Hacking - książki
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Helion
-
The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network
-
Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Zero Trust Overview and Playbook Introduction. Guidance for business, security, and technology leaders and practitioners
-
Burp Suite Cookbook. Web application security made easy with Burp Suite - Second Edition
-
Enhancing IoT Security
-
Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP
-
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
Advanced Penetration Testing with Kali Linux
-
Identity-Native Infrastructure Access Management
-
Attacking and Exploiting Modern Web Applications. Discover the mindset, techniques, and tools to perform modern web attacks and exploitation
-
Python for Cybersecurity Cookbook
-
Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting
-
Installation and Configuration of IBM FileNet Information Management Software
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
CompTIA Network+ Certification Guide (Exam N10-008)
-
Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively
-
Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA
-
Hands-On Kubernetes, Service Mesh and Zero-Trust
-
Internet. Hacking
-
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments
-
Practical Data Privacy
-
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
-
Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3
-
Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition
-
Security Chaos Engineering
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Get certified with ease while learning how to develop highly effective cybersecurity strategies
-
Azure Security Cookbook. Practical recipes for securing Azure resources and operations
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
Packet Tracer for young beginning admins
-
Computer Networks in Packet Tracer for intermediate users
-
Computer Networks in Packet Tracer for advanced users
-
Packet Tracer for young intermediate admins
-
Packet Tracer for young advanced admins
-
Computer Networks in Packet Tracer for beginners
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Windows APT Warfare. Identify and prevent Windows APT attacks effectively
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
360° Vulnerability Assessment with Nessus and Wireshark
-
Ochrona danych osobowych w służbach mundurowych
-
PDF + ePub + Mobi
-
-
The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Building NFTs with Ethereum
-
Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime
-
Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition
-
AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio
-
Building a Cyber Resilient Business. A cyber handbook for executives and boards
-
Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay
-
Learning Digital Identity
-
Practical Digital Forensics
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
-
CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition
-
Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud
-
Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition
-
Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Building Android Projects with Kotlin
-
Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration
-
Modern Cybersecurity Strategies for Enterprises
-
Practical Cloud Native Security with Falco
-
Learn Wireshark. A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - Second Edition
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps
-
Practical Cyber Threat Intelligence
-
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Ethical Hacker?s Penetration Testing Guide
-
Blockchain QuickStart Guide
-
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
Practical Fraud Prevention
-
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
-
Digital transformation with dataverse
-
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
Exploring Blockchain in Healthcare
-
Cybersecurity Research, Education and Management: University Perspective
-
Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Penetration Testing Azure for Ethical Hackers. Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments
-
Privilege Escalation Techniques. Learn the art of exploiting Windows and Linux systems
-
Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects
-
Twoje dziecko w sieci. Przewodnik po cyfrowym świecie dla czasami zdezorientowanych rodziców
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Learn Penetration Testing with Python 3.x
-
Cryptography and Network Security
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Hands-On Smart Contract Development with Hyperledger Fabric V2
-
Implementing Reverse Engineering
-
Penetration Testing with Kali Linux
-
Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls
-
Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects
-
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
-
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
Cybercrime and Preventive Measures
-
API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing

