Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Promocja
This Learning Path focuses on showing you how to leverage the benefits of the cloud and create applications that are high in performance and availability. It teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
To ważne, co Twoje dziecko robi w sieci. To, co ogląda, czyta, z kim rozmawia i ile czasu spędza w Internecie, ma duże znaczenie dla jego rozwoju, ale przede wszystkim dla jego bezpieczeństwa! Internet, który jest jedną z największych zdobyczy naszej cywilizacji, to cudowne okno na wielki świat -- na jego jasne, ale i ciemne strony…-
książka
-
ebook
Niedostępna
-
-
Promocja
Wyobraź sobie sytuację, w której poświęcasz mnóstwo czasu na stworzenie nowego, ciekawego rozwiązania w świecie informatyki. Kosztuje Cię to wiele dni i nocy ogromnego wysiłku. Dokładnie w momencie opuszczenia Twojego bezpiecznego komputera, udostępniony światu, Twój pomysł zostaje wystawiony na ciężką próbę — w sieci działają krakerzy, którz-
książka
-
ebook
Niedostępna
-
-
Promocja
Książka „13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie” pokaże Ci, jak wytropić wirusy, przechytrzyć złośliwe oprogramowanie, rozpoznać podsłuch sieciowy. Ten podręcznik poprowadzi Cię prosto do zwycięstwa w walce z sieciowym zagrożeniem.-
książka
-
ebook
13 najpopularniejszych sieciowych ataków na Twój komputer. Wykrywanie, usuwanie skutków i zapobieganie
Maciej Szmit, Mariusz Tomaszewski, Dominika Lisiak, Izabela Politowska
Niedostępna
-
-
Promocja
Accelerate your cybersecurity journey with this master guide to Security Copilot. It presents a unique blend of advanced AI-driven techniques, thorough case studies, and innovative strategies essential for next-generation cyber defense.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Learn how the cyber kill chain, a structured model that outlines the stages of a cyberattack, guides you through understanding threat actor behaviors and bolstering their ability to defend against evolving cyber threats.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
1. SZYFROWANIE - TWOJE SUPERMOCE W CYFROWYM ŚWIECIE Miła Czytelniczko, Drogi Czytelniku, Wyobraź sobie ten wspaniały świat bez jakichkolwiek zamków czy innych zabezpieczeń w drzwiach. Chodzisz do pracy, wracasz do domu, a Twoje rzeczy są tam, gdzie je zostawiłeś/aś - do czasu, aż ... ktoś postanowi zajrzeć i "pożyczyć ;)" coś od Ciebie - bez-
ebook
-
-
Promocja
This hands-on guide to understanding Snort 3 and its evolution covers everything from installation to configuration based on available resources and expected detection rates. The book dives into various key modules using practical examples.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine-
-
ebook
(29,90 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
-
Promocja
From secure development environments to continuous security and compliance integration, this comprehensive guide equips you with the skills to implement a robust code-to-cloud process tailored for Azure environments.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
With this book you'll learn advanced AI security techniques and defend against manipulation, evasion, prompt injection, and privacy attacks. You'll be able to protect models from poisoning, theft, and tampering, safeguarding your AI systems.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify and fix vulnerabilities. From emerging threats to best practices, this book helps you defend and safeguard your APIs.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book helps entry, mid-level, and senior managers master soft skills, craft a compelling brand, and strategically plan their career in C-suite roles with the help of expert insights needed for success in digital leadership and executive roles.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki 1) STRATEGIE CYBERBEZPIECZEŃSTWA WSPÓŁCZESNEGO ŚWIATA Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko,-
ebook
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna Badźmirowska-Masłowska
-
-
Promocja
This book provides invaluable insights into the evolving security landscape, offering practical strategies for implementing and maximizing the effectiveness of EDR tools.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing resilient security measures, all tailored for varying levels of expertise.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
The OSINT Handbook book helps you understand the significance of open-source intelligence and master advanced techniques and tools, equipping you with the skills you need to navigate the digital landscape effectively.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
TLS is the most important and widely used security protocol in the world. This book takes you on a journey through modern cryptography with TLS as the guiding light. It explains all necessary cryptographic primitives and how they are used within TLS. You’ll explore the inner workings of TLS and its design structure.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
