Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Promocja
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will-
- PDF + ePub pkt
(134,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Helm is a powerful open-source tool for automating application deployments on Kubernetes. Managing Kubernetes Resources Using Helm provides you with the ability to significantly reduce operational stress around application deployment and lifecycle management.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.-
- PDF + ePub pkt
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
(98,10 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Zabezpieczenie cyfrowe jest ważną częścią reakcji na incydenty pośmiertne i gromadzenia dowodów. Cyfrowi śledczy gromadzą, przechowują i zarządzają dowodami cyfrowymi w celu wsparcia spraw cywilnych i karnych takich jak: badanie naruszenia zasad organizacyjnych; rozstrzyganie sporów czy analizowanie cyberataków. Książka Metody zabezpieczenia cyfro- ePub + Mobi pkt
(67,58 zł najniższa cena z 30 dni)
87.20 zł
109.00 zł(-20%) -
Promocja
Basic to Advance research on the concepts and design of Cloud computing Key Features Comprehensively gives clear picture of current state-of-the-art aspect of cloud computing by elaborating terminologies, models and other related terms. Enlightens all major players in Cloud Computing industry providing services in terms of SaaS, PaaS and IaaS.-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
This book will provide you with practical recipes to manage the build system using CMake. You will be taken through a series of task-based examples that demonstrate how to employ the CMake toolbox to build portable and modular code and to minimize the code complexity of the build infrastructure.-
- PDF + ePub + Mobi pkt
(29,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
OAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and so on. This book also provides useful recipes for solving real-life problems using Spring Security and creating Android applications.-
- PDF + ePub + Mobi pkt
(116,10 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji: Odkryj klucz do cyberhigieny z nową książką! W erze cyfrowej, gdzie nasze dane są tak cenne jak złoto, a cyberzagrożenia czają się na każdym kroku, niezbędne jest wyposażenie się w wiedzę, która ochroni nasze cyfrowe życie. "Twoje bezpieczeństwo w świecie cyber i sztuczne
-
Promocja
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help-
- ePub + Mobi pkt
(194,65 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine-
- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and r-
- ePub + Mobi pkt
(177,65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
-
Promocja
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth-
- ePub + Mobi pkt
(194,65 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense. In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecyc-
- ePub + Mobi pkt
(194,65 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes?This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioner-
- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
Cyberatak to dzisiaj jedno z poważniejszych zagrożeń dla biznesu, a przygotowanie firmy do ataku hakerów, który nieuchronnie nastąpi, to jedno z największych wyzwań dla kadry zarządzającej. Mimo że o cyberbezpieczeństwie mówi się dużo, komunikaty, które docierają do typowego menedżera, trudno przełożyć na konkretne działania zarządcze. Książka Zdą- ePub + Mobi pkt
(34,90 zł najniższa cena z 30 dni)
51.92 zł
64.90 zł(-20%) -
Promocja
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
-
Promocja
Książka Cyberjutsu. Cyberbezpieczeństwo dla współczesnych ninja to praktyczny przewodnik po cyberbezpieczeństwie oparty na technikach, taktykach i procedurach starożytnych ninja. Analiza odtajnionych japońskich zwojów przeprowadzona przez specjalistę od cyberwojny - Bena McCarty'ego - pokazuje, jak można zastosować metody stosowane przez ninja do w- ePub + Mobi pkt
(45,87 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
Promocja
As you move data to the cloud, you need to consider a comprehensive approach to data governance, along with well-defined and agreed-upon policies to ensure your organization meets compliance requirements. Data governance incorporates the ways people, processes, and technology work together to ensure data is trustworthy and can be used effectively.-
- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
-
Promocja
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh-
- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
-
Promocja
Description Honeypots are like digital traps designed to lure malicious attackers away from your real systems. Imagine setting up a fake store to attract thieves while your real store is safe and hidden. Honeypots work in a similar way, drawing the attention of cybercriminals and allowing you to study their tactics and potentially prevent future at-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Master Python 3 to develop your offensive arsenal tools and exploits for ethical hacking and red teaming KEY FEATURES Exciting coverage on red teaming methodologies and penetration testing techniques. Explore the exploitation development environment and process of creating exploit scripts. This edition includes network protocol cracking, brute-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Postęp, wiążący się z przejściem do nowego, wyższego etapu w rozwoju ludzkości, przynosi pozytywne jak i negatywne następstwa w różnych dziedzinach działalności człowieka, a także społeczności zorganizowanej w państwo.Tak samo rzecz się ma z informacją, jej zastosowaniem dla dobra, ale i na szkodę innych ludzi. Dzięki łatwemu i powszechnemu dostępoBezpieczeństwo informacyjne. Aspekty prawno-administracyjne
Redakcja naukowa: Waldemar Kitler, Joanna Taczkowska-Olszewska
(28,90 zł najniższa cena z 30 dni)
33.00 zł
55.00 zł(-40%) -
Promocja
By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field.-
- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes-
- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, gr-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti-
- ePub + Mobi pkt
(194,65 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and-
- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
Want to run your Kubernetes workloads safely and securely? This practical book provides a threat-based guide to Kubernetes security. Each chapter examines a particular component's architecture and potential default settings and then reviews existing high-profile attacks and historical Common Vulnerabilities and Exposures (CVEs). Authors Andrew Mart-
- ePub + Mobi pkt
(177,65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
-
Promocja
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service-
- ePub + Mobi pkt
(177,65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
-
Promocja
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security-
- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
-
Promocja
Jeśli chcesz uwolnić się od oglądania czegoś, co atakuje cię przy każdym otwarciu przeglądarki internetowej, marzysz o tym, by uniknąć natrętnych e-maili od obcych osób, które w dodatku wyglądają jak wiadomości od kumpla, i potrzebujesz odrobiny luzu w wirtualnym świecie - ta książka ci pomoże. Dowiesz się z niej, jak skonfigurować przeglądarkę, by- Druk
- PDF + ePub + Mobi pkt
Czasowo niedostępna
-
Promocja
Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Advance in your cybersecurity career with targeted interview preparation, practical guidance, and insider tips. Discussing roles from cybersecurity engineer to CISO, this edition addresses reader feedback and covers the latest industry developments.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
With this book you'll learn advanced AI security techniques and defend against manipulation, evasion, prompt injection, and privacy attacks. You'll be able to protect models from poisoning, theft, and tampering, safeguarding your AI systems.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitati-
- ePub + Mobi pkt
(228,65 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł(-15%) -
-
Promocja
Unveiling the future: Navigating AI's Intricate Intersection with International Law A Journey Beyond Hype and Governance KEY FEATURES Comprehensive overview of AI ethics and international law. Exploration of pragmatic approaches to AI governance. Navigation of global legal dynamics. Soft law recommendations for responsible AI development. D-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
The definitive guide to installing and configuring IBM FileNet Information Management software KEY FEATURES Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboar-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledger technology, cryptocurrencies, and blockchain platforms such as Ethereum, Solana, and Bitcoin. With updates on new concepts like privacy, scalability, and DeFi, this book will help keep your knowledge and skills up to date.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What-
- ePub + Mobi pkt
(194,65 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
-
Promocja
Crack a ransomware by identifying and exploiting weaknesses in its design KEY FEATURES Get an overview of the current security mechanisms available to prevent ransomware digital extortion. Explore different techniques to analyze a ransomware attack. Understand how cryptographic libraries are misused by malware authors to code ransomwares. DES-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of-
- PDF + ePub + Mobi pkt
Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(19,90 zł najniższa cena z 30 dni)
87.33 zł
129.00 zł(-32%) -
-
Promocja
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This new edition will show you how to make it much more difficult for an attacker to exploit your Linux system. You’ll be guided through installing a Linux operating system, either on bare metal or in a virtual machine, before tackling configuration and auditing.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces-
- ePub + Mobi pkt
(177,65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Internet jest wszędzie zajrzyj, poznaj wirtualny świat młodych i pytaj o wszystko! Obowiązkowa lektura dla rodziców dzieci w każdym wieku! Bo wszyscy jesteśmy online. Codziennie każdy z nas, niezależnie od wieku, spędza wiele czasu w Internecie. Młodzi ludzie dużo szybciej i sprawniej w nim buszują, a my rodzice, nauczyciele i opiekunowi- ePub + Mobi pkt
(13,90 zł najniższa cena z 30 dni)
27.22 zł
34.90 zł(-22%) -
Promocja
With Azure security, you can build a prosperous career in IT security. Key Features In-detail practical steps to fully grasp Azure Security concepts. Wide coverage of Azure Architecture, Azure Security services, and Azure Security implementation techniques. Covers multiple topics from other Azure certifications (AZ-303, AZ-304, and SC series).-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Exploring techniques and tools and best practices used in the real world. Key Features Explore private and public key-based solutions and their applications in the real world. Learn about security protocols implemented at various TCP/IP stack layers. Insight on types of ciphers, their modes, and implementation issues. Description Cryptography-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
Learn how to build an end-to-end Web application security testing framework Description Hands-on Penetration Testing for Web Applications offers readers with knowledge and skillset to identify, exploit and control the security vulnerabilities present in commercial web applications including online banking, mobile payments and e-commerce applicati-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your systems against threats.Contrary t-
- ePub + Mobi pkt
(177,65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
-
Promocja
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best practices to h-
- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
-
Promocja
Secure your applications and development environments with Docker and Kubernetes Key Features Introducing Container platforms (Docker, Kubernetes, Swarm, OpenShift Discover how to manage high availability with Docker Swarm and Kubernetes Learn how Docker can manage the security in images and containers Discover how Docker can be integrated int-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Oto Franek Runtime - skompromitowany eks-komisarz, bezduszny detektyw, ekspert poszukiwań. Gdy komenda główna policji zostaje obrabowana, to Franek Runtime i jego niezwykłe umiejętności pozwolą schwytać winnych. W tym opowiadaniu kryminalnym dowiesz się jak korzystać z narzędzi algorytmicznych, aby rozwiązać sprawę. Franek Runtime binarnie przeszu- ePub + Mobi pkt
(45,87 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
Promocja
Jak bezpieczna jest nasza sieć? Najlepszym sposobem znalezienia odpowiedzi na to pytanie jest zaatakowanie jej. Ocena bezpieczeństwa sieci pokazuje narzędzia i techniki, których używają profesjonalni analitycy zabezpieczeń do identyfikowania i oszacowania ryzyka w sieciach instytucji rządowych, wojskowych i komercyjnych. Dzięki wiedzy i umiejętnośc(45,49 zł najniższa cena z 30 dni)
71.82 zł
79.80 zł(-10%) -
Promocja
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
-
Promocja
Publikacja dotyczy problemów związanych z kryptografią i uwierzytelnianiem użytkowników sieci Internet. Przedstawiono w niej mechanizmy podpisu elektronicznego z uwzględnieniem problemów dystrybucji klucza i przykłady rozwiązań uwierzytelniania oparte o analizę cech biometrycznych.Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
Andrzej Grzywak, Jerzy Klamka, Paweł Buchwald, Piotr Pikiewicz, Maciej Rostański, Marcin Sobota
(21,60 zł najniższa cena z 30 dni)
21.60 zł
27.00 zł(-20%) -
Promocja
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
-
Promocja
Learn the data skills necessary for turning large sequencing datasets into reproducible and robust biological findings. With this practical guide, you’ll learn how to use freely available open source tools to extract meaning from large complex biological data sets.At no other point in human history has our ability to understand life’s c-
- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
-
Promocja
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u-
- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the-
- ePub + Mobi pkt
(135,15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
-
Promocja
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be-
- ePub + Mobi pkt
(211,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
-
Promocja
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is t-
- ePub + Mobi pkt
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
-
Promocja
Metasploit to narzędzie używane przez profesjonalistów do prowadzenia testów penetracyjnych. Jeżeli chcesz poznać najlepsze przepisy na jego wykorzystanie, to trafiłeś na doskonałą książkę! Zawiera ona ponad 80 receptur omawiających najbardziej skuteczne techniki testowania. W trakcie lektury dowiesz się, jak sprawnie skonfigurować Metasploit, omin- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Dzięki tej książce dowiesz się, jak zabezpieczyć swoją stronę, opartą o ten system, przed ich działaniem. Podręcznik w kompleksowy sposób opisuje wszystkie zagadnienia związane z bezpieczeństwem Joomla! — począwszy od wyboru firmy, na której serwerach umieścisz swoją stronę, a skończywszy na tworzeniu polityki reagowania na ataki.- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Wszechstronne wprowadzenie do najważniejszych zagadnień dotyczących bezpieczeństwa danych i sprzętu.- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
