W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.
Bezpieczeństwo systemów
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
Promocja
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how you- ePub + Mobi pkt
Network Security Through Data Analysis. From Data to Action. 2nd Edition Network Security Through Data Analysis. From Data to Action. 2nd Edition
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
C++ has come a long way and has now been adopted in several contexts. Its key strengths are its software infrastructure and resource-constrained applications. The C++ 17 release will change the way developers write code and this book will help you master your developing skills with C++.
- PDF + ePub + Mobi pkt
Mastering C++ Programming. Modern C++ 17 at your fingertips Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Imagine creating and testing Java EE applications on Apache Tomcat Server or Wildfly Application Server in minutes along with deploying and managing Java applications swiftly. Sounds too good to be true? But you have a reason to cheer as such scenarios are only possible by leveraging Docker and Kubernetes.
- PDF + ePub + Mobi pkt
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Everything humans interact with has an experience associated with it. Some are good, some are bad, but only recently have we begun to consciously design these experiences. We are now at a point in time when experience-design has suddenly exploded into the consciousness of business people and ordinary people all over the world. This book addressees
- PDF + ePub + Mobi pkt
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Serverless architecture allows you to build and run applications and services without having to manage the infrastructure. Many companies have started adopting serverless architecture for their applications to save costs and improve scalability. This book will give you all the information you need to set up and deploy applications to Azure Serverle
- PDF + ePub + Mobi pkt
Serverless computing in Azure with .NET. Build, test, and automate deployment Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. Whether talking about digital forensics conducted by law enforcement or a corporate security department, the simple fact is that forens
- PDF + ePub + Mobi pkt
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Got some experience of Angular under your belt? Want to learn everything about using advanced features for developing websites? This book is everything you need for the deep understanding of Angular that will set you apart from the developer crowd.Angular has introduced a new way to build applications. Creating complex and rich web applications, wi
- PDF + ePub + Mobi pkt
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula
-
This book is an all-purpose toolkit for your programming career. It is split up into three main topic areas: Coder Skills, Freelancer Skills, and Career Skills to help you identify and answer the key questions and stumbling blocks that programmers encounter. It is a comprehensive guide containing more than 50 insights and methodologies that you can
- PDF + ePub + Mobi pkt
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Java is a powerful language that has applications in a wide variety of fields. Right from playing games on your computer to performing banking transactions, Java is at the heart of everything. With this book, you will get a deep understanding of this robust programming language and how it can make your life easier. This collection of projects will
- PDF + ePub + Mobi pkt
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
JMeter is a Java application designed to load and test performance for a web application. JMeter extends to improve the functioning of various other static and dynamic resources. This book is a great starting point to learn about JMeter. It covers the new features introduced with JMeter 3 and enables you to dive deep into the new techniques neede
- PDF + ePub + Mobi pkt
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Metasploit for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. This book would help the reader absorb the essential concepts on using Metasploit framework for comprehensive penetration testing. By the end of the book, the reader would feel confident
- PDF + ePub + Mobi pkt
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Over the past years, all kind of companies from start-ups to giant enterprises started their move to public cloud providers in order to save their costs and reduce the operation effort needed to keep their shops open. Now it is even possible to craft a complex software system consisting of many independent micro-functions that will run only when th
- PDF + ePub + Mobi pkt
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Mastering Kali Linux for Advanced Penetration Testing will provide you with a number or proven techniques to defeat the latest defences on the networks using Kali Linux. From selecting the most effective tools, to rapidly compromising network security, to highlighting the techniques used to avoid detection.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Spring 5.0 is due to arrive with a myriad of new and exciting features that will change the way we’ve used the framework so far. This book will show you this evolution—from solving the problems of testable applications to building distributed applications on the Cloud.
- PDF + ePub + Mobi pkt
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Kali Linux 2016.2 is the next generation of Back Track 5, which is one of the best open-source penetration tool kits. Mastering Kali Linux for Web Penetration Testing will assist you in responsibly exposing identifying, and disclosing weaknesses and flaws in web applications at all stages of development.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.