W erze, gdy aplikacje szpiegujące takie jak Pegasus są niemal niewidzialne, a oszustwa internetowe rosną w siłę, Twoja wiedza stanowi pierwszą linię obrony. Ta książka to Twoja tarcza w walce z cyberzagrożeniami. Pegasus, znany jako jeden z najbardziej zaawansowanych narzędzi szpiegowskich, może infiltrować Twoje urządzenia, nie p-
ebook
-
-
Promocja
Cybersecurity architects are responsible for ensuring that the enterprises are protected from cyberattacks. This book covers the nuts and bolts of how to keep your organization safe by helping you understand the intricacies of mitigating risks, creating an implementation roadmap, ensuring continuous improvement, and beyond.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
As cyber-attacks grow and APT groups advance their skillset, you need to be able to protect your enterprise against cyber-attacks. In order to limit your attack surface, you need to ensure that you leverage the same skills and tools that an adversary may use to hack your environment and discover the security gaps. This book will teach you how to th-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro-
-
ebook
(29,90 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
Promocja
The Microsoft 365 Security, Compliance, and Identity Administration is a comprehensive guide that helps you employ Microsoft 365's robust suite of features and empowers you to optimize your administrative tasks.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Microsoft is making a strong name for itself in the security ecosystem. When correctly set, Microsoft 365 Defender includes a number of solutions that can help your organization become more secure. Knowing how to use each tool and understanding the outcomes of the threats and incidents will improve your detection capability. In this book, you will-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Master detection engineering with this hands-on guide. Learn to build, test, and optimize security detections using real-world scenarios, open-source tools, and industry frameworks like MITRE ATT&CK.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
The MS-100 certification validates your knowledge of identity and security aspects of a Microsoft 365 tenant. With the help of this book, you’ll explore core features such as self-service password reset and Azure AD identity protection, enabling you to implement Azure AD identity and secure access easily.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Aligning Security Operations with MITRE ATT&CK Framework is a comprehensive guide to assessing your SOC and improving it through alignment and implementation using the Mitre ATT&CK framework. As you progress through the chapters, you’ll gain both insight and practical skills to improve detection and response toward threats with the help of e-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
With .NET MAUI for C# Developers, you’ll learn to create cross-platform apps for iOS, Android, Windows, and Mac by writing the code once and leveraging the application to automatically produce native code for each. With the help of this book, you’ll be well prepared to build commercial MAUI programs that integrate into the overall .NE-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Zed Attack Proxy Cookbook covers detailed recipes to strengthen the security posture of your organization using practical web app penetration and testing techniques. The book will help you integrate ZAP into your CI/CD pipeline and ensure hitch-free assessments.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Helm is a powerful open-source tool for automating application deployments on Kubernetes. Managing Kubernetes Resources Using Helm provides you with the ability to significantly reduce operational stress around application deployment and lifecycle management.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Windows Server 2022 is Microsoft's latest version of the server OS. It brings significant improvements in security, secure connectivities, Azure hybrid capabilities, storage, and other vital features. This book covers all Windows Server 2022 administration fundamentals, giving you valuable insights into Microsoft's role-based certifications.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł(-10%) -
-
Promocja
While penetration testing is highly competitive, it’s easy to be stuck in a monotonous routine client after client. This book will provide hands-on experience with penetration testing while guiding you through the behind-the-scenes action along the way.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book introduces you to two distinct applications of computer-based investigations, from criminal acts investigated by the police to acts performed by an employee investigated by their employer or a third-party investigator.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
e_3a8y/e_3a8y.mp3 e_3a8yThis book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.-
-
ebook
-
audiobook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