W książce Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać? znajdziesz niebanalne i kontrowersyjne informacje nie tylko na temat zabezpieczeń, ale także sposobów ich łamania, dzięki czemu zyskasz wiedzę, skąd może nadejść zagrożenie i w jaki sposób je rozpoznać. Dzięki temu podręcznikowi poznasz konkretne problemy i niedoskonałości syste- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Nowość Promocja
This comprehensive guide covers key topics such as Microsoft Entra ID implementation, authentication and access management, external user management, and hybrid identity solutions, providing practical insights and techniques for SC-300 exam success.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Nowość Promocja
Description Designing a scalable Unity project requires more than just codingit demands thoughtful planning, structured architecture, and adherence to best practices. This book is your ultimate guide to building modular and maintainable Unity projects using C# and proven game architecture techniques. This book provides the tools and knowledge you n-
- ePub + Mobi pkt
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Nowość Promocja
Description Information security leadership demands a holistic understanding of governance, risk, and technical implementation. This book is your roadmap to mastering information security leadership and achieving the coveted EC-Council CCISO certification. This book bridges the gap between technical expertise and executive management, equipping you-
- ePub + Mobi pkt
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Nowość Promocja
Description Social engineering can be the most dangerous and effective type of hacking because the human component is notoriously the weakest link in the security chain. This Social Engineering Cookbook encompasses a blend of theoretical and practical knowledge that focuses on psychological manipulation of people to gain confidential information an-
- ePub + Mobi pkt
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web applications, including online banking, mobile payments, and e-commerce applications. Covering a diverse array of topics, this book provides a comprehe-
- ePub + Mobi pkt
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description In the ever-evolving landscape of Cloud technology, every project demands a robust, high-performance, scalable and secure foundation. Whether you're deploying traditional Virtual Machines or pioneering modern Artificial Intelligence solutions, a well designed Azure Networking infrastructure is critical for success. This book simplifies-
- ePub + Mobi pkt
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This comprehensive exam guide is designed to transform you into an AWS networking expert, going beyond the ANS-C01 exam blueprint to maximize your impact in the field.-
- PDF + ePub pkt
(100,08 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This tailor-made study guide will equip you with the skills, knowledge, and confidence to pass the SnowPro Core Certification exam and apply what you have learned in your organization.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Description Quantum blockchain uses the power of quantum computing to solve issues like security and scalability that traditional blockchains face. With its ability to handle large data sets and solve complex problems much faster, it can greatly improve transaction speeds, security, and efficiency. This book begins by explaining the basics of bloc-
- ePub + Mobi pkt
Quantum Blockchain
Dr. Mahendra Kumar Shrivas, Dr. Kamal Kant Hiran, Dr. Ashok Bhansali, Umesh Kumar Sahu
(50,36 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description The cloud is ubiquitous. Everyone is rushing to the cloud or is already in the cloud, and both of these groups are concerned with cloud security. In this book, we will explain the concepts of security in a beginner friendly way, but also hint at the great expanse of knowledge that lies beyond. This book offers a detailed guide to cloud-
- ePub + Mobi pkt
(50,36 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book shows you how to automate essential security tasks like vulnerability scanning, patch management, and threat intelligence gathering. Streamline your security workflows and enhance defense strategies with custom Python scripts.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Description Vulnerability Assessment and Penetration Testing (VAPT) combinations are a huge requirement for all organizations to improve their security posture. The VAPT process helps highlight the associated threats and risk exposure within the organization. This book covers practical VAPT technologies, dives into the logic of vulnerabilities, and-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Master the skills needed to secure AI ecosystems from evolving cyber threats. This course delves into the risks targeting AI systems, real-world case studies, and strategies for safeguarding LLMs, GenAI applications, and AI infrastructures. Build expertise in combating attacks and ensuring compliance in AI environments.-
- PDF + ePub pkt
(125,10 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Explore critical strategies for defending against cyber threats, securing social media, and protecting home networks.-
