Bezpieczeństwo systemów - książki
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
-
PDF + ePub + Mobi
-
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
PDF
-
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Hacker Culture A to Z
-
Ethical Hacker's Certification Guide (CEHv11)
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers
-
Ghidra Software Reverse-Engineering for Beginners. Master the art of debugging, from understanding code to mitigating threats - Second Edition
-
Zdążyć przed hakerem. Jak przygotować firmę na cyberatak
-
Identity Security for Software Development
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
PDF
-
-
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
-
Domain-Driven Design in PHP. A Highly Practical Guide
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Nowoczesna kryptografia. Praktyczne wprowadzenie do szyfrowania
-
Inżynieria zabezpieczeń Tom II
-
Inżynieria zabezpieczeń Tom I
-
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
Computer Security and Encryption. Advanced Techniques for Securing Digital Information
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Modern Data Protection
-
Data Governance: The Definitive Guide
-
Threat Modeling
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Podstawy ochrony komputerów
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Wojny w cyberprzestrzeni. Koncepcje, strategie i taktyki, dzięki którym przetrwasz i ocalisz swoją organizację
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Bezpieczeństwo systemów informatycznych firm i instytucji
-
PDF
-
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Bezpieczne programowanie. Aplikacje hakeroodporne
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
TWOJE BEZPIECZEŃSTWO W ŚWIECIE CYBER I AI Część 2 Cyberhigiena 2025
-
PDF
-
-
Inside Cyber Warfare. 3rd Edition
-
DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
Defensive Security Handbook. 2nd Edition
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Adversary Emulation with MITRE ATT&CK
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
PDF
-
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
Hacking Kubernetes
-
97 Things Every Information Security Professional Should Know
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
97 Things Every SRE Should Know
-
Hakowanie sztucznej inteligencji
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Ransomware. Defending Against Digital Extortion
-
Effective Monitoring and Alerting. For Web Operations
-
Internet Forensics
-
Podstawy bezpieczeństwa w systemie Windows
-
PDF + ePub
-
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Kali Linux. Testy penetracyjne. Wydanie II
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Site Reliability Engineering Handbook
-
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
-
Hacking Tricks, Methods, and Offensive Strategies
-
Attack Surface Management
-
Combating Cyberattacks Targeting the AI Ecosystem. Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities
-
CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition
-
Cryptography Algorithms. Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography - Second Edition
-
Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity
-
Python for Cybersecurity Cookbook
-
Black Hat Python. Język Python dla hakerów i pentesterów
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Kontenery. Bezpieczne wdrożenia. Podstawowe koncepcje i technologie
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Amazon Web Services w akcji. Wydanie II
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Rootkity. Sabotowanie jądra systemu Windows
Czasowo niedostępna
-
Druk
-
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-