The evolving ransomware threat landscape brings new challenges to the security personnel of many organizations. The effects of human-operated attacks make practical security approaches the need of the hour as proper response and investigation are crucial. This book discusses how to use these approaches, focusing on real-world scenarios and tools.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
W książce Ochrona cyberprzestrzeni Unii Europejskiej autorka analizuje działania podjęte przez Unię Europejską w ramach polityki ochrony cyberprzestrzeni przez UE jako obowiązku zabezpieczenia wspólnej przestrzeni bezpieczeństwa informacyjnego UE w obliczu współczesnych zagrożeń. Przeanalizowana została również aktualna strategia cyberbezpieczeństw-
ebook
(52,08 zł najniższa cena z 30 dni)
67.20 zł
84.00 zł(-20%) -
-
Promocja
Mastering Defensive Security helps you to learn about the latest tools, techniques, and hands-on labs to ensure that you have the skills required to tackle the most complex and ever-evolving cybersecurity threats. If you want to consolidate your cybersecurity knowledge or grow to become a CISO, this book is for you!-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Mastering Microsoft Endpoint Manager will teach you how to manage your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing a new and simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by-
-
ebook
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
e_3a0i/e_3a0i.mp3 e_3a0iCybersecurity is a vast field and getting started can seem overwhelming. This book demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.-
-
ebook
-
audiobook
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
(39,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
Antivirus Bypass Techniques follows a unique approach that will help you explore the security landscape, understand the fundamentals of antivirus software, and put antivirus bypass techniques to use. This book will enable you to bypass antivirus software solutions in order to develop efficient antivirus software.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Comprehensive threat analysis is important for incident responders as it helps them to ensure that a threat has been entirely eliminated. This book shows you how to quickly triage, identify, attribute, and remediate threats with proper analysis techniques, and guides you in implementing your knowledge to prevent further incidents.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Cybersecurity for Beginners Key Features In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. De-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Hardware security has become a major concern in recent times making it crucial for companies and end users to focus on protecting hardware. If you’re a security practitioner who is more familiar with software and binary hacking or someone looking to repurpose devices, this book will demonstrate how to approach hardware hacking of embedded de-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Biometric technology provides a robust and convenient method for authenticating an individual’s identity using fingerprint, iris, voice, palm print, or facial recognition. Identity Management with Biometrics will help you identify and address the challenges that you will need to consider as you move into the next iteration of identity protec-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
MS-500: Microsoft 365 Security Administration offers complete, up-to-date coverage of the MS-500 exam so you can take it with confidence, fully equipped to pass the first time.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Cybersecurity Attacks: Red Team Strategies is a guide to building and maturing an internal red team program. It highlights the core strategies to measure and improve security awareness, breach detection, and response capabilities. In addition, we will dive into the technical details of tactics and techniques for red teamers of all skill levels.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book that covers the very latest security threats and defense strategies, updated for 2020.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
206.10 zł
229.00 zł(-10%) -
-
Promocja
Binary Analysis is a complex and constantly evolving topic, crossing into several realms of IT and information security. The recipes in this book will serve as a good reference for you to get a better understanding of various aspects related to analyzing malware, identifying vulnerabilities in code, exploit writing and reverse engineering.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This Learning Path is your easy reference to know all about penetration testing or ethical hacking. With more than 100 recipes, you'll become a master of the most widely used penetration testing framework and easily tackle command injection flaws, crypto implementation layers, and web application security holes.-
-
ebook
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
(39,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows y-
-
ebook
