Zawrzyj pakt z... Packtem!
-
Nowość Promocja
This book provides an inside look at the realities of being a Chief Information Security Officer (CISO), featuring invaluable lessons from global cybersecurity leaders on strategy, leadership, resilience, and navigating an evolving threat landscape.-
- PDF + ePub pkt
(152,10 zł najniższa cena z 30 dni)
50.90 zł
169.00 zł(-70%) -
-
Promocja
Explore the world of cybersecurity, understand the hacker mindset, and discover career insights. Whether you're curious about digital security or considering a new career, this book equips you with essential skills to protect yourself online.-
- PDF + ePub pkt
(85,49 zł najniższa cena z 30 dni)
50.90 zł
94.99 zł(-46%) -
-
Promocja
This hands-on guide helps you deploy secure firewall policies with Palo Alto Networks. It covers policy fundamentals, Python automation, Panorama management, and zero-impact cutovers to ensure scalable, compliant, and effective network security.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
Arm processors are used in billions of devices, from smartphones to IoT. With Armv8-A powering AI chipsets and automotive systems, this book helps you develop expertise in this increasingly sought-after architecture.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
50.90 zł
139.00 zł(-63%) -
-
Promocja
The CAS-005 exam is a big leap in the CompTIA Advanced Security Practitioner track. This book provides the expertise, strategic thinking, and up-to-date knowledge needed to pass the exam and succeed in today's high-stakes security environments.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
Accelerate your cybersecurity journey with this master guide to Security Copilot. It presents a unique blend of advanced AI-driven techniques, thorough case studies, and innovative strategies essential for next-generation cyber defense.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
Master the realm of Cyber Threat Intelligence and Proactive Threat Hunting with 'Practical Threat Intelligence and Data-Driven Threat Hunting, 2nd edition'. This is your essential guide in the ever-evolving landscape of cyber threats.-
- ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
Learn how the cyber kill chain, a structured model that outlines the stages of a cyberattack, guides you through understanding threat actor behaviors and bolstering their ability to defend against evolving cyber threats.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
Prepare for the CompTIA CySA+ (CS0-003) exam with this guide covering security operations, incident response, and vulnerability management. Reinforce learning with interactive labs, exam-style questions, two practice exams, and targeted flashcards.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
This comprehensive guide covers key topics such as Microsoft Entra ID implementation, authentication and access management, external user management, and hybrid identity solutions, providing practical insights and techniques for SC-300 exam success.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
50.90 zł
139.00 zł(-63%) -
-
Promocja
This book is a comprehensive guide to using Ghidra for malware analysis, reverse engineering, and vulnerability detection. It covers everything from basic usage to advanced topics such as Ghidra plug-ins, kernel debugging, and binary diffing.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
This book covers everything from basic scripting to advanced techniques for reconnaissance, exploitation, and integration with AI. You'll master essential skills to automate tasks, analyze data, and enhance cybersecurity assessments.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
Learn all about Microsoft Defender for Identity in depth and master the art of securing digital identities against emerging threats with hands-on guidance to elevate your cybersecurity skills to new heights.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
This edition provides practical recipes for both common and advanced administrative tasks, covering everything from individual apps to comprehensive security and compliance across the entire Microsoft 365 suite using Microsoft Defender.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
Excel in the CISA exam with this guide, covering IT governance, systems development, operations, and asset protection. The book includes practical examples and over 1000 targeted practice test questions to prepare you for the CISA exam.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
50.90 zł
139.00 zł(-63%) -
-
Promocja
Master the CNAPP lifecycle with this comprehensive guide that will teach you how to plan, deploy, and operationalize cloud security using Microsoft Defender for Cloud, enhancing your security posture across multicloud environments.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
50.90 zł
139.00 zł(-63%) -
-
Promocja
Ace the SC-100 exam with this essential guide, covering advanced cloud security strategies, zero-trust architecture, and GRC evaluations. Benefit from real-world examples and practice exams questions to ensure certification success.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
50.90 zł
139.00 zł(-63%) -
-
Promocja
The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
50.90 zł
129.00 zł(-61%) -
-
Promocja
Embark on a dynamic journey through command shells with this hands-on manual. From the Linux staple Bash to rising stars like Z shell and PowerShell, master their power for Linux, macOS, and Unix.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
50.90 zł
139.00 zł(-63%) -
-
Promocja
Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
