Bezpieczeństwo systemów - książki
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Black Hat Python. Język Python dla hakerów i pentesterów
-
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
Podstawy ochrony komputerów
Niedostępna
-
OpenBSD. Tworzenie firewalli za pomocą PF
-
Identity Security for Software Development
-
Practical Hardware Pentesting. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition
-
Strategie cyberbezpieczeństwa współczesnego świata
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
Hacking Kubernetes
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Przestępczość teleinformatyczna 2016
-
Kali Linux. Testy bezpieczeństwa, testy penetracyjne i etyczne hakowanie
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
Informatyka śledcza i cyberprzestępczość. Wybrane zagadnienia w ujęciu policyjnym
-
Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa
Czasowo niedostępna
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
Linux - bezpieczny komputer osobisty dla początkujących
-
Implementing Reverse Engineering
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing
-
Hack the Cybersecurity Interview. Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles - Second Edition
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
Bezpieczeństwo systemów informatycznych firm i instytucji
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools
-
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
Practical Network Security
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Bezpieczeństwo informacyjne
-
Inżynieria zabezpieczeń Tom II
-
Inżynieria zabezpieczeń Tom I
-
Bezpieczeństwo urządzeń mobilnych. Receptury
Niedostępna
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
Niedostępna
-
SZYFROWANIE BEZPIECZEŃSTWO KRYPTOGRAFIA: CZĘŚĆ 1 Podstawowe pojęcia i koncepcje
-
CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition
-
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część I Wprowadzenie
-
Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition
-
Network Security Strategies. Protect your network and enterprise against advanced cybersecurity attacks and threats
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Deep Web bez tajemnic. Kurs video. Pozyskiwanie ukrytych danych
-
Kali Linux. Testy penetracyjne. Wydanie II
Czasowo niedostępna
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
Niedostępna
-
Practical Threat Intelligence and Data-Driven Threat Hunting. Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CK™ & open tools - Second Edition
-
Intelligent Continuous Security
-
CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książki
-
Cyber Security Kill Chain - Tactics and Strategies. Breaking down the cyberattack process and responding to threats
-
Attack Surface Management
-
Managing the Cyber Risk
-
CompTIA CySA+ (CS0-003) Certification Guide. Pass the CySA+ exam on your first attempt with complete topic coverage, expert tips, and practice resources
-
Microsoft Identity and Access Administrator SC-300 Exam Guide. Pass the SC-300 exam with confidence by using exam-focused resources - Second Edition
-
Vulnerability Assessment and Penetration Testing (VAPT)
-
Combating Cyberattacks Targeting the AI Ecosystem. Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities
-
Surviving A Cyberattack. A Comprehensive Guide to Digital Security for Families and Businesses
-
Ghidra Software Reverse-Engineering for Beginners. Master the art of debugging, from understanding code to mitigating threats - Second Edition
-
Advanced Malware Analysis and Intelligence
-
Bash Shell Scripting for Pentesters. Master the art of command-line exploitation and enhance your penetration testing workflows
-
Microsoft Defender for Identity in Depth. An exhaustive guide to ITDR, breach prevention, and cyberattack response
-
Enhancing Your Cloud Security with a CNAPP Solution. Unlock the full potential of Microsoft Defender for Cloud to fortify your cloud security
-
Unveiling NIST Cybersecurity Framework 2.0. Secure your organization with the practical applications of CSF
-
Microsoft Cybersecurity Architect Exam Ref SC-100. Ace the SC-100 exam and develop cutting-edge cybersecurity strategies - Second Edition
-
The Ultimate Linux Shell Scripting Guide. Automate, Optimize, and Empower tasks with Linux Shell Scripting
-
Offensive Security Using Python. A hands-on guide to offensive tactics and threat mitigation using practical strategies
-
Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world
-
Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs
-
The Cybersecurity Mesh Architecture
-
Inside Cyber Warfare. 3rd Edition
-
Mastering Microsoft Defender for Office 365. Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting
-
Crafting Secure Software. An engineering leader's guide to security by design
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems
-
DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud
-
Learning Kali Linux. 2nd Edition
-
Cryptography Algorithms. Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography - Second Edition
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
-
Computer Security and Encryption. Advanced Techniques for Securing Digital Information
-
Cybersecurity. A Self-Teaching Introduction
-
Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps
-
Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience
-
Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
Automating Security Detection Engineering. A hands-on guide to implementing Detection as Code
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
Defensive Security Handbook. 2nd Edition
-
97 Things Every Application Security Professional Should Know
-
SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
Hands-On Differential Privacy
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Adversary Emulation with MITRE ATT&CK
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
Mastering Network Forensics
-
Zero Trust Networks. 2nd Edition
-
Skanowanie sieci z Kali Linux. Receptury
Czasowo niedostępna
-
Splątana sieć. Przewodnik po bezpieczeństwie nowoczesnych aplikacji WWW
Niedostępna
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
Niedostępna
-
Metasploit. Receptury pentestera. Wydanie II
Niedostępna
-
Łamanie i zabezpieczanie aplikacji w systemie iOS
Niedostępna
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
Niedostępna