W kategorii Bezpieczeństwo systemów zebrano książki, które pomogą zabezpieczyć Wasze prywatne lub firmowe komputery przed programami szpiegującymi, atakami hakerów czy wirusami. Poznacie procedury i normy związane z profesjonalną ochroną informacji oraz procedury przeprowadzenia audytu bezpieczeństwa. Opanujecie zaawansowane techniki zapewniające bezpieczeństwo komputerów, niezależnie jaki system operacyjny został na nich zainstalowany. Jeżeli jesteście twórcami oprogramowania, to znajdziecie tutaj informacje jak skutecznie zabezpieczyć własne aplikacje przed crackerami i hackerami, oraz jak tworzyć bezpieczne w użytkowaniu programy czy aplikacje sieciowe.
Bezpieczeństwo systemów
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
-
Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
-
Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
-
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
-
Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation
-
Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps
-
Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition
-
Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition
-
Java Programming for Beginners. Learn the fundamentals of programming with Java
-
OAuth 2.0 Cookbook. Protect your web applications using Spring Security
-
Industrial Cybersecurity. Efficiently secure critical infrastructure systems
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more
-
Odoo 10 Implementation Cookbook. Explore the capabilities of Odoo and discover all you need to implement it
-
Understanding Software. Max Kanat-Alexander on simplicity, coding, and how to suck less as a programmer
-
AWS Certified Developer - Associate Guide. Your one-stop solution to passing the AWS developer's certification
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version
-
Network Security Through Data Analysis. From Data to Action. 2nd Edition
-
Mastering C++ Programming. Modern C++ 17 at your fingertips
-
Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications
-
Exploring Experience Design. Fusing business, tech, and design to shape customer engagement
-
Serverless computing in Azure with .NET. Build, test, and automate deployment
-
Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools
-
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
-
Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer
-
Java 9 Programming Blueprints. Master features like modular programming, Java HTTP 2.0, and REPL by building numerous applications
-
Metasploit for Beginners. Create a threat-free environment with the best-in-class tool
-
Building Serverless Architectures. Unleash the power of AWS Lambdas for your applications
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more
-
Mastering Kali Linux for Web Penetration Testing. The ultimate defense against complex organized threats and attacks
-
Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques
-
DevOps Bootcamp. The fastest way to learn DevOps
-
Kali Linux Network Scanning Cookbook. A Step-by-Step Guide leveraging Custom Scripts and Integrated Tools in Kali Linux - Second Edition
-
Akka Cookbook. Recipes for concurrent, fast, and reactive applications
-
Metasploit Bootcamp. The fastest way to learn Metasploit
-
Applied Network Security. Proven tactics to detect and defend against all kinds of network attack
-
Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture
-
Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python
-
Enterprise Application Architecture with .NET Core. An architectural journey into the Microsoft .NET open source platform
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Practical OneOps. Implement DevOps with ease
-
Learning Java Lambdas. An in-depth look at one of the most important features of modern Java
-
QGIS Python Programming Cookbook. Automating geospatial development - Second Edition
-
OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition
-
.NET Design Patterns. Learn to Apply Patterns in daily development tasks under .NET Platform to take your productivity to new heights
-
NHibernate 4.x Cookbook. Click here to enter text. - Second Edition
-
Penetration Testing: A Survival Guide. A Survival Guide
-
Ransomware. Defending Against Digital Extortion
-
Mobile Forensics - Advanced Investigative Strategies. Click here to enter text
-
Kali Linux 2: Windows Penetration Testing. Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
-
Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks
-
Mastering Kali Linux Wireless Pentesting. Test your wireless network’s security and master advanced wireless penetration techniques using Kali Linux
-
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
-
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
The Architecture of Privacy. On Engineering Technologies that Can Deliver Trustworthy Safeguards
-
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
-
Accumulo. Application Development, Table Design, and Best Practices
-
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
-
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
JavaScript Security. Learn JavaScript security to make your web applications more secure
-
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
-
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
Effective Monitoring and Alerting. For Web Operations
-
Inside Cyber Warfare. Mapping the Cyber Underworld. 2nd Edition
-
Privacy and Big Data. The Players, Regulators, and Stakeholders
-
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
-
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
-
Hacking: The Next Generation. The Next Generation
-
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
-
Security Monitoring
-
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
-
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
ScreenOS Cookbook
-
Security Power Tools
-
The Internet: The Missing Manual. The Missing Manual
-
Internet Forensics
-
Security and Usability. Designing Secure Systems that People Can Use
-
Digital Identity
-
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
-
Snort Cookbook
-
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
-
Managing Security with Snort & IDS Tools
-
Security Warrior
-
Programming .NET Security
-
Practical UNIX and Internet Security. 3rd Edition
-
Web Security, Privacy & Commerce. 2nd Edition
-
Database Nation. The Death of Privacy in the 21st Century
-
Rootkity. Sabotowanie jądra systemu Windows
Czasowo niedostępna