This book is a valuable resource that offers practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This latest edition of Practical Hardware Pentesting features even more practical advice on how to pentest various devices, from IoT to simpler hardware. As you progress through the chapters, you'll quickly learn the most common attack techniques, as well as ways to secure embedded systems and build more secure devices.-
- ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Comprehensive guidance on evaluating cybersecurity, conducting risk assessments, and auditing IT systems for compliance across multiple platforms like AWS, Azure, and GCP.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
This book covers threat management, investigation, automation, and integration with other security tools to fortify organizational cybersecurity defenses effectively.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Navigate the evolving software security landscape with Crafting Secure Software. This guide equips decision makers to understand and address risks, ensure compliance, and build a culture of security within development teams.-
- PDF + ePub pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł(-82%) -
-
Promocja
Advance in your cybersecurity career with targeted interview preparation, practical guidance, and insider tips. Discussing roles from cybersecurity engineer to CISO, this edition addresses reader feedback and covers the latest industry developments.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
From secure development environments to continuous security and compliance integration, this comprehensive guide equips you with the skills to implement a robust code-to-cloud process tailored for Azure environments.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
The book provides a solid understanding of SIS cybersecurity challenges and artifacts required to ensure the safety of mission-critical systems. It also serves as a strong foundation for anyone looking to boost their industrial security skill set.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Get ahead in cryptography with this second edition, covering symmetric and asymmetric encryption, zero-knowledge protocols, and quantum cryptography. Designed for cybersecurity pros, it covers updated techniques to combat evolving cyber threats.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book helps you to explore software security through gamified threat modeling, uncovering risks while making it enjoyable. You'll learn to identify, mitigate, and defend against threats, enhancing your system's security.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
This comprehensive book helps you understand layered security. You'll cover essential concepts, from risk assessment to proactive defense strategies.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
With this book you'll learn advanced AI security techniques and defend against manipulation, evasion, prompt injection, and privacy attacks. You'll be able to protect models from poisoning, theft, and tampering, safeguarding your AI systems.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book helps you learn about decentralized identities, blockchains, and associated technologies, offering insights for leveraging these tools to construct secure and seamless digital experiences.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify and fix vulnerabilities. From emerging threats to best practices, this book helps you defend and safeguard your APIs.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Automating Security Detection Engineering will equip you with advanced tools and skills to scale your use case lifecycle and enhance your detection and threat response capabilities.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
This book covers program selection, security methodologies, and advanced techniques like enumeration and privilege escalation. You’ll gain the skills to excel in bug bounty programs, contributing to enhanced cybersecurity while maximizing rewards.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
Introduction to Kali Purple combines red and blue team tools in a single computing environment that allows both the setup and testing of a miniature security operations center, from setting up a SIEM environment to automation, all in one location.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the knowledge and tools necessary to navigate the complex landscape of password security with confidence.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
This book will help you understand malware development by delving into the intricate mechanisms of malware development, injection attacks, and advanced evasion strategies with over 80 real-life examples.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
This book covers the fundamentals of Windows 365 and Azure Virtual Desktop, addressing endpoint security challenges. You’ll also explore advanced security measures for virtual environments.-
- PDF + ePub pkt
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book helps entry, mid-level, and senior managers master soft skills, craft a compelling brand, and strategically plan their career in C-suite roles with the help of expert insights needed for success in digital leadership and executive roles.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
