Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Promocja
This guide offers a comprehensive exploration of securing cloud services, covering key concepts like cloud models, taxonomies, threats, regulatory issues, and architectural solutions for safeguarding data and infrastructure.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
This book provides a clear guide to the California Privacy Rights Act (CPRA), covering key definitions, consumer rights, business obligations, and compliance requirements, including security, penalties, and breach notifications.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Description Understanding how systems are secured and how they can be breached is critical for robust cybersecurity in an interconnected digital world. The book offers a clear, practical roadmap for mastering ethical hacking techniques, enabling you to identify and fix vulnerabilities before malicious actors can exploit them. This book guides you-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description As organizations rapidly migrate to cloud environments, robust cloud security is no longer optionalit is paramount. The Practical Cloud Security Handbook is your essential guide to navigating this complex landscape, empowering you to secure digital assets effectively and confidently in the era of distributed systems and cloud-native arc-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
📘 Cyberhigiena w rodzinie Jak chronić dzieci (i siebie) w cyfrowym świecie To nie jest książka o blokadach i hasłach. To książka o miłości, trosce i rozmowie. Bo w cyfrowym świecie dzieci wciąż najbardziej potrzebują Twojej obecności - nie aplikacji. Twoich pytań, a nie tylko zakazów. Twojego zrozumienia, zanim klikniesz "Zablokuj-
ebook
-
-
Promocja
Description In an era where telecommunication networks form the backbone of our digital society, this book provides a definitive resource for understanding and implementing robust security measures across various generations of telecom infrastructure. From the fundamental security challenges of 1G networks to the complex threat landscape of 5G, thi-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książki 1) Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP 2) Bezbieczeństwo narodowe. Teoria i praktyka 3) System bezpieczeństwa w cyberprzestrzeni RP 1) MODELE ROZWIĄZAŃ PRAWNYCH W SYSTEMIE CYBERBEZPIECZEŃSTWA RP Przedmiotem zainteresowania A-
ebook
CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książki
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska, Agnieszka Brzostek
-
-
Promocja
Description Digital forensics is a key technology of the interconnected era, allowing investigators to recover, maintain, and examine digital evidence of cybercrime. With ever-increasingly sophisticated digital threats, the applications of digital forensics increase across industries, aiding law enforcement, business security, and judicial processe-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description Cyber threats are evolving unprecedentedly, making CyberSecurity defense a crucial skill for professionals and organizations. This book is a comprehensive guide designed to equip readers with the knowledge, strategies, and best practices to secure digital assets, mitigate risks, and build resilient security frameworks. It covers the fu-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description Information security leadership demands a holistic understanding of governance, risk, and technical implementation. This book is your roadmap to mastering information security leadership and achieving the coveted EC-Council CCISO certification. This book bridges the gap between technical expertise and executive management, equipping you-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description Social engineering can be the most dangerous and effective type of hacking because the human component is notoriously the weakest link in the security chain. This Social Engineering Cookbook encompasses a blend of theoretical and practical knowledge that focuses on psychological manipulation of people to gain confidential information an-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description The cloud is ubiquitous. Everyone is rushing to the cloud or is already in the cloud, and both of these groups are concerned with cloud security. In this book, we will explain the concepts of security in a beginner friendly way, but also hint at the great expanse of knowledge that lies beyond. This book offers a detailed guide to cloud-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Master the skills needed to secure AI ecosystems from evolving cyber threats. This course delves into the risks targeting AI systems, real-world case studies, and strategies for safeguarding LLMs, GenAI applications, and AI infrastructures. Build expertise in combating attacks and ensuring compliance in AI environments.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Explore critical strategies for defending against cyber threats, securing social media, and protecting home networks.-
-
ebook
Surviving A Cyberattack. A Comprehensive Guide to Digital Security for Families and Businesses
Mercury Learning and Information, Todd G. Shipley, Art Bowker
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki 1) TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów spo-
ebook
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska, Agnieszka Brzostek, Sylwia Gliwa
-
-
Promocja
Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware. This book is a comprehensive-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Learn all about Microsoft Defender for Identity in depth and master the art of securing digital identities against emerging threats with hands-on guidance to elevate your cybersecurity skills to new heights.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Master the CNAPP lifecycle with this comprehensive guide that will teach you how to plan, deploy, and operationalize cloud security using Microsoft Defender for Cloud, enhancing your security posture across multicloud environments.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Description In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book is a valuable resource that offers practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Comprehensive guidance on evaluating cybersecurity, conducting risk assessments, and auditing IT systems for compliance across multiple platforms like AWS, Azure, and GCP.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book covers threat management, investigation, automation, and integration with other security tools to fortify organizational cybersecurity defenses effectively.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Navigate the evolving software security landscape with Crafting Secure Software. This guide equips decision makers to understand and address risks, ensure compliance, and build a culture of security within development teams.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Dive into Microsoft Teams mastery with this comprehensive exam guide. From administration to security, collaboration, and troubleshooting, gain practical skills for exam success and real-world application.x-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
The book provides a solid understanding of SIS cybersecurity challenges and artifacts required to ensure the safety of mission-critical systems. It also serves as a strong foundation for anyone looking to boost their industrial security skill set.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This exhaustive book helps you detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets based on the actual threat landscape.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Get ahead in cryptography with this second edition, covering symmetric and asymmetric encryption, zero-knowledge protocols, and quantum cryptography. Designed for cybersecurity pros, it covers updated techniques to combat evolving cyber threats.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book helps you to explore software security through gamified threat modeling, uncovering risks while making it enjoyable. You'll learn to identify, mitigate, and defend against threats, enhancing your system's security.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Description "Mastering Zero-knowledge Proofs" is your ultimate guide to blockchain and ZKPs. It connects blockchain's core elements, like distributed ledgers and smart contracts, to ZKPs' advanced privacy solutions, emphasizing their significance in today's digital world, and provides a robust understanding of how these cryptographic techniques can-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book delves into cloud security, offering practical intelligence for evaluating risks and attacks. Learn to secure cloud architecture, IAM, network security, and more with real-world examples.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
This comprehensive book helps you understand layered security. You'll cover essential concepts, from risk assessment to proactive defense strategies.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Description AWS, a leading cloud platform, demands effective security measures. This certification guide is your key to mastering AWS security best practices and passing the AWS Certified Security Specialty exam. This guide covers AWS cloud security, from basic concepts like shared responsibility and risk assessment to advanced topics like infrast-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book provides a comprehensive introduction to cybersecurity, covering key concepts, application security, and secure systems development. It includes practical examples and real-world applications.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
This book helps you learn about decentralized identities, blockchains, and associated technologies, offering insights for leveraging these tools to construct secure and seamless digital experiences.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Unlock the full potential of Docker with this course. From understanding containers and Docker standards to mastering multi-container applications and advanced deployment strategies, this course is designed to elevate your containerization skills.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Automating Security Detection Engineering will equip you with advanced tools and skills to scale your use case lifecycle and enhance your detection and threat response capabilities.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the knowledge and tools necessary to navigate the complex landscape of password security with confidence.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Introduction to Kali Purple combines red and blue team tools in a single computing environment that allows both the setup and testing of a miniature security operations center, from setting up a SIEM environment to automation, all in one location.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book covers the fundamentals of Windows 365 and Azure Virtual Desktop, addressing endpoint security challenges. You’ll also explore advanced security measures for virtual environments.-
-
ebook
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Master Kali Linux and become an ethical hacker Key Features Beginner-friendly step-by-step instruction. Hands-on labs and practical exercises. Covers essential tools and techniques. Description This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, expl-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Explore all aspects of cloud security to pass the CCSP exam and boost your career with this guide packed with use cases, mock exam questions, and tips. You'll be able to apply your new-found knowledge not only to pass the exam but also at work.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Strengthening networks, redefining security: ELK Stack leading the charge Key Features This book provides a thorough examination of zero trust network architecture, ELK Stack, and Elastic Security, encompassing foundational principles and practical deployment strategies. Readers gain practical insights into building resilient zero trust network-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI - Pakiet 2 książki 1) MODELE ROZWIĄZAŃ PRAWNYCH W SYSTEMIE CYBERBEZPIECZEŃSTWA RP Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania-
