Bezpieczeństwo systemów - książki
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
Ethical Hacking Workshop. Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
-
Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats
-
Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities
-
.NET MAUI for C# Developers. Build cross-platform mobile and desktop applications
-
Zed Attack Proxy Cookbook. Hacking tactics, techniques, and procedures for testing web applications and APIs
-
Bezpieczeństwo wewnętrzne na tle zmian w administracji publicznej
-
PDF
-
-
Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs
-
Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition
-
Building Python Microservices with FastAPI. Build secure, scalable, and structured Python microservices from design concepts to infrastructure
-
Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them
-
Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition
-
The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
97 Things Every Information Security Professional Should Know
-
Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software
-
Malware Analysis Techniques. Tricks for the triage of adversarial software
-
Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication
-
Microsoft 365 Security Administration: MS-500 Exam Guide. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
-
Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage
-
Cybersecurity - Attack and Defense Strategies. Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals - Second Edition
-
Binary Analysis Cookbook. Actionable recipes for disassembling and analyzing binaries for security risks
-
Cybersecurity Ops with bash. Attack, Defend, and Analyze from the Command Line
-
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Effective Monitoring and Alerting. For Web Operations
-
Internet Forensics
-
Bug Bounty i testy penetracyjne aplikacji webowych. Kurs video. Pierwsze kroki
-
Kali Linux. Testy penetracyjne. Wydanie II
Czasowo niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security
-
Backup i zarządzanie danymi w Windows 7. Praktyczny podręcznik
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Incident Management for Industrial Control Systems. Safeguard industrial control systems by mastering critical infrastructure cybersecurity
-
Security Intelligence with Sumo Logic. Your guide to an effective security detection and response program with the Sumo Logic platform
-
Unified SecOps Playbook. End-to-end enterprise security with Microsoft Sentinel, Defender XDR, and Security Copilot
-
SOC Analyst Career Guide. Become highly skilled in security tools, tactics, and techniques to jumpstart your SOC analyst career
-
A Day in the Life of a CISO. Personal Mentorship from 24+ Battle-Tested CISOs — Mentoring We Never Got
-
Cybersecurity Beginner's Guide. Understand the inner workings of cybersecurity and learn how experts keep us safe
-
The Art of Cyber Security. A practical guide to winning the war on cyber crime
-
The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework
-
The Ransomware Threat Landscape. Prepare for, recognise and survive ransomware attacks
-
NIST CSF 2.0. Your essential introduction to managing cybersecurity risks
-
Cyber Essentials. A guide to the Cyber Essentials and Cyber Essentials Plus certifications
-
Cyber Resilience. A Comprehensive Guide to Understanding and Implementing Cybersecurity Principles
-
Securing Cloud Services. A Comprehensive Approach to Safeguarding Cloud Infrastructure, Services, and Data
-
The California Privacy Rights Act (CPRA). An implementation and compliance guide
-
Hacking Tricks, Methods, and Offensive Strategies
-
CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książki
-
PDF + ePub + Mobi
-
-
Combating Cyberattacks Targeting the AI Ecosystem. Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities
-
Surviving A Cyberattack. A Comprehensive Guide to Digital Security for Families and Businesses
-
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki
-
PDF + ePub + Mobi
-
-
Microsoft Defender for Identity in Depth. An exhaustive guide to ITDR, breach prevention, and cyberattack response
-
Enhancing Your Cloud Security with a CNAPP Solution. Unlock the full potential of Microsoft Defender for Cloud to fortify your cloud security
-
Unveiling NIST Cybersecurity Framework 2.0. Secure your organization with the practical applications of CSF
-
Offensive Security Using Python. A hands-on guide to offensive tactics and threat mitigation using practical strategies
-
Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world
-
Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs
-
The Cybersecurity Mesh Architecture
-
IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing
-
Mastering Microsoft Defender for Office 365. Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting
-
Crafting Secure Software. An engineering leader's guide to security by design
-
Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems
-
Cryptography Algorithms. Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography - Second Edition
-
Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture
-
The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach
-
Cybersecurity. A Self-Teaching Introduction
-
Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience
-
Automating Security Detection Engineering. A hands-on guide to implementing Detection as Code
-
Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking
-
Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux
-
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
-
PDF + ePub + Mobi
-
-
SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki
-
PDF + ePub + Mobi
-
-
Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques
-
Hands-On Differential Privacy. Introduction to the Theory and Practice Using OpenDP
-
Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization
-
Strategie cyberbezpieczeństwa współczesnego świata
-
PDF + ePub + Mobi
-
-
Cybersecurity Architect's Handbook. An end-to-end guide to implementing and maintaining robust security architecture
-
Mastering Network Forensics
-
Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals
-
Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces
-
Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments
-
Information Security Handbook. Enhance your proficiency in information security program development - Second Edition
-
Automotive Cybersecurity Engineering Handbook. The automotive engineer's roadmap to cyber-resilient vehicles
-
Identity-Native Infrastructure Access Management
-
Python for Cybersecurity Cookbook
-
Security Orchestration, Automation, and Response for Security Analysts. Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
-
Practical Data Privacy
-
Security Chaos Engineering
-
Windows Ransomware Detection and Protection. Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender
-
CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam
-
Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level
-
Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes
-
Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization
-
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
-
Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition
-
Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory
-
Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition
-
An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments
-
iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
-
Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web
-
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
-
Cybersecurity - Attack and Defense Strategies. Improve your security posture to mitigate risks and prevent attackers from infiltrating your system - Third Edition
-
Modern Cybersecurity Strategies for Enterprises
-
Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO
-
Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict
-
Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
-
Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation
-
Rootkity. Sabotowanie jądra systemu Windows
Czasowo niedostępna
-
Druk
-
-
AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Łamanie i zabezpieczanie aplikacji w systemie iOS
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-
-
Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać?
Niedostępna
-
Druk
-
PDF + ePub + Mobi
-