- PDF + ePub pkt
Surviving A Cyberattack. A Comprehensive Guide to Digital Security for Families and Businesses
Mercury Learning and Information, Todd G. Shipley, Art Bowker
(109,00 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki 1) TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów spo- PDF + ePub + Mobi pkt
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska, Agnieszka Brzostek, Sylwia Gliwa
(80,60 zł najniższa cena z 30 dni)
93.00 zł
155.00 zł(-40%) -
Promocja
This book is a comprehensive guide to using Ghidra for malware analysis, reverse engineering, and vulnerability detection. It covers everything from basic usage to advanced topics such as Ghidra plug-ins, kernel debugging, and binary diffing.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware. This book is a comprehensive-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book covers everything from basic scripting to advanced techniques for reconnaissance, exploitation, and integration with AI. You'll master essential skills to automate tasks, analyze data, and enhance cybersecurity assessments.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Description "Mastering the Red Hat Certified Engineer (RHCE) Exam" is a comprehensive guide designed for IT professionals and system administrators aspiring to achieve RHCE certification. This book is an essential resource for mastering Red Hat Enterprise Linux (RHEL) skills and advancing careers in Linux administration. This book is designed to g-
- ePub + Mobi pkt
(39,26 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Learn all about Microsoft Defender for Identity in depth and master the art of securing digital identities against emerging threats with hands-on guidance to elevate your cybersecurity skills to new heights.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Master the CNAPP lifecycle with this comprehensive guide that will teach you how to plan, deploy, and operationalize cloud security using Microsoft Defender for Cloud, enhancing your security posture across multicloud environments.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Ace the SC-100 exam with this essential guide, covering advanced cloud security strategies, zero-trust architecture, and GRC evaluations. Benefit from real-world examples and practice exams questions to ensure certification success.-
- PDF + ePub pkt
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book offers in-depth coverage and practical insights for effectively securing AWS environments, encompassing key services, compliance, and best practices.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Embark on a dynamic journey through command shells with this hands-on manual. From the Linux staple Bash to rising stars like Z shell and PowerShell, master their power for Linux, macOS, and Unix.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Description In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It-
- ePub + Mobi pkt
(30,03 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book equips network professionals with the skills to monitor, analyze, and optimize network infrastructures using specific tools. With advanced techniques, you'll learn how to build tailored observability solutions for your needs.-
- PDF + ePub pkt
Modern Network Observability. A hands-on approach using open source tools such as Telegraf, Prometheus, and Grafana
David Flores, Christian Adell, Josh VanDeraa, Eric Chou, Damien Garros
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This hands-on guide to understanding Snort 3 and its evolution covers everything from installation to configuration based on available resources and expected detection rates. The book dives into various key modules using practical examples.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book is a valuable resource that offers practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,-
- ePub + Mobi pkt
(30,03 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This latest edition of Practical Hardware Pentesting features even more practical advice on how to pentest various devices, from IoT to simpler hardware. As you progress through the chapters, you'll quickly learn the most common attack techniques, as well as ways to secure embedded systems and build more secure devices.-
- ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This is an in-depth guide covering hacking techniques, security vulnerabilities, and countermeasures. Learn how to use tools like Kali Linux for ethical hacking, test for exploits, and secure systems.-
- PDF + ePub pkt
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, Peter Kloep, Frank Neugebauer, André Zingsheim, Thomas Hackner, Markus Widl, Roland Aigner, Stefan Kania, Tobias Scheible, Matthias Wübbeling
(161,10 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
This book covers threat management, investigation, automation, and integration with other security tools to fortify organizational cybersecurity defenses effectively.-
- PDF + ePub pkt
(107,10 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Navigate the evolving software security landscape with Crafting Secure Software. This guide equips decision makers to understand and address risks, ensure compliance, and build a culture of security within development teams.-
- PDF + ePub pkt
(143,10 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Dive into Microsoft Teams mastery with this comprehensive exam guide. From administration to security, collaboration, and troubleshooting, gain practical skills for exam success and real-world application.x-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
From secure development environments to continuous security and compliance integration, this comprehensive guide equips you with the skills to implement a robust code-to-cloud process tailored for Azure environments.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
The book provides a solid understanding of SIS cybersecurity challenges and artifacts required to ensure the safety of mission-critical systems. It also serves as a strong foundation for anyone looking to boost their industrial security skill set.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This exhaustive book helps you detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets based on the actual threat landscape.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Get ahead in cryptography with this second edition, covering symmetric and asymmetric encryption, zero-knowledge protocols, and quantum cryptography. Designed for cybersecurity pros, it covers updated techniques to combat evolving cyber threats.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book helps you to explore software security through gamified threat modeling, uncovering risks while making it enjoyable. You'll learn to identify, mitigate, and defend against threats, enhancing your system's security.-
- PDF + ePub pkt
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
A comprehensive guide to network security and cryptography, this book covers the basics of computer networks, encryption methods, and security protocols. Learn how to protect data using symmetric and asymmetric encryption, secure modern technologies like IoT and blockchain, and apply AI techniques for intrusion detection.-
- PDF + ePub pkt
(215,10 zł najniższa cena z 30 dni)
215.10 zł
239.00 zł(-10%) -
-
Promocja
This book delves into cloud security, offering practical intelligence for evaluating risks and attacks. Learn to secure cloud architecture, IAM, network security, and more with real-world examples.-
- PDF + ePub pkt
(161,10 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
Ta książka jest znakomitym wprowadzeniem do zaawansowanych technik forsowania dobrze zabezpieczonych środowisk. Metody tu opisane nie są przedstawiane w żadnym poradniku ani na żadnych szkoleniach. Autor skoncentrował się na modelowaniu ataków APT w rzeczywistych warunkach: prezentuje różne nowe technologie i techniki ataków w szerokim kontekście r- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Ta książka jest zaktualizowanym i uzupełnionym wydaniem świetnego przewodnika po świecie blockchaina; skorzysta z niej zarówno programista, jak i prezes konstruujący strategię swojej firmy. Znalazło się tu wyczerpujące omówienie technicznych podstaw łańcuchów bloków i systemów rozproszonych. Przedstawiono mechanizmy związane z kryptowalutami i pisa- Druk
- PDF + ePub + Mobi pkt
Czasowo niedostępna
-
Promocja
Z niniejszej książki dowiesz się, jak działa ten system operacyjny i jak z nim pracować jako administrator. Nauczysz się wykorzystywać przy tym najlepsze praktyki w branży. Poznasz sposób działania rozwiązania PowerVM, które jest jednym z najbardziej elastycznych, a jednocześnie najbardziej niezawodnych rozwiązań wirtualizacyjnych. Dowiesz się też,- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Dzięki tej książce łatwiej zrozumiesz naturę botów i nauczysz się je projektować. Zamieszczono tu wiele informacji o pracy projektantów i programistów botów. Poza zagadnieniami teoretycznymi znajdziesz tu także sporo praktycznej wiedzy, wzbogaconej rzeczywistymi przykładami budowania użytecznych botów. Nauczysz się projektowania konwersacyjnych int- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
To ważne, co Twoje dziecko robi w sieci. To, co ogląda, czyta, z kim rozmawia i ile czasu spędza w Internecie, ma duże znaczenie dla jego rozwoju, ale przede wszystkim dla jego bezpieczeństwa! Internet, który jest jedną z największych zdobyczy naszej cywilizacji, to cudowne okno na wielki świat -- na jego jasne, ale i ciemne strony…- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Jak obronić się przed atakiem? Wszystkie niezbędne informacje znajdziesz w tym wyjątkowym podręczniku. W trakcie lektury dowiesz się, jak działają hakerzy, jak wyszukują słabe punkty aplikacji oraz jak modyfikują jej kod. Ponadto nauczysz się utrudniać śledzenie kodu Twojej aplikacji oraz bezpiecznie usuwać pliki (tak, aby nie było możliwe ich odtw- Druk
- PDF + ePub + Mobi pkt
Niedostępna
-
Promocja
Z tą książką przyjdzie Ci to bez trudu. Nauczysz się nie tylko tworzyć proste kopie, ale także właściwie zarządzać danymi, rekonstruować skasowane pliki i szyfrować te, których nie chcesz upubliczniać. Z drugiej strony poznasz sposoby trwałego usuwania plików z dysku, metody ich kompresowania oraz odpowiedniego przechowywania w archiwum. Dowiesz si- Druk
- PDF + ePub + Mobi pkt
Niedostępna