A comprehensive guide to critical infrastructure and cybersecurity, essential for those concerned about modern safety. Gain insights into growing cyber threats, system vulnerabilities, and common attacks. Learn practical techniques for protecting CI.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book provides invaluable insights into the evolving security landscape, offering practical strategies for implementing and maximizing the effectiveness of EDR tools.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Implementing Palo Alto Prisma Access not only teaches you how and why to deploy Prisma Access, but also delves into component interaction. Discover how to leverage advanced configurations to optimize the user experience and tighten your security.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing resilient security measures, all tailored for varying levels of expertise.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
In an era plagued by hacking and security breaches, this book takes you through Kali Linux's latest version, addressing critical security concerns and finding hidden vulnerabilities as you learn penetration testing.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Catapult your cybersecurity expertise to new heights using expert-backed recipes. With this cookbook, you'll leverage the power of large language model generative AI like ChatGPT to gain a competitive edge in the ever-changing cybersecurity domain.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.-
- PDF + ePub pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł(-82%) -
-
Promocja
Facing cyber threats and compliance challenges? Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies to defend against cyber threats and secure cloud, hybrid, and on-premises environments.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
The OSINT Handbook book helps you understand the significance of open-source intelligence and master advanced techniques and tools, equipping you with the skills you need to navigate the digital landscape effectively.-
- PDF + ePub pkt
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł(-69%) -
-
Promocja
Manage physical and Cloud based endpoints, boost security, and simplify app control with ease. Stay up to date with the latest features and cloud services, empowering you to excel in device management. Master Intune, master your endpoints.-
- PDF + ePub pkt
Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition
Christiaan Brinkhoff, Per Larsen, Steve Dispensa, Scott Manchester
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.-
- PDF + ePub pkt
(71,91 zł najniższa cena z 30 dni)
29.90 zł
79.90 zł(-63%) -
-
Promocja
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
TLS is the most important and widely used security protocol in the world. This book takes you on a journey through modern cryptography with TLS as the guiding light. It explains all necessary cryptographic primitives and how they are used within TLS. You’ll explore the inner workings of TLS and its design structure.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book will help you build a comprehensive foundation in cybersecurity and prepare you to overcome the challenges of today's digital world.-
- ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you'll be able to shift security toward the left, enabling you to merge security into coding in no time.-
- PDF + ePub pkt
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł(-69%) -
-
Promocja
Data Science for Malware Analysis is a guide to the synergy of cybersecurity and data science. You'll learn about malware lifecycle and data science techniques for improved detection and analysis. You'll decipher key regulations like GDPR and CCPA.-
- PDF + ePub pkt
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł(-69%) -
-
Promocja
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. This book covers the nuts and bolts of how to keep your organization safe by helping you understand the intricacies of mitigating risks, creating an implementation roadmap, ensuring continuous improvement, and beyond.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to th-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Master automotive cybersecurity with this practical guide to ISO 21434 and UNECE regulations. Learn to integrate security into the development lifecycle, perform threat modeling, and implement cyber defenses to build secure, cyber-resilient vehicles.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is an enterprise IT risk management professional's dream. With its in-depth approach and various self-assessment exercises, this book arms you with knowledge of every single aspect of the certification, and is a fantastic career companion after you're certif-
- PDF + ePub pkt
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł(-83%) -
-
Promocja
This is a practical guide that enables SOC professionals to analyze the most common security appliance logs that exist in any environment.-
- PDF + ePub pkt
(161,10 zł najniższa cena z 30 dni)
29.90 zł
179.00 zł(-83%) -
-
Promocja
PowerShell is a powerful framework and tool that can help both red and blue teamers. It's easy to learn and provides direct access to the Windows subsystem and APIs. This book will provide you with the skills and knowledge to make the most of PowerShell from both a red and blue team perspective. You'll learn to attack, secure, and build a robust se-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
Master detection engineering with this hands-on guide. Learn to build, test, and optimize security detections using real-world scenarios, open-source tools, and industry frameworks like MITRE ATT&CK.-
- PDF + ePub pkt
(152,10 zł najniższa cena z 30 dni)
29.90 zł
169.00 zł(-82%) -
-
Promocja
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
With .NET MAUI for C# Developers, you’ll learn to create cross-platform apps for iOS, Android, Windows, and Mac by writing the code once and leveraging the application to automatically produce native code for each. With the help of this book, you’ll be well prepared to build commercial MAUI programs that integrate into the overall .NE-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