- PDF + ePub + Mobi pkt
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and the IT operations team. The main goal of DevOps is to automate the software development process with proper processes that involve people to change the culture. This book will follow a bootcamp approach, which will
- PDF + ePub + Mobi pkt
-
With the ever-increasing amount of data flowing in today’s world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2
- PDF + ePub + Mobi pkt
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Akka is an open source toolkit that simplifies the construction of distributed and concurrent applications on the JVM. This book will teach you how to develop reactive applications in Scala using the Akka framework.
- PDF + ePub + Mobi pkt
Akka Cookbook. Recipes for concurrent, fast, and reactive applications Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Do you want to create better products and innovative solutions? User experience maps will help you understand users, gain strategic insights, and improve communication with stakeholders. Maps can also champion user-centricity within the organizationTwo advanced mapping techniques will be revealed for the first time in print, the behavioural change
- PDF + ePub + Mobi pkt
User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams
-
Metasploit Bootcamp will enable readers to gain hands-on knowledge on Penetration testing with Metasploit in various environments using a boot camp style approach. The readers will learn about Scanning, fingerprinting and exploiting different software. They will also learn about testing on services like Databases, VOIP and other known and unknown s
- PDF + ePub + Mobi pkt
Metasploit Bootcamp. The fastest way to learn Metasploit Metasploit Bootcamp. The fastest way to learn Metasploit
-
Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, takes you deeper into one of the major subjects of his international best seller, The DevOps 2.0 Toolkit, and shows you how to successfully integrate Docker Swarm into your DevOps toolset.
- PDF + ePub + Mobi pkt
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.
- PDF + ePub + Mobi pkt
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
This book will walk you through all the concepts and tools that Microsoft Azure has to offer and how these can be used in the DevOps environment. You will be introduced to use and management of Visual Studio Team Services (VSTS), so that you can understand the structure of the application that we will use as a sample throughout the book. You will u
- PDF + ePub + Mobi pkt
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Software architecture or creating a blueprint design for a particular software application is not a walk in the park. The two biggest challenges in software architecture are keeping architecture in sync, first, with the requirements as they are uncovered or evolve and, next, with the implementation as it gets built and evolves.
- PDF + ePub + Mobi pkt
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Microsoft .NET has always been the preferred framework for developing Enterprise applications that target the Windows platform. However, the release of .NET Core empowers senior developers and enterprise architects to think out of the box, and use .NET Core to design and develop robust applications that target multiple platforms.
- PDF + ePub + Mobi pkt
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo
- PDF + ePub + Mobi pkt
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Walmart’s OneOps is an open source DevOps platform that is used for cloud and application lifecycle management. It can manage critical and complex application workload on any multi cloud-based infrastructure and revolutionizes the way administrators, developers, and engineers develop and launch new products.
- PDF + ePub + Mobi pkt
-
Promocja
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, to- ePub + Mobi pkt
Defensive Security Handbook. Best Practices for Securing Infrastructure Defensive Security Handbook. Best Practices for Securing Infrastructure
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
In this short book, we take an in-depth look at lambdas in Java and their supporting features. It covers essential topics, such as functional interfaces and type inference, and the key differences between lambdas and closures.
- PDF + ePub + Mobi pkt
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
QGIS is a desktop geographic information system that facilitates data viewing, editing, and analysis. Based on version QGIS 2.18, this book will teach you how to write Python code that works with spatial data to automate geoprocessing tasks in QGIS.
- PDF + ePub + Mobi pkt
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
- PDF + ePub + Mobi pkt
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
- PDF + ePub + Mobi pkt
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights .NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
- PDF + ePub + Mobi pkt
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
- PDF + ePub + Mobi pkt
Penetration Testing: A Survival Guide. A Survival Guide Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran
-
Promocja
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other informatio- ePub + Mobi pkt
The Internet of Risky Things. Trusting the Devices That Surround Us The Internet of Risky Things. Trusting the Devices That Surround Us
(92,65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
This book gets you up and running with mobile forensics, covering everything from how to effectively deal with digital evidence to mobile acquisition tools and techniques. You’ll also gain insights into the various challenges faced while performing mobile forensics.
- PDF + ePub + Mobi pkt
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.
