Bezpieczeństwo sieci
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo sieci dostępne w księgarni Helion
-
Promocja Promocja 2za1
This guide to SASE services is for those implementing SD-WAN, SASE, cloud infrastructure, remote access, or integrating a multi-cloud strategy that may or may not include edge computing solutions. This book shows the past, present, and future of SASE and how you can learn today and prepare for the future.- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
Promocja Promocja 2za1
This audiobook will take you through some key cybersecurity job roles and teach you the important technical and behavioral questions that will help you pass the interview, land the job, and grow in your cybersecurity career.- PDF + ePub
- Audiobook MP3 pkt
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
Kenneth Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Malware analysis is a powerful investigation technique widely used in various information security areas including digital forensics and incident response processes. With the help of this book, you’ll be able to use practical examples and comprehensive insights to analyze any type of malware you may encounter within the modern world.- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
While penetration testing is highly competitive, it’s easy to be stuck in a monotonous routine client after client. This book will provide hands-on experience with penetration testing while guiding you through the behind-the-scenes action along the way.- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
Promocja Promocja 2za1
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
Promocja Promocja 2za1
By taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the- PDF + ePub
- Audiobook MP3 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
Promocja Promocja 2za1
Microsoft Defender for Cloud is an infrastructure management system that enhances security status and provides threat protection of hybrid workloads in the cloud. Microsoft Defender for Cloud Cookbook provides comprehensive coverage of Microsoft Defender for Cloud features and capabilities as well as hands-on and implementation guides and examples.- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
Promocja Promocja 2za1
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.- PDF + ePub pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam's objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł(-10%) -
Promocja Promocja 2za1
This book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.- PDF + ePub
- Audiobook MP3 pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
Promocja Promocja 2za1
W książce Ochrona cyberprzestrzeni Unii Europejskiej autorka analizuje działania podjęte przez Unię Europejską w ramach polityki ochrony cyberprzestrzeni przez UE jako obowiązku zabezpieczenia wspólnej przestrzeni bezpieczeństwa informacyjnego UE w obliczu współczesnych zagrożeń. Przeanalizowana została również aktualna strategia cyberbezpieczeństw- ePub + Mobi pkt
(48,98 zł najniższa cena z 30 dni)
63.20 zł
79.00 zł(-20%) -
Promocja Promocja 2za1
This book is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
With over 1000 practice questions, explanations of all 8 domains, and 2 full exams, this book is a fantastic exam prep solution. Take the CISSP exam (version May 2021) confidently with the help of mock questions and detailed solutions and validate your skills with the CISSP (ISC)2 certification.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Cybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.- PDF + ePub + Mobi
- Audiobook MP3 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
(29,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
Promocja Promocja 2za1
Książka „Bezpieczny senior w Internecie” to poradnik, dedykowany nie tylko osobom starszym, ale również wszystkim czytelnikom bez względu na stopień zaawansowania informatycznego. Jest to kolejna pozycja po poprzednich tytułach naszego wydawnictwa: Smartfon, Laptop i Internet również dla seniora, które w podstawowy- PDF + ePub + Mobi pkt
(18,90 zł najniższa cena z 30 dni)
29.78 zł
45.00 zł(-34%) -
Promocja Promocja 2za1
If you’re a designer working with Revit, this Autodesk Revit book will guide you through improving productivity and efficiency in your day-to-day tasks. With the help of this book, you'll be able to set up your Revit projects, explore Revit's core functionalities, use Dynamo for visual programming, and leverage Power BI to analyze BIM inform- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Zscaler Cloud Security Essentials will show you how to leverage the power of Zscaler by jumping right into the design, deployment, and support of a customized Zscaler solution. You'll discover the capabilities of Zscaler through real-world deployment and explore Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) in detail.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
This book covers the finer details of microcontrollers and low-powered embedded device programming with TinyGo. You’ll work through a range of interactive and real-world embedded projects that will help you to build creative thinking and understand a variety of TinyGo features and capabilities for programming hardware and multiple input devi- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
Whether you are a tester or a developer working with APIs, you'll be able to put your knowledge to work with this practical guide to using Postman. The book provides a hands-on approach to implementing and learning the associated methodologies that will have you up-and-running and productive in no time.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
Promocja Promocja 2za1
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
Promocja Promocja 2za1