This book provides a security baseline to reduce the risk of future attacks. The chapters will teach you how to secure your Windows endpoint, protect devices with Microsoft Defender, and secure hybrid workloads using Azure Arc, enabling you to protect your infrastructure, network, and data with the help of SASE and the Zero Trust model.-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.-
- PDF + ePub pkt
(85,49 zł najniższa cena z 30 dni)
29.90 zł
94.99 zł(-69%) -
-
Promocja
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
e_39wq/e_39wq.mp3 e_39wqAs hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.-
- PDF + ePub
- Audiobook MP3 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
e_3a91/e_3a91.mp3 e_3a91This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, you’ll learn how cloud evolution affected identity strategy within the enterprise.-
- PDF + ePub
- Audiobook MP3 pkt
(89,91 zł najniższa cena z 30 dni)
29.90 zł
99.90 zł(-70%) -
-
Promocja
Cyber anonymity is very essential as most devices, applications, and browsers collect information on every single activity that you perform in cyberspace. This book helps you understand the importance of cyber anonymity and you will learn techniques that will help you perform tasks without disclosing your information.-
- PDF + ePub pkt
(89,91 zł najniższa cena z 30 dni)
29.90 zł
99.90 zł(-70%) -
-
Promocja
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.-
- PDF + ePub pkt
(170,10 zł najniższa cena z 30 dni)
29.90 zł
189.00 zł(-84%) -
-
Promocja
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
Cybersecurity – Attack and Defense Strategies, Third Edition is a completely revised new edition of this bestselling book that covers the very latest security threats and defense strategies.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
Helm is a powerful open-source tool for automating application deployments on Kubernetes. Managing Kubernetes Resources Using Helm provides you with the ability to significantly reduce operational stress around application deployment and lifecycle management.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book is a technical reference that investigates, analyzes, and explains every part of the FastAPI framework and demonstrates the use of these parts by helping you solve problems. Some topics are experimental and original given the current development setups. Overall, the book is a recipe, blueprint, study, and reference combined into one.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin by creating your very first app from the get-go. You’ll learn how to use it as a means to explore and understand the Honeycode development environment and concepts.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
e_3a8y/e_3a8y.mp3 e_3a8yThis book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.-
- PDF + ePub
- Audiobook MP3 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.-
- PDF + ePub pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
This book will focus right from scratch on how to set up an environment and perform reverse engineering on iOS and Android mobile apps. The book takes you on a journey of exploring the internals of mobile apps, how they are built, and how to take each piece apart while trying to understand the internal working of the apps.-
- PDF + ePub pkt
(89,91 zł najniższa cena z 30 dni)
29.90 zł
99.90 zł(-70%) -
-
Promocja
Simplifying security concepts of Microsoft Azure and Microsoft 365, this book will help you gain knowledge necessary to take and pass Exam SC-900 to achieve the Microsoft Security, Compliance, and Identity Fundamentals certification. You'll be able to implement the acquired practical knowledge in real-world scenarios in no time.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam's objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.-
- PDF + ePub pkt
(197,10 zł najniższa cena z 30 dni)
29.90 zł
219.00 zł(-86%) -
-
Promocja
e_3a8v/e_3a8v.mp3 e_3a8vThis book takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.-
- PDF + ePub
- Audiobook MP3 pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
Mastering Cyber Intelligence provides critical knowledge that will help you stay ahead of adversaries and proactively protect your organization against known and unknown cyber threats. You'll build the security skills required to conduct effective threat intelligence, integrate it into operations, and identify gaps in security postures.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Security is integrated into every cloud, but most users take cloud security for granted. Revised to cover product updates up to early 2022, this book will help you understand Microsoft Azure's shared responsibility model that can address any challenge, cybersecurity in the cloud, and how to design secure solutions in Microsoft Azure.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
The evolving ransomware threat landscape brings new challenges to the security personnel of many organizations. The effects of human-operated attacks make practical security approaches the need of the hour as proper response and investigation are crucial. This book discusses how to use these approaches, focusing on real-world scenarios and tools.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Shellcode is code that is used to execute a command within software memory to take control of or exploit a target computer. Offensive Shellcode from Scratch helps you to understand what shellcode is, along with its components, the tools used to build shellcode, and how shellcode can be used within Linux and Windows.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
