresować.
Odkryj świat kryptografii, socjotechnik i bezpieczeństwa danych z książkami o hackingu i cyberbezpieczeństwie
Jeśli jesteś osobą, która pragnie jeszcze bardziej zgłębić wiedzę w zakresie bezpieczeństwa danych i bezpieczeństwa sieci lub zainteresowała Cię informatyka śledcza, to u nas również znajdziesz książki o tej tematyce. A jeśli chcesz wiedzieć więcej o technikach manipulacji, polecamy pozycję "Socjotechnika. Sztuka zdobywania władzy nad umysłami.I". Dla zainteresowanego kryptografią polecamy "Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym". To doskonałe materiały dla profesjonalistów, którzy chcą poszerzyć swoją wiedzę i umiejętności.
Mamy nadzieję, że znalazłeś tu inspirujące pozycje, które pomogą Ci rozwijać umiejętności i wiedzę w dziedzinie hakowania i cyberbezpieczeństwa. Niezależnie od tego, czy jesteś początkującym entuzjastą, doświadczonym specjalistą, czy po prostu pragniesz zrozumieć, jak zabezpieczyć swoją prywatność online, nasza oferta książek o hackingu dostarczy Ci niezbędnych zasobów i informacji. Odkrywaj tajemnice blockchaina, OSINT, IoT i chmury obliczeniowej, a także ucz się programowania w Pythonie dla bezpieczeństwa sieci. Pamiętaj, że wiedza to najważniejsze narzędzie w walce z cyberzagrożeniami. Dzięki najlepszym książkom o cyberbezpieczeństwie zdobędziesz umiejętności, które są cenione na rynku pracy. Powodzenia!
Sprawdź także książki o programowaniu w naszej ofercie.