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manag- ePub + Mobi pkt
(83,07 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja Promocja 2za1
AWS is a very popular cloud service that many organizations are implementing into their infrastructure. AWS Penetration Testing is a comprehensive introduction for those who are new to AWS and Ethical hacking, that will have you up-to-speed in no time.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Kubernetes is a widely used opensource orchestration platform for managing container applications. Developers are not yet aware of the pitfalls of a containerized environment. This book takes you through core security principles, best practices, and real-world use cases to learn mitigation or prevention strategies from known attacks and CVEs.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator.- PDF + ePub + Mobi
- Audiobook MP3 pkt
(29,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
Promocja Promocja 2za1
Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
Promocja Promocja 2za1
Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and Windows 10.- PDF + ePub + Mobi pkt
Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Azure Sentinel is an intelligent security service from Azure where Microsoft's main focus on developing sentinel is to integrate and bring together cloud security and artificial intelligence into effect. Here readers will gain enough understanding to make the most of Azure services to secure their environment from modern cybersecurity threats.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
Hands-On Restful Web Services with Go will help you in understanding the fundamentals of REST and enable you to quickly develop graceful API with the help of Golang's open-source tools and libraries. It can be a developer guide in general that covers all key aspects of API development and standard architecture patterns in application development.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
AWS Security Cookbook lists all the practical solutions to the common problems faced by individuals or organizations in securing their instances. Here readers will learn to troubleshoot security concerns and understand additional patterns and services for securing AWS infrastructure.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
Promocja Promocja 2za1
Cyber Warfare – Truth, Tactics, and Strategies takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools and strategies presented for you to learn how to think about defendin- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
Promocja Promocja 2za1
The MS-101 exam is part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path in which users learn to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This book offers complete, up-to-date coverage of the MS-101 exam so you can take them with confidence, fully equipped to pass the first time.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
Get ready to pass your CompTIA Security+ certification exam with the elaborate and complete practice that Security+? Practice Tests will provide you. From detailed explanations of the six domains to full-length practice tests, you’ll gain complete knowledge of what this test contains and how to ace it.- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
Promocja Promocja 2za1
Until recently, learning CoreDNS required reading the code or combing through the skimpy documentation on the website. No longer. With this practical book, developers and operators working with Docker or Linux containers will learn how to use this standard DNS server with Kubernetes.John Belamaric, senior staff software engineer at Google, and Cric- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
Promocja Promocja 2za1
Web Components are the set of APIs that helps you build standard UI functions that work across any browser, with any JavaScript framework. This practical guide will help you fulfill this promise through examples and best practices. It will help you implement the web components in your existing frontend application to let you fully realize the capab- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
58.49 zł
64.99 zł(-10%) -
Promocja Promocja 2za1
If you wish to design smart, threat-proof cybersecurity systems using trending AI tools and techniques, then this book is for you. With this book, you will learn to develop intelligent systems that can detect suspicious patterns and attacks, thereby allowing you to protect your network and corporate assets.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
With Red Hat Enterprise Essentials you will run and operate Red Hat Linux 8 learn to securely administer a server or a system using Linux commands.- ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Cybersecurity jobs confines from basic configuration to advanced systems analysis and defense assessment. Cybersecurity: The Beginner's Guide provides thefundamental information you need to understand the basics of the field, identify your place within it, and start your Cybersecurity career.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
Promocja Promocja 2za1
This Learning Path focuses on showing you how to leverage the benefits of the cloud and create applications that are high in performance and availability. It teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
Promocja Promocja 2za1
In the era of network attacks and malware threat, it becomes important to have skills to investigate the attack evidence and vulnerabilities prevailing in the network. This book focuses on how to acquire and analyze the evidence, write a report and use the common tools in network forensics.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
188.10 zł
209.00 zł(-10%) -
Promocja Promocja 2za1
