O. - ebooki
Tytuły autora: O. dostępne w księgarni Helion
-
Promocja
Blockchain Developer's Guide will show you how to create distributed blockchain applications which do not depend on a central server or datacenter. Starting with the basic principles of blockchain architecture exploring cryptography, you will then study consensus protocols, initial coin offerings, crypto-mining, DApp deployment, Ethereum applicatio-
- PDF + ePub + Mobi pkt
(152,10 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what the field is about, the book solves that problem. The book allows readers to train themselves as bug b-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Mastering Vim will introduce you to the wonderful world of Vim by example of working with Python code and tools in a project-based fashion. This book will prompt you to make Vim your primary IDE as you will learn to use it for any programming language.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master the art of using reverse engineering.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This second edition of Kali Linux 2: Windows Penetration Testing provides approaches and solutions to the issues of modern penetration testing for a Microsoft Windows environment. As a pen tester, you need to be able to understand and use the best available tools - this book addresses these needs with maximum in a cost and time efficient way.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
In recent years, the C# and .NET ecosystem has grown so explosively that it's nearly impossible to keep up. This collection of programming challenges helps you explore some of the less-traveled byways of programming concepts in general and C# in particular.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Nowadays, configuring a network and automating security protocols are quite difficult to implement. However, using Python makes it easy to automate this whole process. This book explains the process of using Python for building networks, detecting network errors, and performing different security protocols using Python Scripting.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This book will provide you with practical recipes to manage the build system using CMake. You will be taken through a series of task-based examples that demonstrate how to employ the CMake toolbox to build portable and modular code and to minimize the code complexity of the build infrastructure.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Viktor Farcic’s latest book, The DevOps 2.3 Toolkit: Kubernetes, will take you on a hands-on journey with Viktor into the world of Kubernetes, and the tools not only behind the official project but also the wide-range of third-party apps that are available for you to use.-
- PDF + ePub + Mobi pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Bezpieczeństwo informacyjne. Nowe wyzwania, to uaktualniona wersja publikacji z 2012 roku. Książka skierowana jest do wszystkich specjalistów zajmujących się, z racji wykonywanego zawodu, bezpieczeństwem informacyjnym, a także studentów takich specjalności jak: bezpieczeństwo komputerów, bezpieczeństwo sieci i systemów, czy inżynieria bezpieczeństw- ePub + Mobi pkt
(58,80 zł najniższa cena z 30 dni)
67.20 zł
84.00 zł(-20%) -
Promocja
Ethereum is an open-source, public, Blockchain-based distributed computing platform, and operating system featuring smart contract functionality which builds decentralized applications. If you want to get started with Ethereum and Solidity or you are among the many developers already working with this platform, this book is your one-stop guide.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Kotlin is a general purpose, object-oriented language that primarily targets the JVM and Android. Intended to be a better alternative to Java, its main goals are high interoperability with Java and increased developer productivity. Kotlin is still a new language and this book will help you to learn the core Kotlin features and get your ready for d-
- PDF + ePub + Mobi pkt
(80,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
This book is a comprehensive guide to help developers, architects, and senior programmers advance their career in the software architecture domain. You'll understand the expectations of users and other stakeholders from the point of view of an architect and will learn to communicate your architecture to the relevant stakeholders.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Nowoczesna Kryptografia to praktyczny przewodnik po współczesnym szyfrowaniu. Książka zawiera szczegółowy opis podstawowych pojęć matematycznych, leżących u podstaw kryptografii oraz treściwe omówienie sposobu ich działania. Dzięki niej dowiesz się, czym jest szyfrowanie uwierzytelnione, bezpieczna losowość, funkcje skrótu, szyfry blokowe oraz tech- ePub + Mobi pkt
(65,80 zł najniższa cena z 30 dni)
75.20 zł
94.00 zł(-20%) -
Promocja
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.-
- PDF + ePub + Mobi pkt
(80,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis and memory forensics.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Having a knowledge of design patterns enables you, as a developer, to improve your code base, promote code reuse, and make the architecture more robust. As languages evolve, new features take time to fully understand before they are adopted en masse. The mission of this book is to ease the adoption of the latest trends and provide good practices fo-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do.-
- PDF + ePub + Mobi pkt
(80,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Design patterns enable you to speed up the development process by providing tested, proven development paradigms. Reusing design patterns helps prevent complex issues, improves your code base, promotes code reuse, and makes the architecture more robust. This book will ease the adoption of design patterns in Kotlin and provide best practices.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
A balance between implementing complex applications and optimizing performance is a present-day need. This book helps you achieve this balance while developing and deploying applications with Kotlin. You will learn how to use profiling tools to detect performance issues and discover bytecode that is generated to overcome performance bottlenecks.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
A key problem of software development today is the software bloat, where huge toolchains and development environments are needed in software coding and deployment. Red significantly reduces this bloat by offering a minimal but complete toolchain. This is the first introductory book on Red, and it will get you up and running as quickly as possible.-
