W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.
Bezpieczeństwo systemów
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
This essential guide will help any blockchain practitioner gain expertise in developing complete STO and stablecoins DApps. This book provides a quick introduction to basic ICO and STO concepts, and their differences. It will also help readers compile, test, and deploy their own contracts by altering the code provided in the book.
- PDF + ePub + Mobi pkt
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
Promocja
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows y- ePub + Mobi pkt
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
(186,15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
In the era of network attacks and malware threat, it becomes important to have skills to investigate the attack evidence and vulnerabilities prevailing in the network. This book focuses on how to acquire and analyze the evidence, write a report and use the common tools in network forensics.
- PDF + ePub + Mobi pkt
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
This Learning Path is your easy reference to explore and build blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Starting with the basics of blockchain, this Learning Path teaches you all that you need to know to develop your own private and public blockchain networks.
- PDF + ePub + Mobi pkt
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
Salman A. Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
-
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.
- PDF + ePub + Mobi pkt
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7 Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Kali NetHunter is a free-to-use version of Kali that allows for extreme mobility, flexibility and raw power that can be installed and executed on a range of smartphones and tablets. In this book, you will explore Kali NetHunter from different angles in an effort to familiarize and use the distribution to pentest and secure an environment.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
-
Data structures and algorithms help you to understand computational complexity and write efficient code. Kotlin data structures and algorithms enable you to write code that runs faster which is important in the web and mobile world. This book takes you through the techniques that you can use in your regular production environment.
- PDF + ePub + Mobi pkt
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get started with executing an application penetration test and be sure of the results.
- PDF + ePub + Mobi pkt
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine VR Quick Start Guide introduces designers to the guidelines and design processes necessary to build interactive VR experiences. Learn to use User Experience design techniques and Blueprint programming to create virtual reality gameplay for HTC Vive, Oculus Rift, PSVR, and Windows Mixed Reality headsets.
- PDF + ePub + Mobi pkt
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4 Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.
- PDF + ePub + Mobi pkt
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoints and create robust defense strategies.
- PDF + ePub + Mobi pkt
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concepts that will come in handy when making robust cybersecurity tools and custom exploits.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Microsoft Azure has numerous effective solutions but the biggest challenge that architects and administrators face is implementing these solutions appropriately. This Learning Path focuses on various scenarios that will help overcome the challenge of implementing Azure solutions while helping you prepare for the Microsoft Architect exam.
- PDF + ePub + Mobi pkt
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, Namit Tanasseri, Rahul Rai
-
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
The serverless architecture allows you to build and run applications and services without having to manage the infrastructure which saves cost and improves scalability. In this book, you will learn to harness serverless technology to reduce production time, minimize cost and have the freedom to customize your code, without hindering functionality.
- PDF + ePub + Mobi pkt
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
This is a comprehensive guide to help you understand the current threats faced by the financial cyberspace and how to go about it and secure your financial landscape. The book will take you on a journey from identifying the attackers to securing your financial transactions and assets. The book then take you through the updates needed for procedures
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Functional programming is a very powerful programming paradigm that can help us to write better code. This book presents essential functional and reactive programming concepts in a simplified manner using Typescript.
- PDF + ePub + Mobi pkt
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
The book will allow readers to implement smart solutions to their existing cybersecurity products and effectively build intelligent solutions which cater to the needs of the future. By the end of this book, you will be able to build, apply, and evaluate machine learning algorithms to identify various cybersecurity potential threats.
- PDF + ePub + Mobi pkt
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Hands-On Enterprise Application Development with Python explains how Python has matured to become a suitable programming language to build robust applications that scale easily to manage the requirements of the enterprise. The book will explore features of Python 3.7, tested frameworks and tools and best programming practices for developing scalabl
- PDF + ePub + Mobi pkt
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3 Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
This book will introduce you to Android forensics helping you to set up a forensic environment, handle mobile evidence, analyze how and where common applications store their data. You will also learn to identify malware on a device, and how to analyze it.
- PDF + ePub + Mobi pkt
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
C++ is a general-purpose programming language with a bias towards systems programming. This book provides a detailed walkthrough of the C, C++ and POSIX standards and enables a firm understanding of various system calls for UNIX systems. Topics include console and file IO, memory management, sockets, time interface, process and thread management
- PDF + ePub + Mobi pkt
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17 Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
Understanding the history of the Deep Web, its current state, and its possible evolution, can help you, the reader; better understand the dangers and risks that exist out there. This book helps you access the Deep Web and the Dark Net and also protect yourself while browsing the Deep Web.
- PDF + ePub + Mobi pkt
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions.
- PDF + ePub + Mobi pkt
CentOS Quick Start Guide. Get up and running with CentOS server administration CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Microsoft Azure is a cloud computing platform that helps you build, deploy, and manage applications to overcome your business challenges. This book covers the commonly used Azure services and also explains how you effectively integrate and utilize them.
- PDF + ePub + Mobi pkt
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Swift is continuing to gain traction not only amongst mobile developers but also as a server-side language. This book demonstrates how to apply design patterns and best practices in real-life situations, for new or already existing projects. By the end of the book, you’ll able to build applications that are scalable, faster and easier to ma
- PDF + ePub + Mobi pkt
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide will show you how to create distributed blockchain applications which do not depend on a central server or datacenter. Starting with the basic principles of blockchain architecture exploring cryptography, you will then study consensus protocols, initial coin offerings, crypto-mining, DApp deployment, Ethereum applicatio
- PDF + ePub + Mobi pkt
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what the field is about, the book solves that problem. The book allows readers to train themselves as bug b
- PDF + ePub + Mobi pkt
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
Mastering Vim will introduce you to the wonderful world of Vim by example of working with Python code and tools in a project-based fashion. This book will prompt you to make Vim your primary IDE as you will learn to use it for any programming language.
- PDF + ePub + Mobi pkt
Mastering Vim. Build a software development environment with Vim and Neovim Mastering Vim. Build a software development environment with Vim and Neovim
-
Docker is an open source software platform that helps you with creating, deploying, and running your applications using containers. This book is your ideal introduction to Docker and containerization.
- PDF + ePub + Mobi pkt
Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications
-
Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master the art of using reverse engineering.
- PDF + ePub + Mobi pkt
Mastering Reverse Engineering. Re-engineer your ethical hacking skills Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
In this book, you’ll build a complete system with both back-end and front-end products, including ASP.NET Core, Entity Framework, TypeScript, Angular, React, Vue, and Azure. This book covers more than just implementation, as you gain additional knowledge in more relevant areas, including deployment, monitoring, and debugging.
- PDF + ePub + Mobi pkt
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
This second edition of Kali Linux 2: Windows Penetration Testing provides approaches and solutions to the issues of modern penetration testing for a Microsoft Windows environment. As a pen tester, you need to be able to understand and use the best available tools - this book addresses these needs with maximum in a cost and time efficient way.
- PDF + ePub + Mobi pkt
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
In recent years, the C# and .NET ecosystem has grown so explosively that it's nearly impossible to keep up. This collection of programming challenges helps you explore some of the less-traveled byways of programming concepts in general and C# in particular.
- PDF + ePub + Mobi pkt
The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems
-
CompTIA Security+ Certification Guide makes the most complex Security+ concepts easy to understand despite having no prior knowledge. It offers exam tips in every chapter along with access to practical exercises and exam checklist that map to the exam objectives and it is the perfect study guide to help you pass CompTIA Security+ SY0-501 exam.
- PDF + ePub + Mobi pkt
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Nowadays, configuring a network and automating security protocols are quite difficult to implement. However, using Python makes it easy to automate this whole process. This book explains the process of using Python for building networks, detecting network errors, and performing different security protocols using Python Scripting.
- PDF + ePub + Mobi pkt
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity.
