W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.
Bezpieczeństwo systemów
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
Podstawy ochrony komputerów
Niedostępna
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
Niedostępna
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
Threat Modeling
-
Blockchain i bezpieczeństwo systemów rozproszonych
-
Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity
-
Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition
-
Kerberos: The Definitive Guide. The Definitive Guide
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
ISACA Certified in Risk and Information Systems Control (CRISC(R)) Exam Guide. A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
-
CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition
-
Zero Trust Networks. 2nd Edition
-
Software Supply Chain Security
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems
-
Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
-
Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition
-
The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed
-
OpenBSD. Tworzenie firewalli za pomocą PF
-
Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs
-
Metody zabezpieczenia cyfrowego. Pozyskiwanie dowodów narzędziami linuksowymi
-
Hacking Kubernetes
-
Data Governance: The Definitive Guide
-
Jira Software Essentials. Plan, track, and release great applications with Jira Software - Second Edition
-
Bezpieczeństwo urządzeń mobilnych. Receptury
Niedostępna
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP. Rekomendacje
-
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY
-
A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Strategie cyberbezpieczeństwa współczesnego świata
-
System bezpieczeństwa w cyberprzestrzeni RP
-
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition
-
Implementing DevSecOps Practices. Supercharge your software security with DevSecOps excellence
-
Malware Science. A comprehensive guide to detection, analysis, and compliance
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition
-
Hacker Culture A to Z
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Identity-Native Infrastructure Access Management
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Practical Data Privacy
-
Security Chaos Engineering
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Cyberjutsu
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming
-
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
-
Consul: Up and Running
-
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure
-
MS-700 Managing Microsoft Teams Exam Guide. Configure and manage Microsoft Teams workloads and achieve Microsoft 365 certification with ease - Second Edition
-
Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
-
Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition
-
Offensive Shellcode from Scratch. Get to grips with shellcode countermeasures and discover how to bypass them
-
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory
-
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems
-
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
Essential Cryptography for JavaScript Developers. A practical guide to leveraging common cryptographic operations in Node.js and the browser
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition
-
Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition
-
Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence
-
Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Certified Information Security Manager Exam Prep Guide. Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence
-
Microsoft Azure Security Technologies Certification and Beyond. Gain practical skills to secure your Azure environment and pass the AZ-500 exam
-
97 Things Every Information Security Professional Should Know
-
Nmap Network Exploration and Security Auditing Cookbook. Network discovery and security scanning at your fingertips - Third Edition
-
Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Zscaler Cloud Security Essentials. Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler
-
Modern Cryptography for Cybersecurity Professionals. Learn how you can leverage encryption to better secure your organization's data
-
Infosec Strategies and Best Practices. Gain proficiency in information security using expert-level strategies and best practices
-
Modern Data Protection
-
Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents
-
Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology
-
Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
-
Rootkity i Bootkity
-
Techniki twórców złośliwego oprogramowania. Elementarz programisty
Niedostępna
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
Niedostępna
-
Cryptography Algorithms. Build new algorithms in encryption, blockchain, quantum, zero-knowledge, and homomorphic algorithms - Second Edition
-
Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR
-
Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection
-
Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense