Bezpieczeństwo systemów - książki
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
Hakuj jak duch. Łamanie zabezpieczeń środowisk chmurowych
-
ISO 27001/ISO 27002. A guide to information security management systems
-
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część I Wprowadzenie
-
PDF
-
-
Ukryta tożsamość. Jak się obronić przed utratą prywatności
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Profesjonalne testy penetracyjne. Zbuduj własne środowisko do testów
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Bezpieczeństwo systemów informatycznych firm i instytucji
-
PDF
-
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Jak nie dać się złapać na wędkę. O bezpieczeństwie urządzeń mobilnych
-
Bądź bezpieczny w cyfrowym świecie. Poradnik bezpieczeństwa IT dla każdego
-
The OSINT Handbook. A practical guide to gathering and analyzing online information
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
TWOJE BEZPIECZEŃSTWO W ŚWIECIE CYBER I AI Część 2 Cyberhigiena 2025
-
PDF
-
-
Bash Shell Scripting for Pentesters. Master the art of command-line exploitation and enhance your penetration testing workflows
-
Inside Cyber Warfare. 3rd Edition
-
DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud
-
API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation
-
Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
-
The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior
-
Defensive Security Handbook. 2nd Edition
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense
-
The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Adversary Emulation with MITRE ATT&CK
-
ChatGPT for Cybersecurity Cookbook. Learn practical generative AI recipes to supercharge your cybersecurity skills
-
TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
PDF
-
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
Hacking Kubernetes
-
97 Things Every Information Security Professional Should Know
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
97 Things Every SRE Should Know
-
Hakowanie sztucznej inteligencji
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Building Secure and Reliable Systems. Best Practices for Designing, Implementing, and Maintaining Systems
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Ransomware. Defending Against Digital Extortion
-
Effective Monitoring and Alerting. For Web Operations
-
Internet Forensics
-
Podstawy bezpieczeństwa w systemie Windows
-
PDF + ePub
-
-
Kliknij tutaj, aby zabić wszystkich. Bezpieczeństwo i przetrwanie w hiperpołączonym świecie
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Bezpieczeństwo aplikacji mobilnych. Podręcznik hakera
-
Linux. Bezpieczeństwo. Receptury
-
Linux - bezpieczny komputer osobisty dla początkujących. Wydanie II
-
PDF
-
-
CISA - Certified Information Systems Auditor Study Guide. Aligned with the CISA Review Manual 2024 with over 1000 practice questions to ace the exam - Third Edition
-
Site Reliability Engineering Handbook
-
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
-
Hacking Tricks, Methods, and Offensive Strategies
-
Cyber Security Kill Chain - Tactics and Strategies. Breaking down the cyberattack process and responding to threats
-
Attack Surface Management
-
Combating Cyberattacks Targeting the AI Ecosystem. Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities
-
Cryptography Algorithms. Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography - Second Edition
-
Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps
-
Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity
-
Python for Cybersecurity Cookbook
-
Consul: Up and Running
-
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
DevOps Bootcamp. The fastest way to learn DevOps
-
Digital Identity
-
Dane i Goliat. Ukryta bitwa o Twoje dane i kontrolę nad światem
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Bezpieczeństwo osób i systemów IT z wykorzystaniem białego wywiadu
-
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
Zbrodnie przyszłości. Jak cyberprzestępcy, korporacje i państwa mogą używać technologii przeciwko Tobie
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Reverse Engineering Armv8-A Systems. A practical guide to kernel, firmware, and TrustZone analysis
-
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki
-
PDF + ePub + Mobi
-
-
Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience
-
Cyberjutsu
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
CompTIA CySA+ (CS0-003) Certification Guide. Pass the CySA+ exam on your first attempt with complete topic coverage, expert tips, and practice resources
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część 2 Cyberhigiena
-
PDF
-
-
Praktyczna Analiza Malware. Przewodnik po usuwaniu złośliwego oprogramowania
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
CompTIA(R) SecurityX(R) CAS-005 Certification Guide. Master advanced security strategies and confidently take the new CAS-005 exam - Second Edition
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Metasploit. Receptury pentestera. Wydanie II
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Bezpieczne programowanie. Aplikacje hakeroodporne
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Mroczne odmęty phishingu. Nie daj się złowić!
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Kali Linux. Testy penetracyjne. Wydanie II
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Cyberwojna. Metody działania hakerów
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-