- PDF + ePub + Mobi pkt
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Windows Server 2016 is an operating system designed to run on today’s highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the s-
- PDF + ePub + Mobi pkt
(80,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
Serverless architectures allow you to build and run applications and services without having to manage the infrastructure. Many companies have adopted this architecture to save cost and improve scalability. This book will help you design serverless architectures for your applications with AWS and Python.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Organizations have started to adapt to hybrid cloud solutions in order to leverage advantages such as untested workloads, cloud-bursting, cloud service brokering, and more. The major goal of this book is to help developers maximize their existing skills and overcome the complexities of developing flexible and unified apps on the cloud.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Serverless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes. For good reason, serverless-based applications handle many of the problems developers face when running systems and servers such as fault-tolerance, centralized logging, horizontal scalability, and deployments, to name a few. Ad-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Kubernetes provides a means to describe what your application needs and how it should run by orchestrating containers on your behalf to operate your software across a single, dozens, or hundreds of machines. Originally created and open sourced from Google, you can use their technology to help run, test, and scale your applications regardless of whi-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Viktor Farcic’s latest book, The DevOps 2.2 Toolkit: Self-Sufficient Docker Clusters, takes you deeper into Docker, teaching you with a mixture of theory and hands-on how to successfully build both self-adaptive and self-healing-based systems.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
Python is a very powerful, high-level, object-oriented programming language. It has swiftly developed over the years to become the language of choice for software developers due to its simplicity. This book takes you through varied and real-life projects. The examples start with the basics and gradually increase in complexity, helping boost your sk-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with Insigh-
- PDF + ePub + Mobi pkt
Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition
Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
AWS is currently the market leader in the public cloud market.With the increasing global interest in leveraging cloud infrastructure, AWS Cloud from Amazon offers a cutting-edge platform for architecting, building, and deploying web-scale cloud applications. This book will help you in performing these tasks easily.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Microservices are a hot trend in the development world right now. Many enterprises have adopted this approach to achieve agility and the continuous delivery of applications to gain a competitive advantage. This book will take you through the different design patterns at different stages of the microservice application development process, along wit-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic forensics-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
With cybercrime on a rise, cybersecurity has become extremely vital to industries. Companies have started adopting more stringent ways of preventing system breaches. This book will explore Red Team tactics that can be used in penetration for accessing sensitive data and Blue Team tactics that can help you defend your system from complex attacks.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Kotlin has been the buzzword among developers ever since the release of new features in Kotlin 1.1. With Google's announcement of introducing first class support for Kotlin in their Android ecosystem, it's high time that Kotlin is realized as a mainstream language. Microservices aids in designing scalable, easy-to-maintain web applications. If you-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics, Second Edition and it delves into the concepts of mobile forensics and its importance in today’s world.-
- PDF + ePub + Mobi pkt
Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
For the past couple of decades, Linux has been extremely popular with systems administrators, for everything from creating networks and servers to automating their entire working environment. However, security has always been the major concern. With not many resources available in the Linux security domain, this book will be an invaluable resource-
- PDF + ePub + Mobi pkt
(170,10 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
Modern day businesses and enterprises are moving to cloud simply to improve efficiency and speed, achieve flexibility and cost-effectiveness, and for on-demand cloud services. However, enterprise cloud security remains a major concern for many businesses because migrating to the public cloud requires transferring some control over organizational as-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing and providing detailed covera-
- PDF + ePub + Mobi pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book brings with it an array of practical recipes for performing forensic examinations on mobile devices. It will show you how to treat data extraction, recovering, and decoding data on the mobile operating systems such as Android, iOS, Windows Mobile, and BlackBerry OS.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
The security of wireless networks is more important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking features of Kali Linux.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices. You will learn how to identify vulnerabilities in IoT device architect-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
The Lean methodology is a hit in startup land. It’s a movement that keeps growing – it will soon be the ultimate methodology for creating a startup that succeeds. That may sound great from a theoretical point of view, but what does that mean for you as an Android or iOS developer? By adopting Lean development principles, it’s-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Spring Security 4.2 is an incremental guide that will teach you how to protect your application from malicious users. Through this book, you will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