(29,90 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get started with executing an application penetration test and be sure of the results.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what the field is about, the book solves that problem. The book allows readers to train themselves as bug b-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Real-World SRE is a practical guide for surviving a system outage. Nat Welch’s step-by-step framework will help you to navigate a crisis when the stakes are high.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book is a comprehensive guide to help developers, architects, and senior programmers advance their career in the software architecture domain. You'll understand the expectations of users and other stakeholders from the point of view of an architect and will learn to communicate your architecture to the relevant stakeholders.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Penetration testing is highly competitive, and it’s easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing and providing detailed covera-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Software architecture or creating a blueprint design for a particular software application is not a walk in the park. The two biggest challenges in software architecture are keeping architecture in sync, first, with the requirements as they are uncovered or evolve and, next, with the implementation as it gets built and evolves.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Born from it predecessor, Kali Linux 2.0 is the most popular Linux distribution designed for security professionals who build defensive strategies around their systems with an offensive mindset. This book aims at introducing you to the most common and not -so- common pre-installed penetration testing tools and create custom complex images in the fo-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Publikacja dotyczy problemów związanych z kryptografią i uwierzytelnianiem użytkowników sieci Internet. Przedstawiono w niej mechanizmy podpisu elektronicznego z uwzględnieniem problemów dystrybucji klucza i przykłady rozwiązań uwierzytelniania oparte o analizę cech biometrycznych.-
ebook
Podpis cyfrowy i identyfikacja użytkowników w sieci Internet
Andrzej Grzywak, Jerzy Klamka, Paweł Buchwald, Piotr Pikiewicz, Maciej Rostański, Marcin Sobota
(19,90 zł najniższa cena z 30 dni)
21.60 zł
27.00 zł(-20%) -
-
Promocja
-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
With this practical book, you’ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high-
-
ebook
(29,90 zł najniższa cena z 30 dni)
55.24 zł
64.99 zł(-15%) -
-
Promocja
Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of thousands of IT profes-
-
ebook
(29,90 zł najniższa cena z 30 dni)
50.91 zł
59.90 zł(-15%) -
-
Promocja
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can d-
-
ebook
(29,90 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
-
Postęp, wiążący się z przejściem do nowego, wyższego etapu w rozwoju ludzkości, przynosi pozytywne jak i negatywne następstwa w różnych dziedzinach działalności człowieka, a także społeczności zorganizowanej w państwo.Tak samo rzecz się ma z informacją, jej zastosowaniem dla dobra, ale i na szkodę innych ludzi. Dzięki łatwemu i powszechnemu dostępo-
ebook
Bezpieczeństwo informacyjne. Aspekty prawno-administracyjne
Redakcja naukowa: Waldemar Kitler, Joanna Taczkowska-Olszewska
-
-
Promocja
This comprehensive guide will help you understand practical aspects of information systems auditing. It covers key areas such as governance and management of IT, information systems acquisition, development, implementation and information systems operations, business resilience, and the crucial topic of protecting information assets.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Description Cyber threats are everywhere and constantly evolving. Data breaches, ransomware, and phishing have become everyday news. This book offers concepts and practical insights for setting up and managing a security operations center. You will understand why SOCs are essential in the current cyber landscape, how to build one from scratch, and-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book introduces discrete mathematics concepts with a focus on their applications in cryptography. Ideal for self-teaching, it includes thorough explanations, examples, and exercises.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
242.10 zł
269.00 zł(-10%) -
-
Promocja
Designed for security professionals and aspiring pentesters, this book equips you with the skills and knowledge to exploit vulnerabilities, gain access, and navigate post-exploitation scenarios across diverse platforms.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
In an era plagued by hacking and security breaches, this book takes you through Kali Linux's latest version, addressing critical security concerns and finding hidden vulnerabilities as you learn penetration testing.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Data Science for Malware Analysis is a guide to the synergy of cybersecurity and data science. You'll learn about malware lifecycle and data science techniques for improved detection and analysis. You'll decipher key regulations like GDPR and CCPA.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
