Hacking - książki
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Helion
- 
                Promocja Promocja 2za1  Description In an era where telecommunication networks form the backbone of our digital society, this book provides a definitive resource for understanding and implementing robust security measures across various generations of telecom infrastructure. From the fundamental security challenges of 1G networks to the complex threat landscape of 5G, thi Description In an era where telecommunication networks form the backbone of our digital society, this book provides a definitive resource for understanding and implementing robust security measures across various generations of telecom infrastructure. From the fundamental security challenges of 1G networks to the complex threat landscape of 5G, thi- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  With AI in the hands of cybercriminals, traditional security controls and response mechanisms are swiftly moving toward obsolescence. Intelligent Continuous Security (ICS) helps organizations stay toe-to-toe with adversaries, replacing outmoded defenses with a cohesive strategy that unifies security across the entire software lifecycle. Author Marc With AI in the hands of cybercriminals, traditional security controls and response mechanisms are swiftly moving toward obsolescence. Intelligent Continuous Security (ICS) helps organizations stay toe-to-toe with adversaries, replacing outmoded defenses with a cohesive strategy that unifies security across the entire software lifecycle. Author Marc- 
                    
- ePub + Mobi pkt
 (152,90 zł najniższa cena z 30 dni) 228.65 zł 269.00 zł(-15%)
- 
                    
- 
                Promocja 2za1  CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książki 1) Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP 2) Bezbieczeństwo narodowe. Teoria i praktyka 3) System bezpieczeństwa w cyberprzestrzeni RP 1) MODELE ROZWIĄZAŃ PRAWNYCH W SYSTEMIE CYBERBEZPIECZEŃSTWA RP Przedmiotem zainteresowania A CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książki 1) Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP 2) Bezbieczeństwo narodowe. Teoria i praktyka 3) System bezpieczeństwa w cyberprzestrzeni RP 1) MODELE ROZWIĄZAŃ PRAWNYCH W SYSTEMIE CYBERBEZPIECZEŃSTWA RP Przedmiotem zainteresowania A- PDF + ePub + Mobi pkt
 CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książkiWaldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska, Agnieszka Brzostek 
- 
                Promocja Promocja 2za1  Description Microsoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape. This book will introduce readers to Microsoft security solutions. I Description Microsoft security technologies provide a robust, integrated defense against evolving cyber threats, spanning identity, endpoints, applications, and data across hybrid environments. It offers a unified and intelligent defense across an organization's digital landscape. This book will introduce readers to Microsoft security solutions. I- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Digital forensics is a key technology of the interconnected era, allowing investigators to recover, maintain, and examine digital evidence of cybercrime. With ever-increasingly sophisticated digital threats, the applications of digital forensics increase across industries, aiding law enforcement, business security, and judicial processe Description Digital forensics is a key technology of the interconnected era, allowing investigators to recover, maintain, and examine digital evidence of cybercrime. With ever-increasingly sophisticated digital threats, the applications of digital forensics increase across industries, aiding law enforcement, business security, and judicial processe- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description In today's interconnected world, organizations face increasing challenges in managing the complex landscape of information security, risk, and compliance. This book provides a practical framework for navigating these challenges, enabling professionals to establish and maintain robust systems that protect sensitive data, adhere to regula Description In today's interconnected world, organizations face increasing challenges in managing the complex landscape of information security, risk, and compliance. This book provides a practical framework for navigating these challenges, enabling professionals to establish and maintain robust systems that protect sensitive data, adhere to regula- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description In today's ever-expanding digital world, cyber threats are constantly evolving, and organizations are struggling to keep pace. Managing the Cyber Risk equips CISOs and security professionals with the knowledge and strategies necessary to build a robust defense against these ever-present dangers. This comprehensive guide takes you on a Description In today's ever-expanding digital world, cyber threats are constantly evolving, and organizations are struggling to keep pace. Managing the Cyber Risk equips CISOs and security professionals with the knowledge and strategies necessary to build a robust defense against these ever-present dangers. This comprehensive guide takes you on a- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Cyber threats are evolving unprecedentedly, making CyberSecurity defense a crucial skill for professionals and organizations. This book is a comprehensive guide designed to equip readers with the knowledge, strategies, and best practices to secure digital assets, mitigate risks, and build resilient security frameworks. It covers the fu Description Cyber threats are evolving unprecedentedly, making CyberSecurity defense a crucial skill for professionals and organizations. This book is a comprehensive guide designed to equip readers with the knowledge, strategies, and best practices to secure digital assets, mitigate risks, and build resilient security frameworks. It covers the fu- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description CompTIA Advanced Security Practitioner (CASP+) is a vendor-neutral security certification. It validates advanced-level core technical skills, including active management of security engineering, operations, incidents, handling enterprise-level risk assessments, and IT governance. This book navigates the critical domains of the CASP+ ex Description CompTIA Advanced Security Practitioner (CASP+) is a vendor-neutral security certification. It validates advanced-level core technical skills, including active management of security engineering, operations, incidents, handling enterprise-level risk assessments, and IT governance. This book navigates the critical domains of the CASP+ ex- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development. Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across m Maintaining secrets, credentials, and nonhuman identities in secure ways is an important, though often overlooked, aspect of secure software development. Cloud migration and digital transformation have led to an explosion of nonhuman identities—like automation scripts, cloud native apps, and DevOps tools—that need to be secured across m- 
                    