ebook
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Sylwia Gliwa
-
-
SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO - Pakiet 2 książki 1) BEZPIECZEŃSTWO NARODOWE. TEORIA I PRAKTYKA Najnowsza książka profesora Waldemara Kitlera to z pewnością jego opus vitae. Być może spośród wielu znakomitych monografii naukowych, które napisał, podsumowuje jego wielki dorobek naukowy w zakresie polskiej myśli o be-
ebook
-
-
Promocja
This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitati-
-
ebook
(29,90 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł(-15%) -
-
Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania oraz zwalczania niebezpiecznych zachowań w cyberprzestrzeni. Wyzwaniem badawczym stały się także relacje pomiędzy systemem cyberbezpieczeństwa a-
ebook
-
-
Promocja
This book helps you build your own blockchains and production-grade decentralized apps on blockchains like Ethereum, Solana, NEAR, and Polkadot. You’ll explore best practices, code, and assets that can be used for scaffolding multiple projects.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Ready to become a cloud security champion? This practical guide, written by a seasoned cybersecurity and AWS cloud consultant, equips you with the tools and strategies you need to achieve secure, compliant, and cost-effective AWS operations.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działan-
ebook
-
-
Promocja
This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
This practical guide to implementing DeFi in your projects guides you through building full-stack DeFi solutions with popular tools and teaches you how to leverage blockchain technologies to manage crypto assets.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
JaagoTeens cyber safety guide KEY FEATURES Making digital payments without being scammed and losing your money. Learning how to file a complaint with the cyber police if something goes wrong. Get some easy tips to ensure that your kids stay safe on the internet. DESCRIPTION This book is a step-by-step guide that handholds you through all the-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Your practical handbook for securing cloud-native applications KEY FEATURES An overview of security in cloud-native applications, such as modern architectures, containers, CI/CD pipeline, and so on. Using automation, such as infrastructure as code and policy as code, to achieve security at scale. Implementing security, from encryption and secr-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Elevate your Java security skills for the modern cloud era KEY FEATURES Understanding Zero-Trust security model for Java. Practical cloud security strategies for developers. Hands-on guidance for secure Java application development. DESCRIPTION This book offers a comprehensive guide to implementing Zero-Trust security principles, cloud-based-
-
ebook
Mastering Secure Java Applications
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Learn to decode the Cyber Mysteries by Mastering Network Forensics KEY FEATURES Master all essential network forensics topics with in-depth coverage. Learn from real-world examples and detailed case studies. Gain hands-on experience with network forensic tools and techniques. DESCRIPTION Network forensics is a rapidly growing field with a hi-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Take your career to the next level by becoming an ISC2 certified cloud security professional (CCSP) KEY FEATURES Prepares you to crack the ISC2 CCSP exam successfully. Provides you with concrete knowledge and skills to secure your organizations cloud. Covers all six domains of the CCSP exam in detail for a clear understanding of cloud security-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This comprehensive guide covers a range of topics in cloud security with a practical focus on providing valuable insights and skills to enable you to secure multi-cloud environments effectively.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
The comprehensive yet concise guide offers secure practices for handling sensitive data payloads, including credentials, certificates, and tokens, enabling secure access to and from your organization's resources for apps running on Kubernetes.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Wireshark: A hackers guide to network insights KEY FEATURES Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. DESCRIPTION Ethical Hacking and Network Analysis with Wires-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Unveiling the future: Navigating AI's Intricate Intersection with International Law A Journey Beyond Hype and Governance KEY FEATURES Comprehensive overview of AI ethics and international law. Exploration of pragmatic approaches to AI governance. Navigation of global legal dynamics. Soft law recommendations for responsible AI development. D-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
The Essential Guide to Web3 serves as a gateway to the decentralized web—also known as the decentralized internet—to enable you to embark on an immersive journey into the fascinating world of Web3. With brief overviews of the blockchain and the Ethereum ecosystem at the outset, this book quickly immerses you in practical blockchain ap-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Get started on Zero Trust with this step-by-step playbook and learn everything you need to know for a successful Zero Trust journey with tailored guidance for every role, covering strategy, operations, architecture, implementation, and measuring success. This book will become an indispensable reference for everyone in your organization.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