A comprehensive guide to Multi-Cloud Administration for Cloud professionals KEY FEATURES Get familiar with the various components involved in establishing a multi-cloud architecture. Acquire the skills to effectively manage multi-cloud environments. Establish guardrails and guidelines to ensure interoperability and security across multiple clo-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Zmieniająca się rzeczywistość administracyjna koreluje z wieloma obszarami, a wśród nich priorytetowe znaczenie ma bezpieczeństwo wewnętrzne. Zapewnianie i kształtowanie bezpieczeństwa wewnętrznego odbywa się w dużej mierze przez podmioty publiczne. Efektywność wykonywania przez nie zadań ma realny wpływ na eliminowanie lub neutralizowanie z-
ebook
-
-
Promocja
This book is a technical reference that investigates, analyzes, and explains every part of the FastAPI framework and demonstrates the use of these parts by helping you solve problems. Some topics are experimental and original given the current development setups. Overall, the book is a recipe, blueprint, study, and reference combined into one.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Simplifying security concepts of Microsoft Azure and Microsoft 365, this book will help you gain knowledge necessary to take and pass Exam SC-900 to achieve the Microsoft Security, Compliance, and Identity Fundamentals certification. You'll be able to implement the acquired practical knowledge in real-world scenarios in no time.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Lead the digital transformation wave with Microsoft Teams Key Features Explore numerous business scenarios to gain a better grasp of Microsoft Dataverse for Teams Build your first app with step-by-step instructions and expand features with flows and bots. Find more about the application, environment, and licensing lifecycle management. Descrip-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Mastering Kali Linux for Advanced Penetration Testing, Fourth Edition provides you with an offensive approach to enhance your penetration testing skills by becoming aware of the tactics employed by real attackers.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
The current trend of hacking and security breaches shows how important it has become to pentest your environment to ensure endpoint protection. This book will take you through the latest version of Kali Linux to help you efficiently deal with crucial security aspects such as confidentiality, integrity, availability, and access control.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Encyclopedia on Blockchain for beginners and experts alike Key Features Includes the basics of Blockchain Comparative study of public Blockchains (Ethereum, Hashgraph, Cardano, Algorand, Solana etc.) Comparison of interoperable Blockchains (Polkadot vs. Cosmos vs. Polygon). Comparison of private permissioned DLTs (Fabric vs. R3 Corda vs. Quoru-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
This book will provide you with practical recipes to manage the build system using CMake. You will be taken through a series of task-based examples that demonstrate how to employ the CMake toolbox to build portable and modular code and to minimize the code complexity of the build infrastructure.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices. You will learn how to identify vulnerabilities in IoT device architect-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
W 2015 roku minęło osiemnaście lat od pierwszego seminarium nt. Techniczne Aspekty Przestępczości Teleinformatycznej (TAPT) zorganizowanego w Wyższej Szkole Policji w Szczytnie. Pierwsze dwie edycje seminarium gromadziły po ok. 80 uczestników, prawie wyłącznie z jednostek organizacyjnych Policji. Z czasem przybywało uczestników i w ostatnich latach-
ebook
(15,90 zł najniższa cena z 30 dni)
17.08 zł
21.35 zł(-20%) -
-
Promocja
Z niniejszej książki dowiesz się, jak działa ten system operacyjny i jak z nim pracować jako administrator. Nauczysz się wykorzystywać przy tym najlepsze praktyki w branży. Poznasz sposób działania rozwiązania PowerVM, które jest jednym z najbardziej elastycznych, a jednocześnie najbardziej niezawodnych rozwiązań wirtualizacyjnych. Dowiesz się też,-
książka
-
ebook
Niedostępna
-
-
Promocja
Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne-
książka
-
ebook
(89,40 zł najniższa cena z 30 dni)
104.30 zł
149.00 zł(-30%) -
-
Promocja
Jak obronić się przed atakiem? Wszystkie niezbędne informacje znajdziesz w tym wyjątkowym podręczniku. W trakcie lektury dowiesz się, jak działają hakerzy, jak wyszukują słabe punkty aplikacji oraz jak modyfikują jej kod. Ponadto nauczysz się utrudniać śledzenie kodu Twojej aplikacji oraz bezpiecznie usuwać pliki (tak, aby nie było możliwe ich odtw-
książka
-
ebook
Niedostępna
-
-
Promocja
Z tą książką przyjdzie Ci to bez trudu. Nauczysz się nie tylko tworzyć proste kopie, ale także właściwie zarządzać danymi, rekonstruować skasowane pliki i szyfrować te, których nie chcesz upubliczniać. Z drugiej strony poznasz sposoby trwałego usuwania plików z dysku, metody ich kompresowania oraz odpowiedniego przechowywania w archiwum. Dowiesz si-
książka
-
ebook
Niedostępna
-
-
Promocja
W książce Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać? znajdziesz niebanalne i kontrowersyjne informacje nie tylko na temat zabezpieczeń, ale także sposobów ich łamania, dzięki czemu zyskasz wiedzę, skąd może nadejść zagrożenie i w jaki sposób je rozpoznać. Dzięki temu podręcznikowi poznasz konkretne problemy i niedoskonałości syste-
książka
-
ebook
Niedostępna
-
-
Promocja Przedsprzedaż
⭐⭐⭐⭐⭐ Recenzja czytelniczki Kaśka, mama dwójki dzieci w wieku szkolnym Kupiłam tę książkę z myślą: "przeczytam fragmentami, może coś mi się przyda". A skończyło się na tym, że czytałam ją z długopisem w ręku i co chwilę robiłam przerwy, żeby porozmawiać z dziećmi. Największa wartość tej części to to, że ni-
ebook
(26,79 zł najniższa cena z 30 dni)
-
-
Nowość Promocja
Unify your incident response, streamline decision-making, and safeguard your industrial control systems with this book that bridges the gap between IT, OT, and EOCs, delivering practical ICS frameworks that work for every team member.-
-
ebook
(129,00 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Nowość Promocja
The book covers everything from basics to best practices so that you can make the most of Sumo Logic. It equips you with the practical knowledge that transforms how you develop and implement cybersecurity intelligence solutions.-
-
ebook
(129,00 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Nowość Promocja
This guide helps you master Microsoft Defender XDR, Security Copilot, and Sentinel in a modern Zero Trust and AI-driven security landscape. You'll gain insights into security automation, threat detection, and AI integration for optimized operations.-
-
ebook
(139,00 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Nowość Promocja
Description The building blocks of any large-scale distributed system such as an AI cluster are compute, storage, and network. The network infrastructure connects all the components enabling data transfer, communication, and coordination between compute nodes, storage devices, and AI applications. The network is also the slowest component among the-
-
ebook
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description Security has become inseparable from the way modern organizations operate. Cloud platforms, mobile devices, and highly connected systems have changed how technology is built, and with that change comes a very different set of risks. As digital ecosystems expand, security engineering is no longer optional; it has become a core discipline-
-
ebook
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Understand key components of investigation, incident response, engineering, and SOC analysis. Go from a basic understanding of computers/networks to successfully triaging alerts and responding to cyber security attacks.-
-
ebook
(129,00 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Description Cybercrime is no longer a distant threat; it is a daily reality that affects people, businesses, and governments in today's hyper-connected world. It is important for everyone in every field to know how these attacks happen and how to protect themselves from them, from social media scams to advanced network intrusions. This book takes-
-
ebook
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description In the cyber world, securing the cloud is critical to an organizations business success. This book is about equipping the readers with the required knowledge and skills to perform a penetration test against an Azure infrastructure. Within this book, the readers will develop a detailed understanding of what Azure is and how its core comp-
-
ebook
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description The technology landscape is changing fast; whether it is cloud computing, Zero Trust, AI, or the upcoming innovations of quantum computing. AI is already disrupting businesses and even everyday life. A successful security professional at any level of experience would need three key skills, namely functional acumen, business acumen, and-
-
ebook
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description As modern infrastructures become increasingly automated, non-human identities, such as service accounts, API tokens, and automation agents, are emerging as critical security assets. Securing these identities is essential to protecting cloud-native environments, automated workflows, and machine-to-machine interactions from breaches, data-
-
ebook