- ePub + Mobi pkt
 (112,90 zł najniższa cena z 30 dni) 169.14 zł 199.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  Description Microsoft Defender for Endpoint is a powerful tool for securing your environment, and this book is your practical guide to using it effectively. Written by an engineer who works hands-on with the daily challenges of IT infrastructure, it covers everything from on-prem data centers to cloud platforms like AWS, Azure, and GCP, across Wind Description Microsoft Defender for Endpoint is a powerful tool for securing your environment, and this book is your practical guide to using it effectively. Written by an engineer who works hands-on with the daily challenges of IT infrastructure, it covers everything from on-prem data centers to cloud platforms like AWS, Azure, and GCP, across Wind- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description GKE simplifies deploying and managing containerized applications, a crucial skill in today's cloud-native landscape. This book guides you from foundational concepts to practical implementation, preparing you to effectively use GKE for scalable and reliable deployments. The book begins with an introduction to containerization and Kubern Description GKE simplifies deploying and managing containerized applications, a crucial skill in today's cloud-native landscape. This book guides you from foundational concepts to practical implementation, preparing you to effectively use GKE for scalable and reliable deployments. The book begins with an introduction to containerization and Kubern- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Designing a scalable Unity project requires more than just codingit demands thoughtful planning, structured architecture, and adherence to best practices. This book is your ultimate guide to building modular and maintainable Unity projects using C# and proven game architecture techniques. This book provides the tools and knowledge you n Description Designing a scalable Unity project requires more than just codingit demands thoughtful planning, structured architecture, and adherence to best practices. This book is your ultimate guide to building modular and maintainable Unity projects using C# and proven game architecture techniques. This book provides the tools and knowledge you n- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This comprehensive guide covers key topics such as Microsoft Entra ID implementation, authentication and access management, external user management, and hybrid identity solutions, providing practical insights and techniques for SC-300 exam success. This comprehensive guide covers key topics such as Microsoft Entra ID implementation, authentication and access management, external user management, and hybrid identity solutions, providing practical insights and techniques for SC-300 exam success.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Information security leadership demands a holistic understanding of governance, risk, and technical implementation. This book is your roadmap to mastering information security leadership and achieving the coveted EC-Council CCISO certification. This book bridges the gap between technical expertise and executive management, equipping you Description Information security leadership demands a holistic understanding of governance, risk, and technical implementation. This book is your roadmap to mastering information security leadership and achieving the coveted EC-Council CCISO certification. This book bridges the gap between technical expertise and executive management, equipping you- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Social engineering can be the most dangerous and effective type of hacking because the human component is notoriously the weakest link in the security chain. This Social Engineering Cookbook encompasses a blend of theoretical and practical knowledge that focuses on psychological manipulation of people to gain confidential information an Description Social engineering can be the most dangerous and effective type of hacking because the human component is notoriously the weakest link in the security chain. This Social Engineering Cookbook encompasses a blend of theoretical and practical knowledge that focuses on psychological manipulation of people to gain confidential information an- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web applications, including online banking, mobile payments, and e-commerce applications. Covering a diverse array of topics, this book provides a comprehe Description Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web applications, including online banking, mobile payments, and e-commerce applications. Covering a diverse array of topics, this book provides a comprehe- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth, a powerful framework for API security, offers tools to protect sensitive business data and enforce dynamic access With the growth of cloud native applications, developers increasingly rely on APIs to make everything work. But security often lags behind, making APIs an attractive target for bad actors looking to access valuable business data. OAuth, a powerful framework for API security, offers tools to protect sensitive business data and enforce dynamic access- 
                    