Memory forensics is a vital part of modern digital forensic examinations as threat actors have started using memory-based malware more often. This comprehensive guide focuses on the application of modern memory forensics techniques to detect hidden threats in memory and reconstruct user activity based on volatile data.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
This book covers in detail all the objectives of the SC-200: Microsoft Security Operations Analyst exam. The book offers a blend of theory and practical examples that will not only help you pass this exam but also implement the knowledge in real-world scenarios.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
e_39yf/e_39yf.mp3 e_39yfCompTIA Advanced Security Practitioner (CASP+) candidates need to stay up to date with the emerging technologies and threats in this fast-changing environment. This book helps you to apply CASP+ concepts, understand processes and methodologies, and discover industry best practices for achieving CASP+ certification.-
- PDF + ePub
- Audiobook MP3 pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This book is a guide to understanding new-age protocols and algorithms that are emerging for data protection in cybersecurity and information and communications technology (ICT) with the help of examples and use cases. You’ll begin by exploring classical cryptography and later progress to implementing algorithms for security and data privacy-
- PDF + ePub pkt
(116,10 zł najniższa cena z 30 dni)
29.90 zł
129.00 zł(-77%) -
-
Promocja
With this guide for developers, you'll learn how to build apps that use common cryptographic operations to improve security and respect user privacy. You'll understand how, when, and why to use safe, modern cryptographic algorithms and libraries in your code. You’ll learn using plenty of code samples in JavaScript for both Node.js and the br-
- PDF + ePub pkt
(98,10 zł najniższa cena z 30 dni)
29.90 zł
109.00 zł(-73%) -
-
Promocja
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition provides you with an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This book will take you through the latest version of Kali Linux to help you efficiently deal with crucial security aspects such as confidentiality, integrity, availability, and access control.-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
This book will guide you in improving your security posture and building robust and predictable security operations. You'll learn to design processes for the changing landscape of security operations, from designing defensive architectures to passive defense, blue and purple teaming, threat intelligence agility, measuring business values, and more.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
29.90 zł
119.00 zł(-75%) -
-
Promocja
Veeam provides data protection for modern-day technical organizations. This book takes you through installation best practices, optimizations, and the 3-2-1-1-0 rule, before going on to examine repository and proxy-related topics and advanced concepts such as CDP, extended object storage support, Veeam ONE enhancement, and Orchestrator.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
A good security posture is essential for an organization's Microsoft 365 tenant. This book will help you to understand how you can design and implement Information Protection within Microsoft 365 to protect your digital estate, on-premises as well as on SaaS platforms.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Use Microsoft’s own intelligent security service that brings together cloud security and AI to protect your organization. Microsoft Sentinel in Action will help you to gain enough understanding to make the most of Azure services and secure your environment against modern cybersecurity threats.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
Security assessment in the ICS environment is often a challenging task that requires divergent thinking. Pentesting Industrial Control Systems covers the nuts and bolts of specifically what to look for when securing an industrial control system.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
CISM is a globally recognized and much sought-after certification in the field of IT security. CISM Certification Guide is aligned with the latest edition of the CISM Review Manual and offers you complete, up-to-date coverage of CISM exam content so you can take the exam with confidence, fully equipped to pass the first time.-
- PDF + ePub + Mobi pkt
(206,10 zł najniższa cena z 30 dni)
29.90 zł
229.00 zł(-87%) -
-
Promocja
Security is a core component of any well-architected cloud environment and Azure is no different in this regard. With this book, you will learn how to implement multi-layered security controls to protect against rapidly evolving threats to Azure environments and prepare to take the AZ-500 exam to validate your Azure security knowledge.-
- PDF + ePub + Mobi pkt
(125,10 zł najniższa cena z 30 dni)
29.90 zł
139.00 zł(-78%) -
-
Promocja
This second edition of Industrial Cybersecurity is a practical guide to implementing a comprehensive and solid security program for the ICS environment. This book shows anyone new to industrial security or professionals looking to extend their industrial security posture how to effectively monitor their ICS environment.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
29.90 zł
149.00 zł(-80%) -
-
Promocja
e_3a0i/e_3a0i.mp3 e_3a0iCybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.-
- PDF + ePub + Mobi
- Audiobook MP3 pkt
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
(80,91 zł najniższa cena z 30 dni)
29.90 zł
89.90 zł(-67%) -