(85,49 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description In an era defined by data-driven decision-making and AI-powered systems, safeguarding personal information has become both a legal mandate and a business imperative. As India embraces its own comprehensive data protection law, the Digital Personal Data Protection (DPDP) Act, 2023, organizations must adapt swiftly to meet rising expectat-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book provides an inside look at the realities of being a Chief Information Security Officer (CISO), featuring invaluable lessons from global cybersecurity leaders on strategy, leadership, resilience, and navigating an evolving threat landscape.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Explore the world of cybersecurity, understand the hacker mindset, and discover career insights. Whether you're curious about digital security or considering a new career, this book equips you with essential skills to protect yourself online.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
This book reframes cyber security through the dual lenses of creativity and classical warfare strategy. With insight from Sun Tzu and artistic philosophy, it offers an unconventional but practical model of digital defense.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book provides a step-by-step guide for professionals to protect organizations from cyber threats. It covers cybersecurity fundamentals, specific threats, mitigation strategies, and essential processes for a strong security framework.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
Description Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidden intrusions and subtle attack behaviors that evade traditional tools. Cyber threats are evolving faster than ever. It is used by modern attackers as an advanced technique to infiltrate systems, evade detection, and exploit vulnerabilitie-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
A comprehensive guide to understanding the evolving ransomware threat landscape. Learn how ransomware attacks happen, how to prevent them, and how to respond effectively with both basic and advanced controls.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Explore the ethical challenges posed by AI, including its effects on privacy, misinformation, job displacement, and societal behavior. Learn how to navigate the digital and AI ethics landscape and understand the strategies for future governance.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
An essential guide to NIST CSF 2.0 covering its core principles, structure, and practical application. Learn how to implement cybersecurity strategies aligned with business goals and risk frameworks.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
62.91 zł
69.90 zł(-10%) -
-
Promocja
This practical guide helps you understand and achieve Cyber Essentials certification. It covers cyber attack types and necessary technical controls to protect your organization. Learn how to get certified and boost your cybersecurity resilience.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
Explore PCI DSS compliance with this comprehensive guide. Learn the essential requirements, how to maintain compliance, and key strategies for avoiding data breaches while securing payment systems.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
This book provides a comprehensive guide to the principles and practices of cybersecurity, offering strategies for building resilient systems, managing risks, and defending against evolving threats.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
A complete guide to implementing and complying with GDPR in your organization. Covering core principles, data subject rights, and DPIAs, this book provides a thorough understanding of the regulation's scope and requirements for effective compliance.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Platforma Amazon Web Services jest uważana za największą i najdojrzalszą chmurę obliczeniową. Oferuje ponad setkę gotowych usług, praktycznie niewyczerpywalne zasoby mocy obliczeniowej, nieograniczone bezpieczne magazynowanie oraz pierwszorzędne możliwości automatyzacji. Jest przy tym nieustannie unowocześniana i udostępnia coraz to nowsze możliwoś-
książka
-
ebook
Czasowo niedostępna
-
-
Promocja
Dzięki tej książce łatwiej zrozumiesz naturę botów i nauczysz się je projektować. Zamieszczono tu wiele informacji o pracy projektantów i programistów botów. Poza zagadnieniami teoretycznymi znajdziesz tu także sporo praktycznej wiedzy, wzbogaconej rzeczywistymi przykładami budowania użytecznych botów. Nauczysz się projektowania konwersacyjnych int-
książka
-
ebook
Niedostępna
-
-
Promocja
Testowanie bezpieczeństwa aplikacji sieciowych wymaga staranności oraz aktualnej i praktycznej wiedzy. Bardzo dobrym narzędziem do tego celu jest Kali Linux - popularna dystrybucja BackTrack systemu Linux, służąca do wykonywania audytów bezpieczeństwa. Zawiera liczne narzędzia umożliwiające zaawansowane testowanie zabezpieczeń, w tym skutec-
książka
-
ebook
Czasowo niedostępna
-
-
Promocja
Dzięki tej książce dowiesz się, jak zabezpieczyć swoją stronę, opartą o ten system, przed ich działaniem. Podręcznik w kompleksowy sposób opisuje wszystkie zagadnienia związane z bezpieczeństwem Joomla! — począwszy od wyboru firmy, na której serwerach umieścisz swoją stronę, a skończywszy na tworzeniu polityki reagowania na ataki.-
książka
-
ebook
Niedostępna
-