Burp Suite is an immensely powerful and popular tool for web application security testing. This book provides a collection of recipes that address vulnerabilities in web applications and APIs. It offers guidance on how to configure Burp Suite, make the most of its tools, and explore into its extensions.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Everything you need to know to secure your IoT devices KEY FEATURES Identify the security challenges and requirements of the IoT. Understand different types of threats and vulnerabilities that can affect IoT devices. Implement security measures to protect IoT devices from attack. DESCRIPTION The Internet of Things (IoT) is a rapidly growing-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
This hands-on guide will help you design and build a variety of penetration testing labs that mimic modern cloud environments running on AWS, Azure, and GCP. In addition to these, you will explore a number of practical strategies on how to manage the complexity, cost, and security risks involved when setting up vulnerable cloud lab environments.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Master automotive cybersecurity with this practical guide to ISO 21434 and UNECE regulations. Learn to integrate security into the development lifecycle, perform threat modeling, and implement cyber defenses to build secure, cyber-resilient vehicles.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments KEY FEATURES A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity. Learn everything you need to know about VAPT, from planning and governance to the PPT framework. D-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure-
-
ebook
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more KEY FEATURES Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advan-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Attacking and Exploiting Modern Web Attacks will help you understand how to identify attack surfaces and detect vulnerabilities. This book takes a hands-on approach to implementation and associated methodologies and equips you with the knowledge and skills needed to effectively combat web attacks.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Reconnaissance for Ethical Hackers provides highly contextual real-world techniques used by threat actors, ethical hackers, and pentesters to collect valuable information about organizations that can be used for future attacks and operations. This book will help you develop the ethical hacking skills needed to successfully perform reconnaissance.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
With this new edition, get to grips with Keycloak in a hands-on way with the help of brilliant examples. Keycloak - Identity and Access Management for Modern Applications 2E teaches you how to secure new and existing applications.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
The definitive guide to installing and configuring IBM FileNet Information Management software KEY FEATURES Get guidance on installation and configuration, including troubleshooting. Prepare thoroughly for installation to ensure a smooth and successful deployment. Install or upgrade Case Manager, Content Search, Case Analyzer, Monitor Dashboar-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008) KEY FEATURES Develop confidence and proficiency in various networking tasks and responsibilities. Gain a comprehensive understanding of essential network concepts, including networks, security, and cloud computing. Acquire the knowledge and skills necessary to effe-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
QRadar is a comprehensive network security management platform that can be used for creating and managing your SOC. Building Next-Gen SOC with IBM QRadar helps you with a better return on investment in terms of skill, time, and effort required for threat analysis, compliance, and reporting.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book is a comprehensive guide that explains multi-factor identification and its integration into your security infrastructure. From theoretical foundations to hands-on implementation, this book will teach you everything there is to know about choosing the right MFA solution or product for your business and configuring it for maximum impact.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
A comprehensive guide to Kubernetes, Service Mesh, and Zero-Trust principles KEY FEATURES Delve into security practices that guarantee resilience and secure deployments. Discover strategies for managing Kubernetes clusters, enhancing performance, and achieving high availability and scalability. Acquire a conceptual understanding of the challen-
-
ebook
(30,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book focuses on how machine learning can be used to solve cybersecurity issues such as fraud detection, malware analysis, deepfake identification, and misinformation detection. Each chapter covers the theory of the latest ML methods, and instructs readers in implementation, thus leading to an end-to-end understanding of the problem.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Hacking jest w tym tomie rozpatrywany z różnych perspektyw, jako: przestępstwo, incydent cyberbezpieczeństwa, eksplorowanie i modyfikowanie systemów technicznych, społecznych i biologicznych, a najogólniej - jako przełamywanie zabezpieczeń.-
ebook
(203,15 zł najniższa cena z 30 dni)
198.37 zł
239.00 zł(-17%) -
-
Promocja
Through this book, you’ll learn to administer core and advanced Windows Server and Infrastructure-as-a-Service workloads utilizing the available - on-premises, hybrid, and cloud technologies. All the skills you acquire will prepare you to ace the AZ-801: Configuring Windows Server Hybrid Advanced Services Exam.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti-
-
ebook
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
-
Promocja
Gain a solid understanding of security, compliance, and regulatory risks associated with the rapid digitization of systems and processes post pandemic. This book guides you with the proper steps you need to take to mitigate risks and attacks and helps you make your business future-proof.-
-
ebook
Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith
(39,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
