Hacking - książki
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Helion
-
Bezpieczeństwo tożsamości i danych w projektach Web
-
Przestępczość teleinformatyczna 2016
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
-
Ochrona danych osobowych. Poradnik dla przedsiębiorców
-
PDF
-
-
Digital Identity
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Rootkity i Bootkity
-
Hakowanie sztucznej inteligencji
-
Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących
Niedostępna
-
Druk
-
PDF
-
-
Certificate of Cloud Security Knowledge (CCSK v5) Study Guide. In-Depth Guidance and Practice
-
Zagrożenia informacji w cyberprzestrzeni, cyberterroryzm
-
Securing Google Cloud Platform
-
Getting Started with Google Kubernetes Engine
-
Inżynieria zabezpieczeń Tom I
-
Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Hakerzy i malarze. Wielkie idee ery komputerów
-
Druk
-
-
Learn Blue Teaming and Threat Management
-
Site Reliability Engineering Handbook
-
SnowPro Core Certification Study Guide. Build a solid foundation in Snowflake to pass the SnowPro Core exam on the first attempt
-
AWS Security Cookbook. Practical solutions for securing AWS cloud infrastructure with essential services and best practices - Second Edition
-
Mastering Honeypots
-
Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity
-
Microsoft 365 Security and Compliance for Administrators. A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture
-
Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security
-
Zero Trust Networks. 2nd Edition
-
Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices
-
Implementing DevSecOps Practices. Understand application security testing and secure coding by integrating SAST and DAST
-
Hacker Culture A to Z
-
Network Protocols for Security Professionals. Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
Python Ethical Hacking from Scratch. Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
-
Data Governance: The Definitive Guide
-
Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks
-
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
-
AWS Security Cookbook. Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
-
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
-
Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations
-
TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS
-
PDF + ePub + Mobi
-
-
Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh
-
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
-
Mastering Network Flow Traffic Analysis
-
Learning eBPF
-
Cloud Security Handbook. Effectively secure cloud environments using AWS, Azure, and GCP - Second Edition
-
Security Automation with Python. Practical Python solutions for automating and scaling security operations
-
Network Security and Cryptography. A Comprehensive Guide to Network Protection and Encryption Techniques
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Bezpieczne programowanie. Aplikacje hakeroodporne
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Microsoft Security Copilot. Master strategies for AI-driven cyber defense
-
Cyber Security Kill Chain - Tactics and Strategies. Breaking down the cyberattack process and responding to threats
-
SZYFROWANIE BEZPIECZEŃSTWO KRYPTOGRAFIA: CZĘŚĆ 1 Podstawowe pojęcia i koncepcje
-
PDF
-
-
IDS and IPS with Snort 3. Get up and running with Snort 3 and discover effective solutions to your security issues
-
Inside Cyber Warfare. 3rd Edition
-
Computer Security and Encryption. Advanced Techniques for Securing Digital Information
-
Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
PDF + ePub + Mobi
-
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Inżynieria zabezpieczeń Tom II
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Practical Cloud Security. 2nd Edition
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Certified Information Security Manager Exam Prep Guide. Gain the confidence to pass the CISM exam using test-oriented study material - Second Edition
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
-
Ochrona cyberprzestrzeni Unii Europejskiej
-
Microsoft Azure Security Technologies (AZ-500) - A Certification Guide
-
Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Cybersecurity Fundamentals
-
Modern Data Protection
-
Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Bezpieczeństwo w sieci - Jak skutecznie chronić się przed atakami
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
-
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0
-
Effective Monitoring and Alerting. For Web Operations
-
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
-
Internet Forensics
-
Etyczny hacking i testy penetracyjne. Zadbaj o bezpieczeństwo sieci LAN i WLAN
-
Druk
-
PDF
-
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Kali Linux. Testy penetracyjne. Wydanie II
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Łamanie i zabezpieczanie aplikacji w systemie iOS
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Joomla! Zabezpieczanie witryn
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Bezpieczeństwo systemu e-commerce, czyli jak bez ryzyka prowadzić biznes w internecie
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Oszukaj mnie, jeśli potrafisz. Proste sposoby przechytrzenia współczesnych kanciarzy
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Dziecko w sieci
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Amazon Web Services w akcji. Wydanie II
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Zaprojektuj bota. Tworzenie interfejsów konwersacyjnych
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-