- PDF + ePub + Mobi pkt
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
- PDF + ePub + Mobi pkt
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Promocja
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether yo- ePub + Mobi pkt
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
Promocja
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of- ePub + Mobi pkt
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
(92,65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious- ePub + Mobi pkt
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level s- ePub + Mobi pkt
Accumulo. Application Development, Table Design, and Best Practices Accumulo. Application Development, Table Design, and Best Practices
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own th- ePub + Mobi pkt
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
- PDF + ePub + Mobi pkt
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
- PDF + ePub + Mobi pkt
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
- PDF + ePub + Mobi pkt
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
- PDF + ePub + Mobi pkt
JavaScript Security. Learn JavaScript security to make your web applications more secure JavaScript Security. Learn JavaScript security to make your web applications more secure
-
- PDF + ePub + Mobi pkt
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan
-
- PDF + ePub + Mobi pkt
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
- PDF + ePub + Mobi pkt
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
- PDF + ePub + Mobi pkt
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
- PDF + ePub + Mobi pkt
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Promocja
With this practical book, you’ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high- ePub + Mobi pkt
Effective Monitoring and Alerting. For Web Operations Effective Monitoring and Alerting. For Web Operations
(59,42 zł najniższa cena z 30 dni)
59.42 zł
69.90 zł(-15%) -
Promocja
"Zakaz Stękania" to idea Michała Wawrzyniaka, z którą utożsamiają się dziesiątki tysięcy osób na świecie. Osiołek Ici Ici, który jest jej ucieleśnieniem, codziennie inspiruje ich do tego, aby: nie gadać, ale działać, nie narzekać, tylko szukać rozwiązań, wyładować i oczyścić emocje w pozytywny sposób.- PDF + ePub + Mobi pkt
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been col- ePub + Mobi pkt
Privacy and Big Data. The Players, Regulators, and Stakeholders Privacy and Big Data. The Players, Regulators, and Stakeholders
(63,74 zł najniższa cena z 30 dni)
63.74 zł
74.99 zł(-15%) -
Promocja
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Ne- ePub + Mobi pkt
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
(203,15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Promocja
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secu- ePub + Mobi pkt
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is- ePub + Mobi pkt
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
(84,92 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
Promocja
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Be- ePub + Mobi pkt
Beautiful Security. Leading Security Experts Explain How They Think Beautiful Security. Leading Security Experts Explain How They Think
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techn- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence- ePub + Mobi pkt
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
(84,92 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
Promocja
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad- ePub + Mobi pkt
Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast Web Security Testing Cookbook. Systematic Techniques to Find Problems Fast
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and kee- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Promocja
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all t- ePub + Mobi pkt
The Internet: The Missing Manual. The Missing Manual The Internet: The Missing Manual. The Missing Manual
(72,24 zł najniższa cena z 30 dni)
72.24 zł
84.99 zł(-15%) -
Promocja
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. F- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can d- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.But there is a growing recognition- ePub + Mobi pkt
Security and Usability. Designing Secure Systems that People Can Use Security and Usability. Designing Secure Systems that People Can Use
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopte- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every- ePub + Mobi pkt
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--b- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administ- ePub + Mobi pkt
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those- ePub + Mobi pkt
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.De- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is- ePub + Mobi pkt
Kerberos: The Definitive Guide. The Definitive Guide Kerberos: The Definitive Guide. The Definitive Guide
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of e- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensiv- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh- ePub + Mobi pkt
RADIUS. Securing Public Access to Private Resources RADIUS. Securing Public Access to Private Resources
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rig- ePub + Mobi pkt
Database Nation. The Death of Privacy in the 21st Century Database Nation. The Death of Privacy in the 21st Century
(50,91 zł najniższa cena z 30 dni)
50.91 zł
59.90 zł(-15%) -
Promocja
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and person- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Dzięki książce "Rootkity. Sabotowanie jądra systemu Windows" poznasz swojego przeciwnika i nauczysz się z nim walczyć, tworząc własny arsenał. Greg Hoglund i James Butler przedstawiają sposoby, z jakich korzystają hakerzy, aby włamywać się do komputerów i używać ich bez wiedzy właścicieli.
- Druk pkt
Czasowo niedostępna