This practical guide will help developers working with networking technologies such as CSMA, P2P, Wi-Fi, Wi-Fi 6, and LTE to perform advanced network simulations using ns-3. This book provides a hands-on approach to evaluating useful test scenarios of wired, Wi-Fi, LTE networks in the context of real-time deployments and research activities.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Mastering Blockchain, Fourth Edition, is the blockchain bible to equip you with extensive knowledge of distributed ledger technology, cryptocurrencies, and blockchain platforms such as Ethereum, Solana, and Bitcoin. With updates on new concepts like privacy, scalability, and DeFi, this book will help keep your knowledge and skills up to date.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What-
-
ebook
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
-
Promocja
This book targets IT professionals who implement and manage native security features within the Azure platform. You’ll learn all about Identity, Network Security Groups, Azure Firewall, Web Application Firewall, DDoS, Azure Bastion, Azure VPN, and native Azure security tools such as Microsoft Defender for Cloud and Microsoft Sentinel.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Crack a ransomware by identifying and exploiting weaknesses in its design KEY FEATURES Get an overview of the current security mechanisms available to prevent ransomware digital extortion. Explore different techniques to analyze a ransomware attack. Understand how cryptographic libraries are misused by malware authors to code ransomwares. DES-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
This book provides a security baseline to reduce the risk of future attacks. The chapters will teach you how to secure your Windows endpoint, protect devices with Microsoft Defender, and secure hybrid workloads using Azure Arc, enabling you to protect your infrastructure, network, and data with the help of SASE and the Zero Trust model.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
The book: “PACKET TRACER FOR YOUNG BEGINNING ADMINS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configu-
-
ebook
Packet Tracer for young beginning admins
Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek Smyczek
(64,50 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title.-
-
ebook
(64,50 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR ADVANCED USERS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations-
-
ebook
(64,50 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
The book: “PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors ha-
-
ebook
(64,50 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
The book: “PACKET TRACER FOR YOUNG ADVANCED ADMINS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations were prepared-
-
ebook
(64,50 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of-
-
ebook
Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
(64,50 zł najniższa cena z 30 dni)
96.75 zł
129.00 zł(-25%) -
-
Promocja
Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks. It starts with a tutorial on compiling code and goes on to explain the process of Windows systems and how attackers can exploit it to evade security measures, ensuring that you can stay safe from ATP malware.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
The Executive’s Cybersecurity Program Handbook helps you perform internal assessments to drive strategic cybersecurity program development and evaluate risk within an organization. With this book, you’ll be able to build an incident response team and implement administrative and technical security controls.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark KEY FEATURES Minimize your organization's exposure to cybersecurity threats with Vulnerability management. Learn how to locate vulnerabilities using Nessus and Wireshark. Explore and work with different network analysis and mapping to-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
W książce omówiono zagadnienia dotyczące ochrony danych osobowych w różnych służbach mundurowych. Pozycja skierowana jest do wykładowców i studentów szkół wyższych o kierunku bezpieczeństwo wewnętrzne. Będzie również przydatna dla wszystkich osób zainteresowanych tematyką ochrony danych osobowych.-
ebook
-
-
Promocja
This book is a guide to help security professionals learn about the process of discovering and publishing vulnerabilities in software. They'll learn how to build and execute winning vulnerability research strategies and disclosure methods and find out exactly how to claim credit for their work by opening CVEs and sharing their research publicly.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
The go-to guide for building non-fungible token projects on the Ethereum blockchain KEY FEATURES Get an in-depth understanding of digital assets and crypto-collectables. Learn to create, test, and launch an ERC-721 token contract on the Ethereum testnet. Uncover effective ways to market and promote your NFTs on social media platforms. DESCRIP-
-
ebook
(25,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
Combating Crime on the Dark Web gives you a deep understanding of how criminal elements operate on the dark web and how you can strategize and use various tools to disrupt those operations. If you’re looking to pave your way to an exciting and rewarding career in crime prevention, this book is a must-read.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
DevSecOps in Practice with VMware Tanzu is a comprehensive learning reference covering the best-in-class tools that will aid in enhancing developer productivity, operational efficiency, and intrinsic security. This book will help you in laying out the easiest path to production for apps built to run in multi-cloud Kubernetes environments.-
-
ebook
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
e_39t1/e_39t1.mp3 e_39t1Cloud Auditing Best Practices is a complete guide to assessing security and IT controls in the big three cloud environments: Azure, AWS, and GCP. Once you’ve read this book, you’ll be able to build and execute an IT audit plan that will effectively assess cloud security and IT controls adherence to compliance objectives with ease.-
-
ebook
-
audiobook
(39,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and-
-
ebook
(29,90 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -