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get started with executing an application penetration test and be sure of the results.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoints and create robust defense strategies.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Microsoft Azure has numerous effective solutions but the biggest challenge that architects and administrators face is implementing these solutions appropriately. This Learning Path focuses on various scenarios that will help overcome the challenge of implementing Azure solutions while helping you prepare for the Microsoft Architect exam.- PDF + ePub + Mobi pkt
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, Namit Tanasseri, Rahul Rai
(29,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
Promocja Promocja 2za1
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Network automation is the process of efficiently automating the management and functionality of networks. Through practical use-cases and examples, this book introduces you to the popular tools such as Python, Ansible, Chef and more, that are used to automate a network.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
pfSense is a FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. This book focuses on configuring essential and other commonly used pfSense services; such as traffic shaping, redundancy, high availability, static and dynamic routing, backup and restoration of pfSense, and diagnostic tools.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what the field is about, the book solves that problem. The book allows readers to train themselves as bug b- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
This second edition of Kali Linux 2: Windows Penetration Testing provides approaches and solutions to the issues of modern penetration testing for a Microsoft Windows environment. As a pen tester, you need to be able to understand and use the best available tools - this book addresses these needs with maximum in a cost and time efficient way.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
Industrial Internet is the integration of complex physical machines and networked sensors and software. Increasing the number of sensors in industrial equipment is going to increase the data being captured, which needs to be analyzed. This book is a one-stop guide for software professionals to design, build, manage, and operate IIoT applications.- PDF + ePub + Mobi pkt
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be able to determine the security state of the client's network and recommend remediations accordingly.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Nowadays, configuring a network and automating security protocols are quite difficult to implement. However, using Python makes it easy to automate this whole process. This book explains the process of using Python for building networks, detecting network errors, and performing different security protocols using Python Scripting.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
The purpose of the Burp Suite Cookbook is to provide web application penetration testers with hands-on examples of how to use Burp Suite to perform web assessments. The book gives detailed screenshots demonstrating how to perform various attacks in Burp including Cross-site Scripting (XSS), SQL Injection, Cross-site Request Forgery, XML External E- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Penetration testing is highly competitive, and it’s easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
Promocja Promocja 2za1
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
This book will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
Promocja Promocja 2za1
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you will be- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to you. Yo- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
Promocja Promocja 2za1
In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best security- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
This book covers everything you need to set up a Kali Linux lab, the latest generation of the BackTrack Linux penetration testing and security auditing Linux distribution. Learn how to use the hundred tools Kali Linux has so you can manage security tasks such as penetration testing, forensics, and reverse engineering.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices , modern operating systems and help you secure high security environments.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with Insigh- PDF + ePub + Mobi pkt
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic forensics- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
The security of wireless networks is more important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking features of Kali Linux.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
: Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself against the attacks you will face every day by simulating real-world possibilities.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
287.10 zł
319.00 zł(-10%) -
Promocja Promocja 2za1
Security is a key ingredient when it comes to workloads deployed in cloud. Security is highest priority for any organization and it is considered job zero at AWS. Our book will dig deep into the achieving end to end automated security for all workloads deployed, running and stored in AWS cloud.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
With ever-improving and ever-changing cyber threats, businesses need to be on their toes to ensure their safety. This comprehensive book takes you from understanding the basics of cyber security and industrial protocols to building robust industrial control systems. Through real-world scenarios, you will understand vulnerabilities and will be equip- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
Promocja Promocja 2za1
Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed for the present while keeping the future in mind. This book talks about how to design and implement enterprise ne- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
The Junos automation toolkit is part of the standard Junos OS available on all switches, routers, and security devices running Junos OS. Junos automation simplifies complex configurations and reduces potential configuration errors.This book is a set of powerful recipes that will cover all you need to know about implementing Junos Automation to auto- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Technology plays an increasingly large role in our daily life and shows no signs of stopping. Now, more than ever, it is paramount that an investigator develops programming expertise to deal with increasingly large datasets. By leveraging the Python recipes explored throughout this book, we make the complex simple, quickly extracting relevant infor- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world’s most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need fo- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how you- ePub + Mobi pkt
(107,36 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
Metasploit for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. This book would help the reader absorb the essential concepts on using Metasploit framework for comprehensive penetration testing. By the end of the book, the reader would feel confident- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
With the ever-increasing amount of data flowing in today’s world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
This is the second edition of ‘Nmap 6: Network Exploration and Security Auditing Cookbook’. A book aimed for anyone who wants to master Nmap and its scripting engine through practical tasks for system administrators and penetration testers. Besides introducing the most powerful features of Nmap and related tools, common security audit- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
Metasploit Bootcamp will enable readers to gain hands-on knowledge on Penetration testing with Metasploit in various environments using a boot camp style approach. The readers will learn about Scanning, fingerprinting and exploiting different software. They will also learn about testing on services like Databases, VOIP and other known and unknown s- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
314.10 zł
349.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran
(29,90 zł najniższa cena z 30 dni)
287.10 zł
319.00 zł(-10%) -
Promocja Promocja 2za1
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other informatio- ePub + Mobi pkt
(92,65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja Promocja 2za1
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’ll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities,- ePub + Mobi pkt
(108,92 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
The second edition of Penetration Testing with Raspberry Pi will show you how to use Raspberry Pi 3 to develop a portable, cost-efficient hacking tool with Kali Linux 2. You’ll be able to get hands-on with pentesting and explore a variety of essential techniques.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security- ePub + Mobi pkt
(83,25 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
This book gets you up and running with mobile forensics, covering everything from how to effectively deal with digital evidence to mobile acquisition tools and techniques. You’ll also gain insights into the various challenges faced while performing mobile forensics.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
This updated edition focuses on the use of Kali Linux 2, aka Sana, and provides you with the skills needed to conduct penetration testing effectively. You’ll find out how to install Kali Linux and then use it for pentesting with the help of cutting-edge wireless penetration tools, enabling you to test your corporate network against threats.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
Publikacja składa się z trzech podstawowych części. Pierwsza z nich porusza historie rozwoju informatyki i metod zabezpieczenia informacji. W drugiej części przedstawione są aktualne rozwiązania związane z szyfrowaniem informacji, autentyfikacją użytkownika oraz omówiona została kwestia ochrony przechowywanej informacji. Ponieważ niekt&oacut(26,40 zł najniższa cena z 30 dni)
26.40 zł
33.00 zł(-20%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
143.10 zł
159.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
Promocja Promocja 2za1
Opracowanie nie skupia się na aspektach związanych z kontrolą czasu pracy, ocenie efektywności wykorzystania czasu pracy, czy kształtowania i normowania czasów działań podejmowanych przez użytkowników systemów komputerowych. Zakres tematyczny pracy jest związany z bezpieczeństwem i ciągłością działania systemów komput(25,60 zł najniższa cena z 30 dni)
25.60 zł
32.00 zł(-20%) -
Promocja Promocja 2za1
Publikacja dotyczy problemów związanych z kryptografią i uwierzytelnianiem użytkowników sieci Internet. Przedstawiono w niej mechanizmy podpisu elektronicznego z uwzględnieniem problemów dystrybucji klucza i przykłady rozwiązań uwi??erzytelniania oparte o analizę cech biometrycznych.Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
Andrzej Grzywak, Jerzy Klamka, Paweł Buchwald, Piotr Pikiewicz, Maciej Rostański, Marcin Sobota
(21,60 zł najniższa cena z 30 dni)
21.60 zł
27.00 zł(-20%) -
Promocja Promocja 2za1
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether yo- ePub + Mobi pkt
(109,18 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
Promocja Promocja 2za1
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%)