- PDF + ePub + Mobi pkt
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
The purpose of the Burp Suite Cookbook is to provide web application penetration testers with hands-on examples of how to use Burp Suite to perform web assessments. The book gives detailed screenshots demonstrating how to perform various attacks in Burp including Cross-site Scripting (XSS), SQL Injection, Cross-site Request Forgery, XML External E
- PDF + ePub + Mobi pkt
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
This book will provide you with practical recipes to manage the build system using CMake. You will be taken through a series of task-based examples that demonstrate how to employ the CMake toolbox to build portable and modular code and to minimize the code complexity of the build infrastructure.
- PDF + ePub + Mobi pkt
CMake Cookbook. Building, testing, and packaging modular software with modern CMake CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Viktor Farcic’s latest book, The DevOps 2.3 Toolkit: Kubernetes, will take you on a hands-on journey with Viktor into the world of Kubernetes, and the tools not only behind the official project but also the wide-range of third-party apps that are available for you to use.
- PDF + ePub + Mobi pkt
The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale
-
Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.
- PDF + ePub + Mobi pkt
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Ethereum is an open-source, public, Blockchain-based distributed computing platform, and operating system featuring smart contract functionality which builds decentralized applications. If you want to get started with Ethereum and Solidity or you are among the many developers already working with this platform, this book is your one-stop guide.
- PDF + ePub + Mobi pkt
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Kotlin is a general purpose, object-oriented language that primarily targets the JVM and Android. Intended to be a better alternative to Java, its main goals are high interoperability with Java and increased developer productivity. Kotlin is still a new language and this book will help you to learn the core Kotlin features and get your ready for d
- PDF + ePub + Mobi pkt
Kotlin Quick Start Guide. Core features to get you ready for developing applications Kotlin Quick Start Guide. Core features to get you ready for developing applications
-
Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model.
- PDF + ePub + Mobi pkt
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
This book is a comprehensive guide to help developers, architects, and senior programmers advance their career in the software architecture domain. You'll understand the expectations of users and other stakeholders from the point of view of an architect and will learn to communicate your architecture to the relevant stakeholders.
- PDF + ePub + Mobi pkt
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain.
- PDF + ePub + Mobi pkt
Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux
-
This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.
- PDF + ePub + Mobi pkt
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
This book covers everything the reader needs to know to get pfSense up and running, as well as how to configure core pfSense services to both secure and optimize their networks, third party packages that extend the functionality of pfSense, and the basics of diagnostics and troubleshooting networks.
- PDF + ePub + Mobi pkt
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Penetration testing is highly competitive, and it’s easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
pfSense is the world's most trusted open source network security solution. In this book, you’ll learn about pfSense, all of its key features, how you can install and deploy it, as well as the different tasks you can perform.
- PDF + ePub + Mobi pkt
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
Amazon Lambda is the part of Amazon Web Services that lets you run your code without provisioning or managing servers. Amazon Lambda is a compute service that enables you to deploy applications and back-end services that operate with zero upfront cost and require no system administration.
- PDF + ePub + Mobi pkt
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
In an era of fast-paced change and unprecedented technological innovation, businesses are struggling to survive. This practical book will prepare your organization to adapt and excel. Learn how adopting Agile ways of working and increasing Agility will propel your company to success in competitive markets.
- PDF + ePub + Mobi pkt
Enterprise Agility. Being Agile in a Changing World Enterprise Agility. Being Agile in a Changing World
-
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.
- PDF + ePub + Mobi pkt
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis and memory forensics.
- PDF + ePub + Mobi pkt
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Having a knowledge of design patterns enables you, as a developer, to improve your code base, promote code reuse, and make the architecture more robust. As languages evolve, new features take time to fully understand before they are adopted en masse. The mission of this book is to ease the adoption of the latest trends and provide good practices fo
- PDF + ePub + Mobi pkt
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
This book will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do.