Since its inception, Git has attracted skilled developers due to its robust, powerful, and reliable features. It's incredibly fast branching ability transformed a piece of code from a niche tool for former Linux Kernel developers into a mainstream distributed versioning system. This book will help you overcome this fear and become adept in all the-
- PDF + ePub + Mobi pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Java Programming for Beginners is an excellent introduction to the world of Java programming, taking you through the basics of Java syntax and the complexities of object-oriented programming. Whether you’re a beginner to programming, or approaching an object-oriented language for the first time, this book delivers the focused training you ne-
- PDF + ePub + Mobi pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
GeoServer is an open-source server written in Java that allows users to share, process, and edit geospatial data. This book will guide you through the new features and improvements of GeoServer and will help you get started with it. GeoServer Beginner's Guide gives you a kick-start to build custom maps using your data without the need for costly co-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Go is a modern systems programming language, which allows the creation of systems applications and modules just above any kernel, e.g. Linux, and container, e.g. Docker. This book explains thread-safe and concurrent Go, and goes into writing server, cloud and systems-level applications. No more C style memory management, for instance. If you want t-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Technology plays an increasingly large role in our daily life and shows no signs of stopping. Now, more than ever, it is paramount that an investigator develops programming expertise to deal with increasingly large datasets. By leveraging the Python recipes explored throughout this book, we make the complex simple, quickly extracting relevant infor-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Microsoft’s launch of Windows 10 is a step toward satisfying the enterprise administrator’s needs for management and user experience customization. This book provides the enterprise administrator with the knowledge needed to fully utilize the advanced feature set of Windows 10 Enterprise.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how you-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
Promocja
Imagine creating and testing Java EE applications on Apache Tomcat Server or Wildfly Application Server in minutes along with deploying and managing Java applications swiftly. Sounds too good to be true? But you have a reason to cheer as such scenarios are only possible by leveraging Docker and Kubernetes.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Zebranie w monografii 18 rozdziałów będących rozwinięciem i uszczegółowieniem wystąpień z konferencji TAPT, ale także poruszających nieprezentowane na konferencji tematy powinno być atrakcyjne dla wielu czytelników zainteresowanych cyberprzestępczością. Będą one także przydatne dla studentów i wszystkich osób, które zajmują się zapewnieniem bezpiec(13,66 zł najniższa cena z 30 dni)
13.66 zł
17.07 zł(-20%) -
Promocja
Serverless architecture allows you to build and run applications and services without having to manage the infrastructure. Many companies have started adopting serverless architecture for their applications to save costs and improve scalability. This book will give you all the information you need to set up and deploy applications to Azure Serverle-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. Whether talking about digital forensics conducted by law enforcement or a corporate security department, the simple fact is that forens-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Got some experience of Angular under your belt? Want to learn everything about using advanced features for developing websites? This book is everything you need for the deep understanding of Angular that will set you apart from the developer crowd.Angular has introduced a new way to build applications. Creating complex and rich web applications, wi-
- PDF + ePub + Mobi pkt
Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd
Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
This book is an all-purpose toolkit for your programming career. It is split up into three main topic areas: Coder Skills, Freelancer Skills, and Career Skills to help you identify and answer the key questions and stumbling blocks that programmers encounter. It is a comprehensive guide containing more than 50 insights and methodologies that you can-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Java is a powerful language that has applications in a wide variety of fields. Right from playing games on your computer to performing banking transactions, Java is at the heart of everything. With this book, you will get a deep understanding of this robust programming language and how it can make your life easier. This collection of projects will-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
JMeter is a Java application designed to load and test performance for a web application. JMeter extends to improve the functioning of various other static and dynamic resources. This book is a great starting point to learn about JMeter. It covers the new features introduced with JMeter 3 and enables you to dive deep into the new techniques neede-
- PDF + ePub + Mobi pkt
(89,91 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Spring 5.0 is due to arrive with a myriad of new and exciting features that will change the way we’ve used the framework so far. This book will show you this evolution—from solving the problems of testable applications to building distributed applications on the Cloud.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Domain-Driven Design has arrived in the PHP community, but for every developer who has to implement it, little in terms of examples and guidance is available. Assuming you have an existing PHP project to deal with, this book enables you to take advantage of the DDD approach by following its practical stages to completion and learning the concepts-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and the IT operations team. The main goal of DevOps is to automate the software development process with proper processes that involve people to change the culture. This book will follow a bootcamp approach, which will-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Akka is an open source toolkit that simplifies the construction of distributed and concurrent applications on the JVM. This book will teach you how to develop reactive applications in Scala using the Akka framework.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