- ePub + Mobi pkt
 (112,90 zł najniższa cena z 30 dni) 169.14 zł 199.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  This comprehensive exam guide is designed to transform you into an AWS networking expert, going beyond the ANS-C01 exam blueprint to maximize your impact in the field. This comprehensive exam guide is designed to transform you into an AWS networking expert, going beyond the ANS-C01 exam blueprint to maximize your impact in the field.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This tailor-made study guide will equip you with the skills, knowledge, and confidence to pass the SnowPro Core Certification exam and apply what you have learned in your organization. This tailor-made study guide will equip you with the skills, knowledge, and confidence to pass the SnowPro Core Certification exam and apply what you have learned in your organization.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Cloud computing is transforming the way businesses and individuals operate, offering scalability, flexibility, and efficiency. Cloud Computing for Everyone provides a structured and practical approach to understanding cloud technology, from foundational concepts to advanced applications. The book also covers service models, deployment s Description Cloud computing is transforming the way businesses and individuals operate, offering scalability, flexibility, and efficiency. Cloud Computing for Everyone provides a structured and practical approach to understanding cloud technology, from foundational concepts to advanced applications. The book also covers service models, deployment s- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Quantum blockchain uses the power of quantum computing to solve issues like security and scalability that traditional blockchains face. With its ability to handle large data sets and solve complex problems much faster, it can greatly improve transaction speeds, security, and efficiency. This book begins by explaining the basics of bloc Description Quantum blockchain uses the power of quantum computing to solve issues like security and scalability that traditional blockchains face. With its ability to handle large data sets and solve complex problems much faster, it can greatly improve transaction speeds, security, and efficiency. This book begins by explaining the basics of bloc- 
                    
- ePub + Mobi pkt
 Quantum BlockchainDr. Mahendra Kumar Shrivas, Dr. Kamal Kant Hiran, Dr. Ashok Bhansali, Umesh Kumar Sahu (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description The cloud is ubiquitous. Everyone is rushing to the cloud or is already in the cloud, and both of these groups are concerned with cloud security. In this book, we will explain the concepts of security in a beginner friendly way, but also hint at the great expanse of knowledge that lies beyond. This book offers a detailed guide to cloud Description The cloud is ubiquitous. Everyone is rushing to the cloud or is already in the cloud, and both of these groups are concerned with cloud security. In this book, we will explain the concepts of security in a beginner friendly way, but also hint at the great expanse of knowledge that lies beyond. This book offers a detailed guide to cloud- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book shows you how to automate essential security tasks like vulnerability scanning, patch management, and threat intelligence gathering. Streamline your security workflows and enhance defense strategies with custom Python scripts. This book shows you how to automate essential security tasks like vulnerability scanning, patch management, and threat intelligence gathering. Streamline your security workflows and enhance defense strategies with custom Python scripts.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Vulnerability Assessment and Penetration Testing (VAPT) combinations are a huge requirement for all organizations to improve their security posture. The VAPT process helps highlight the associated threats and risk exposure within the organization. This book covers practical VAPT technologies, dives into the logic of vulnerabilities, and Description Vulnerability Assessment and Penetration Testing (VAPT) combinations are a huge requirement for all organizations to improve their security posture. The VAPT process helps highlight the associated threats and risk exposure within the organization. This book covers practical VAPT technologies, dives into the logic of vulnerabilities, and- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Explore critical strategies for defending against cyber threats, securing social media, and protecting home networks. Explore critical strategies for defending against cyber threats, securing social media, and protecting home networks.- 
                    
- PDF + ePub pkt
 Surviving A Cyberattack. A Comprehensive Guide to Digital Security for Families and BusinessesMercury Learning and Information, Todd G. Shipley, Art Bowker (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware. This book is a comprehensive Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware. This book is a comprehensive- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book covers everything from basic scripting to advanced techniques for reconnaissance, exploitation, and integration with AI. You'll master essential skills to automate tasks, analyze data, and enhance cybersecurity assessments. This book covers everything from basic scripting to advanced techniques for reconnaissance, exploitation, and integration with AI. You'll master essential skills to automate tasks, analyze data, and enhance cybersecurity assessments.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Learn all about Microsoft Defender for Identity in depth and master the art of securing digital identities against emerging threats with hands-on guidance to elevate your cybersecurity skills to new heights. Learn all about Microsoft Defender for Identity in depth and master the art of securing digital identities against emerging threats with hands-on guidance to elevate your cybersecurity skills to new heights.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This edition provides practical recipes for both common and advanced administrative tasks, covering everything from individual apps to comprehensive security and compliance across the entire Microsoft 365 suite using Microsoft Defender. This edition provides practical recipes for both common and advanced administrative tasks, covering everything from individual apps to comprehensive security and compliance across the entire Microsoft 365 suite using Microsoft Defender.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Master the CNAPP lifecycle with this comprehensive guide that will teach you how to plan, deploy, and operationalize cloud security using Microsoft Defender for Cloud, enhancing your security posture across multicloud environments. Master the CNAPP lifecycle with this comprehensive guide that will teach you how to plan, deploy, and operationalize cloud security using Microsoft Defender for Cloud, enhancing your security posture across multicloud environments.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture. The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Ace the SC-100 exam with this essential guide, covering advanced cloud security strategies, zero-trust architecture, and GRC evaluations. Benefit from real-world examples and practice exams questions to ensure certification success. Ace the SC-100 exam with this essential guide, covering advanced cloud security strategies, zero-trust architecture, and GRC evaluations. Benefit from real-world examples and practice exams questions to ensure certification success.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book offers in-depth coverage and practical insights for effectively securing AWS environments, encompassing key services, compliance, and best practices. This book offers in-depth coverage and practical insights for effectively securing AWS environments, encompassing key services, compliance, and best practices.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Embark on a dynamic journey through command shells with this hands-on manual. From the Linux staple Bash to rising stars like Z shell and PowerShell, master their power for Linux, macOS, and Unix. Embark on a dynamic journey through command shells with this hands-on manual. From the Linux staple Bash to rising stars like Z shell and PowerShell, master their power for Linux, macOS, and Unix.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It Description In an age where data breaches and privacy issues are growing, confidential computing offers a state-of-the-art solution. This technology helps organizations keep their most sensitive information safe, even against strong threats. Introduction to Confidential Computing provides a clear guide to this advanced cybersecurity technology. It- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book equips network professionals with the skills to monitor, analyze, and optimize network infrastructures using specific tools. With advanced techniques, you'll learn how to build tailored observability solutions for your needs. This book equips network professionals with the skills to monitor, analyze, and optimize network infrastructures using specific tools. With advanced techniques, you'll learn how to build tailored observability solutions for your needs.- 
                    
- PDF + ePub pkt
 Modern Network Observability. A hands-on approach using open source tools such as Telegraf, Prometheus, and GrafanaDavid Flores, Christian Adell, Josh VanDeraa, Eric Chou, Damien Garros (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett Description This book provides a detailed introduction to digital forensics, covering core concepts, principles, and the role of various teams in incident response. From data acquisition to advanced forensics techniques, it equips readers with the skills to identify, analyze, and respond to security incidents effectively. It guides readers in sett- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape. Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book is a valuable resource that offers practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape This book is a valuable resource that offers practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats. A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape, Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This latest edition of Practical Hardware Pentesting features even more practical advice on how to pentest various devices, from IoT to simpler hardware. As you progress through the chapters, you'll quickly learn the most common attack techniques, as well as ways to secure embedded systems and build more secure devices. This latest edition of Practical Hardware Pentesting features even more practical advice on how to pentest various devices, from IoT to simpler hardware. As you progress through the chapters, you'll quickly learn the most common attack techniques, as well as ways to secure embedded systems and build more secure devices.- 
                    
- ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine- 
                    
- ePub + Mobi pkt
 (106,90 zł najniższa cena z 30 dni) 160.65 zł 189.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  Comprehensive guidance on evaluating cybersecurity, conducting risk assessments, and auditing IT systems for compliance across multiple platforms like AWS, Azure, and GCP. Comprehensive guidance on evaluating cybersecurity, conducting risk assessments, and auditing IT systems for compliance across multiple platforms like AWS, Azure, and GCP.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Navigate the evolving software security landscape with Crafting Secure Software. This guide equips decision makers to understand and address risks, ensure compliance, and build a culture of security within development teams. Navigate the evolving software security landscape with Crafting Secure Software. This guide equips decision makers to understand and address risks, ensure compliance, and build a culture of security within development teams.- 
                    