- PDF + ePub + Mobi pkt
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
We live in an era where cyber security plays an important role. As systems are getting smarter, we now see machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it’s important for pentesters and security researchers to understand how these systems work, and to breach them for te
- PDF + ePub + Mobi pkt
Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python
-
Wireshark is a powerful tool for network analysis, a combination of Kali Linux and the Metasploit framework. Wireshark is used to analyze the amount of data that flows through a network - it lets you see what's going on in your network. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.
- PDF + ePub + Mobi pkt
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
The Google Cloud Platform is fast emerging as a leading public cloud provider. The GCP, as it is popularly known, is backed by Google’s awe-inspiring engineering expertise and infrastructure and is able to draw upon the goodwill and respect that Google has come to enjoy. The GCP is one of a handful of public cloud providers to offer the full
- PDF + ePub + Mobi pkt
Google Cloud Platform for Architects. Design and manage powerful cloud solutions Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Web Applications are the core of any business today, and the need for specialized Application Security experts is increasing these days. Using this book, you will be able to learn Application Security testing and understand how to analyze a web application, conduct a web intrusion test, and a network infrastructure test.
- PDF + ePub + Mobi pkt
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.
- PDF + ePub + Mobi pkt
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260) CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Design patterns enable you to speed up the development process by providing tested, proven development paradigms. Reusing design patterns helps prevent complex issues, improves your code base, promotes code reuse, and makes the architecture more robust. This book will ease the adoption of design patterns in Kotlin and provide best practices.
- PDF + ePub + Mobi pkt
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
A balance between implementing complex applications and optimizing performance is a present-day need. This book helps you achieve this balance while developing and deploying applications with Kotlin. You will learn how to use profiling tools to detect performance issues and discover bytecode that is generated to overcome performance bottlenecks.
- PDF + ePub + Mobi pkt
Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
-
Lean Product Management is a handy guide for product managers and anyone embarking on new product development. This book will help readers to align their product strategy by identifying the most viable product, setting up and measuring time-bound metrics, developing a clear product roadmap, and eliminating waste.
- PDF + ePub + Mobi pkt
Lean Product Management. Successful products from fuzzy business ideas Lean Product Management. Successful products from fuzzy business ideas
-
Microservices has evolved as one of the most tangible solutions to make effective and scalable applications. Due to its evolution from ES5 to ES6 stack, Typescript has become one of the most de facto solutions. This book will help you leverage microservices’ power to build robust architecture using reactive programming and Typescript in Node
- PDF + ePub + Mobi pkt
TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js
-
Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not only find flaws but also strengthen the security of
- PDF + ePub + Mobi pkt
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
A key problem of software development today is the software bloat, where huge toolchains and development environments are needed in software coding and deployment. Red significantly reduces this bloat by offering a minimal but complete toolchain. This is the first introductory book on Red, and it will get you up and running as quickly as possible.
- PDF + ePub + Mobi pkt
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
pfSense is open source router/firewall software based on FreeBSD. This book shows how to install and customize pfSense in a variety of scenarios, providing many concrete examples.
- PDF + ePub + Mobi pkt
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.
- PDF + ePub + Mobi pkt
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Windows Server 2016 is an operating system designed to run on today’s highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the s
- PDF + ePub + Mobi pkt
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016 Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to you. Yo
- PDF + ePub + Mobi pkt
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Serverless architectures allow you to build and run applications and services without having to manage the infrastructure. Many companies have adopted this architecture to save cost and improve scalability. This book will help you design serverless architectures for your applications with AWS and Python.
- PDF + ePub + Mobi pkt
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Organizations have started to adapt to hybrid cloud solutions in order to leverage advantages such as untested workloads, cloud-bursting, cloud service brokering, and more. The major goal of this book is to help developers maximize their existing skills and overcome the complexities of developing flexible and unified apps on the cloud.