With the ever-increasing amount of data flowing in today’s world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Do you want to create better products and innovative solutions? User experience maps will help you understand users, gain strategic insights, and improve communication with stakeholders. Maps can also champion user-centricity within the organizationTwo advanced mapping techniques will be revealed for the first time in print, the behavioural change-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, takes you deeper into one of the major subjects of his international best seller, The DevOps 2.0 Toolkit, and shows you how to successfully integrate Docker Swarm into your DevOps toolset.-
- PDF + ePub + Mobi pkt
(296,10 zł najniższa cena z 30 dni)
305.10 zł
339.00 zł(-10%) -
-
Promocja
Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book will walk you through all the concepts and tools that Microsoft Azure has to offer and how these can be used in the DevOps environment. You will be introduced to use and management of Visual Studio Team Services (VSTS), so that you can understand the structure of the application that we will use as a sample throughout the book. You will u-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Microsoft .NET has always been the preferred framework for developing Enterprise applications that target the Windows platform. However, the release of .NET Core empowers senior developers and enterprise architects to think out of the box, and use .NET Core to design and develop robust applications that target multiple platforms.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
In this short book, we take an in-depth look at lambdas in Java and their supporting features. It covers essential topics, such as functional interfaces and type inference, and the key differences between lambdas and closures.-
- PDF + ePub + Mobi pkt
(350,10 zł najniższa cena z 30 dni)
359.10 zł
399.00 zł(-10%) -
-
Promocja
QGIS is a desktop geographic information system that facilitates data viewing, editing, and analysis. Based on version QGIS 2.18, this book will teach you how to write Python code that works with spatial data to automate geoprocessing tasks in QGIS.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
Penetration Testing: A Survival Guide. A Survival Guide
Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran
(269,10 zł najniższa cena z 30 dni)
278.10 zł
309.00 zł(-10%) -
-
Promocja
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security-
- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
This book gets you up and running with mobile forensics, covering everything from how to effectively deal with digital evidence to mobile acquisition tools and techniques. You’ll also gain insights into the various challenges faced while performing mobile forensics.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Delve into Kali Linux and get to grips with surveillance, network testing, and more with Kali Linux 2: Windows Penetration Testing. This book will give you hands-on experience and prepare you to apply your skills in the real world with the help of detailed explanations, examples, and expert techniques.-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether yo-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of-
- ePub + Mobi pkt
(92,65 zł najniższa cena z 30 dni)
84.92 zł
99.90 zł(-15%) -
-
Promocja
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level s-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
Promocja
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own th-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
(80,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
(76,49 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
(80,91 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been col-
- ePub + Mobi pkt
(59,42 zł najniższa cena z 30 dni)
55.24 zł
64.99 zł(-15%) -
-
Promocja
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Ne-
- ePub + Mobi pkt
(194,65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
-
Promocja
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books-
- ePub + Mobi pkt
(109,65 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is-
- ePub + Mobi pkt
(80,73 zł najniższa cena z 30 dni)
80.73 zł
94.99 zł(-15%) -
-
Promocja
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Be-
- ePub + Mobi pkt
(109,65 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techn-
- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
-
Promocja
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence-
- ePub + Mobi pkt
(80,73 zł najniższa cena z 30 dni)
80.73 zł
94.99 zł(-15%) -
-
Promocja
-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad-
- ePub + Mobi pkt
(109,65 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and kee-
- ePub + Mobi pkt
(152,15 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
Promocja
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u-
- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
-
Promocja
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all t-
- ePub + Mobi pkt
(67,92 zł najniższa cena z 30 dni)
67.92 zł
79.90 zł(-15%) -
-
Promocja
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can d-
- ePub + Mobi pkt
(109,65 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.But there is a growing recognition-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every-
- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
-
Promocja
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--b-
- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administ-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
Promocja
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
-
Promocja
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.De-
- ePub + Mobi pkt
(109,65 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the-
- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
-
Promocja
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is-
- ePub + Mobi pkt
(92,65 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
-
Promocja
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of e-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject-
- ePub + Mobi pkt
(109,65 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Promocja
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensiv-
- ePub + Mobi pkt
(152,15 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
Promocja
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh-
- ePub + Mobi pkt
(92,65 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
-
Promocja
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rig-
- ePub + Mobi pkt
(46,74 zł najniższa cena z 30 dni)
46.74 zł
54.99 zł(-15%) -