- PDF + ePub + Mobi pkt
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Serverless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes. For good reason, serverless-based applications handle many of the problems developers face when running systems and servers such as fault-tolerance, centralized logging, horizontal scalability, and deployments, to name a few. Ad
- PDF + ePub + Mobi pkt
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Kubernetes provides a means to describe what your application needs and how it should run by orchestrating containers on your behalf to operate your software across a single, dozens, or hundreds of machines. Originally created and open sourced from Google, you can use their technology to help run, test, and scale your applications regardless of whi
- PDF + ePub + Mobi pkt
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Continuous deployment and Agile methodology have enabled huge advances in modern applications. This book will enable the reader to make use of this rapidly evolving technology to build highly scalable applications within AWS using different architectures.
- PDF + ePub + Mobi pkt
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
VMware NSX is a software-based networking and security virtualization platform that delivers an operational model of a virtual machine for the network. By virtualizing the network, NSX breaks through current physical network barriers and enables data center operators to achieve better speed and agility with reduced costs.
- PDF + ePub + Mobi pkt
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best security
- PDF + ePub + Mobi pkt
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Viktor Farcic’s latest book, The DevOps 2.2 Toolkit: Self-Sufficient Docker Clusters, takes you deeper into Docker, teaching you with a mixture of theory and hands-on how to successfully build both self-adaptive and self-healing-based systems.
- PDF + ePub + Mobi pkt
The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters
-
Agile software development helps to minimize the risk of failure in product development, as it enables you to quickly adapt to the changing environment and the varying needs of your customers, by improving your communication and collaboration skills.
- PDF + ePub + Mobi pkt
The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology
-
Python is a very powerful, high-level, object-oriented programming language. It has swiftly developed over the years to become the language of choice for software developers due to its simplicity. This book takes you through varied and real-life projects. The examples start with the basics and gradually increase in complexity, helping boost your sk
- PDF + ePub + Mobi pkt
Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django
-
This book is a hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. It takes you far beyond common techniques to compromising complex network devices , modern operating systems and help you secure high security environments.
- PDF + ePub + Mobi pkt
Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers
-
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with Insigh
- PDF + ePub + Mobi pkt
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal
-
AWS is currently the market leader in the public cloud market.With the increasing global interest in leveraging cloud infrastructure, AWS Cloud from Amazon offers a cutting-edge platform for architecting, building, and deploying web-scale cloud applications. This book will help you in performing these tasks easily.
- PDF + ePub + Mobi pkt
Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition
-
Microservices are a hot trend in the development world right now. Many enterprises have adopted this approach to achieve agility and the continuous delivery of applications to gain a competitive advantage. This book will take you through the different design patterns at different stages of the microservice application development process, along wit
- PDF + ePub + Mobi pkt
Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices Microservice Patterns and Best Practices. Explore patterns like CQRS and event sourcing to create scalable, maintainable, and testable microservices
-
Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic forensics
- PDF + ePub + Mobi pkt
Security with Go. Explore the power of Golang to secure host, web, and cloud services Security with Go. Explore the power of Golang to secure host, web, and cloud services
-
Jira Software is an agile project management tool that supports any agile methodology, be it scrum, Kanban, or your own unique flavor. From agile boards to reports, you can plan, track, and manage all your agile software development projects from a single tool. Jira Software brings the power of agile methodology to Atlassian Jira.With this practica
- PDF + ePub + Mobi pkt
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
With cybercrime on a rise, cybersecurity has become extremely vital to industries. Companies have started adopting more stringent ways of preventing system breaches. This book will explore Red Team tactics that can be used in penetration for accessing sensitive data and Blue Team tactics that can help you defend your system from complex attacks.
- PDF + ePub + Mobi pkt
Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics Cybersecurity - Attack and Defense Strategies. Infrastructure security with Red Team and Blue Team tactics
-
Kotlin has been the buzzword among developers ever since the release of new features in Kotlin 1.1. With Google's announcement of introducing first class support for Kotlin in their Android ecosystem, it's high time that Kotlin is realized as a mainstream language. Microservices aids in designing scalable, easy-to-maintain web applications. If you
- PDF + ePub + Mobi pkt
Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0 Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0
-
Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics, Second Edition and it delves into the concepts of mobile forensics and its importance in today’s world.
- PDF + ePub + Mobi pkt
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
-
For the past couple of decades, Linux has been extremely popular with systems administrators, for everything from creating networks and servers to automating their entire working environment. However, security has always been the major concern. With not many resources available in the Linux security domain, this book will be an invaluable resource
- PDF + ePub + Mobi pkt
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Modern day businesses and enterprises are moving to cloud simply to improve efficiency and speed, achieve flexibility and cost-effectiveness, and for on-demand cloud services. However, enterprise cloud security remains a major concern for many businesses because migrating to the public cloud requires transferring some control over organizational as
- PDF + ePub + Mobi pkt
Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles Enterprise Cloud Security and Governance. Efficiently set data protection and privacy principles
-
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing and providing detailed covera
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
This book brings with it an array of practical recipes for performing forensic examinations on mobile devices. It will show you how to treat data extraction, recovering, and decoding data on the mobile operating systems such as Android, iOS, Windows Mobile, and BlackBerry OS.
- PDF + ePub + Mobi pkt
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
The security of wireless networks is more important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking features of Kali Linux.
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Security automation is one of the most interesting skills to have nowadays. With over 750 automation modules, Ansible makes it easy for you to secure any part of your system—be it setting firewalls, providing authentication to users and groups, or setting custom security policies. It allows you to write automation procedures once and use the
- PDF + ePub + Mobi pkt
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices. You will learn how to identify vulnerabilities in IoT device architect
- PDF + ePub + Mobi pkt
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Penetration testing is the use of tools and code to attack a system in order to assess its vulnerabilities to external threats. Python allows pen testers to create their own tools.This book provides quick Python recipes to let defense analysts work on their own on the path to discovering, and recovering from, vulnerabilities.
- PDF + ePub + Mobi pkt
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
The Lean methodology is a hit in startup land. It’s a movement that keeps growing – it will soon be the ultimate methodology for creating a startup that succeeds. That may sound great from a theoretical point of view, but what does that mean for you as an Android or iOS developer? By adopting Lean development principles, it’s
- PDF + ePub + Mobi pkt
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security 4.2 is an incremental guide that will teach you how to protect your application from malicious users. Through this book, you will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples.
- PDF + ePub + Mobi pkt
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Since its inception, Git has attracted skilled developers due to its robust, powerful, and reliable features. It's incredibly fast branching ability transformed a piece of code from a niche tool for former Linux Kernel developers into a mainstream distributed versioning system. This book will help you overcome this fear and become adept in all the
- PDF + ePub + Mobi pkt
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Java Programming for Beginners is an excellent introduction to the world of Java programming, taking you through the basics of Java syntax and the complexities of object-oriented programming. Whether you’re a beginner to programming, or approaching an object-oriented language for the first time, this book delivers the focused training you ne
- PDF + ePub + Mobi pkt
Java Programming for Beginners. Learn the fundamentals of programming with Java Java Programming for Beginners. Learn the fundamentals of programming with Java
-
GeoServer is an open-source server written in Java that allows users to share, process, and edit geospatial data. This book will guide you through the new features and improvements of GeoServer and will help you get started with it. GeoServer Beginner's Guide gives you a kick-start to build custom maps using your data without the need for costly co
- PDF + ePub + Mobi pkt
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications.
- PDF + ePub + Mobi pkt
OAuth 2.0 Cookbook. Protect your web applications using Spring Security OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
With ever-improving and ever-changing cyber threats, businesses need to be on their toes to ensure their safety. This comprehensive book takes you from understanding the basics of cyber security and industrial protocols to building robust industrial control systems. Through real-world scenarios, you will understand vulnerabilities and will be equip
- PDF + ePub + Mobi pkt
Industrial Cybersecurity. Efficiently secure critical infrastructure systems Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book will be packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) as per your requirements and move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Learn about design patterns and best practices required with the Spring Framework to solve common problems when designing an application or system. This book not only covers the essential GoF design patterns but also those patterns, considerations, and best practices required at different stages in Application Development. It will demonstrate the R
- PDF + ePub + Mobi pkt
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Odoo is a Python-based ERP system and is completely open source. Odoo is a comprehensive suite of business applications offering a wealth of functionalities that can be deployed to meet your business needs.
- PDF + ePub + Mobi pkt
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
In Understanding Software, Max Kanat-Alexander, Technical Lead for Code Health at Google, brings you his writings and thoughts so that your code and your life as a developer can be healthy, avoid complexity, and embrace simplicity. Why make life hard when making software can be simple?
- PDF + ePub + Mobi pkt
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
With rapid adaptation of the cloud platform, the need for cloud certification has also increased. This is your one stop solution and will help you transform yourself from zero to certified. This guide will help you gain technical expertise in the AWS platform and help you start working with various AWS Services.
- PDF + ePub + Mobi pkt
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Go is a modern systems programming language, which allows the creation of systems applications and modules just above any kernel, e.g. Linux, and container, e.g. Docker. This book explains thread-safe and concurrent Go, and goes into writing server, cloud and systems-level applications. No more C style memory management, for instance. If you want t
- PDF + ePub + Mobi pkt
Go Systems Programming. Master Linux and Unix system level programming with Go Go Systems Programming. Master Linux and Unix system level programming with Go
-
Technology plays an increasingly large role in our daily life and shows no signs of stopping. Now, more than ever, it is paramount that an investigator develops programming expertise to deal with increasingly large datasets. By leveraging the Python recipes explored throughout this book, we make the complex simple, quickly extracting relevant infor
- PDF + ePub + Mobi pkt
Python Digital Forensics Cookbook. Effective Python recipes for digital investigations Python Digital Forensics Cookbook. Effective Python recipes for digital investigations
-
Microsoft’s launch of Windows 10 is a step toward satisfying the enterprise administrator’s needs for management and user experience customization. This book provides the enterprise administrator with the knowledge needed to fully utilize the advanced feature set of Windows 10 Enterprise.
- PDF + ePub + Mobi pkt
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Promocja
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how you- ePub + Mobi pkt
Network Security Through Data Analysis. From Data to Action. 2nd Edition Network Security Through Data Analysis. From Data to Action. 2nd Edition
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
C++ has come a long way and has now been adopted in several contexts. Its key strengths are its software infrastructure and resource-constrained applications. The C++ 17 release will change the way developers write code and this book will help you master your developing skills with C++.
- PDF + ePub + Mobi pkt
Mastering C++ Programming. Modern C++ 17 at your fingertips Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Imagine creating and testing Java EE applications on Apache Tomcat Server or Wildfly Application Server in minutes along with deploying and managing Java applications swiftly. Sounds too good to be true? But you have a reason to cheer as such scenarios are only possible by leveraging Docker and Kubernetes.
- PDF + ePub + Mobi pkt
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Everything humans interact with has an experience associated with it. Some are good, some are bad, but only recently have we begun to consciously design these experiences. We are now at a point in time when experience-design has suddenly exploded into the consciousness of business people and ordinary people all over the world. This book addressees
- PDF + ePub + Mobi pkt
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Promocja
Zebranie w monografii 18 rozdziałów będących rozwinięciem i uszczegółowieniem wystąpień z konferencji TAPT, ale także poruszających nieprezentowane na konferencji tematy powinno być atrakcyjne dla wielu czytelników zainteresowanych cyberprzestępczością. Będą one także przydatne dla studentów i wszystkich osób, które zajmują się zapewnieniem bezpiec(13,66 zł najniższa cena z 30 dni)
13.66 zł
17.07 zł(-20%) -
Serverless architecture allows you to build and run applications and services without having to manage the infrastructure. Many companies have started adopting serverless architecture for their applications to save costs and improve scalability. This book will give you all the information you need to set up and deploy applications to Azure Serverle
- PDF + ePub + Mobi pkt
Serverless computing in Azure with .NET. Build, test, and automate deployment Serverless computing in Azure with .NET. Build, test, and automate deployment