- PDF + ePub pkt
 (78,90 zł najniższa cena z 30 dni) 152.10 zł 169.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Advance in your cybersecurity career with targeted interview preparation, practical guidance, and insider tips. Discussing roles from cybersecurity engineer to CISO, this edition addresses reader feedback and covers the latest industry developments. Advance in your cybersecurity career with targeted interview preparation, practical guidance, and insider tips. Discussing roles from cybersecurity engineer to CISO, this edition addresses reader feedback and covers the latest industry developments.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Dive into Microsoft Teams mastery with this comprehensive exam guide. From administration to security, collaboration, and troubleshooting, gain practical skills for exam success and real-world application.x Dive into Microsoft Teams mastery with this comprehensive exam guide. From administration to security, collaboration, and troubleshooting, gain practical skills for exam success and real-world application.x- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  The book provides a solid understanding of SIS cybersecurity challenges and artifacts required to ensure the safety of mission-critical systems. It also serves as a strong foundation for anyone looking to boost their industrial security skill set. The book provides a solid understanding of SIS cybersecurity challenges and artifacts required to ensure the safety of mission-critical systems. It also serves as a strong foundation for anyone looking to boost their industrial security skill set.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  From secure development environments to continuous security and compliance integration, this comprehensive guide equips you with the skills to implement a robust code-to-cloud process tailored for Azure environments. From secure development environments to continuous security and compliance integration, this comprehensive guide equips you with the skills to implement a robust code-to-cloud process tailored for Azure environments.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This exhaustive book helps you detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets based on the actual threat landscape. This exhaustive book helps you detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets based on the actual threat landscape.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and r With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and r- 
                    
- ePub + Mobi pkt
 (112,90 zł najniższa cena z 30 dni) 169.14 zł 199.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  This book helps you to explore software security through gamified threat modeling, uncovering risks while making it enjoyable. You'll learn to identify, mitigate, and defend against threats, enhancing your system's security. This book helps you to explore software security through gamified threat modeling, uncovering risks while making it enjoyable. You'll learn to identify, mitigate, and defend against threats, enhancing your system's security.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  A comprehensive guide to network security and cryptography, this book covers the basics of computer networks, encryption methods, and security protocols. Learn how to protect data using symmetric and asymmetric encryption, secure modern technologies like IoT and blockchain, and apply AI techniques for intrusion detection. A comprehensive guide to network security and cryptography, this book covers the basics of computer networks, encryption methods, and security protocols. Learn how to protect data using symmetric and asymmetric encryption, secure modern technologies like IoT and blockchain, and apply AI techniques for intrusion detection.- 
                    
- PDF + ePub pkt
 (110,90 zł najniższa cena z 30 dni) 215.10 zł 239.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description "Mastering Zero-knowledge Proofs" is your ultimate guide to blockchain and ZKPs. It connects blockchain's core elements, like distributed ledgers and smart contracts, to ZKPs' advanced privacy solutions, emphasizing their significance in today's digital world, and provides a robust understanding of how these cryptographic techniques can Description "Mastering Zero-knowledge Proofs" is your ultimate guide to blockchain and ZKPs. It connects blockchain's core elements, like distributed ledgers and smart contracts, to ZKPs' advanced privacy solutions, emphasizing their significance in today's digital world, and provides a robust understanding of how these cryptographic techniques can- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book introduces discrete mathematics concepts with a focus on their applications in cryptography. Ideal for self-teaching, it includes thorough explanations, examples, and exercises. This book introduces discrete mathematics concepts with a focus on their applications in cryptography. Ideal for self-teaching, it includes thorough explanations, examples, and exercises.- 
                    
- PDF + ePub pkt
 (124,90 zł najniższa cena z 30 dni) 242.10 zł 269.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book delves into cloud security, offering practical intelligence for evaluating risks and attacks. Learn to secure cloud architecture, IAM, network security, and more with real-world examples. This book delves into cloud security, offering practical intelligence for evaluating risks and attacks. Learn to secure cloud architecture, IAM, network security, and more with real-world examples.- 
                    
- PDF + ePub pkt
 (87,90 zł najniższa cena z 30 dni) 170.10 zł 189.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This comprehensive book helps you understand layered security. You'll cover essential concepts, from risk assessment to proactive defense strategies. This comprehensive book helps you understand layered security. You'll cover essential concepts, from risk assessment to proactive defense strategies.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description AWS, a leading cloud platform, demands effective security measures. This certification guide is your key to mastering AWS security best practices and passing the AWS Certified Security Specialty exam. This guide covers AWS cloud security, from basic concepts like shared responsibility and risk assessment to advanced topics like infrast Description AWS, a leading cloud platform, demands effective security measures. This certification guide is your key to mastering AWS security best practices and passing the AWS Certified Security Specialty exam. This guide covers AWS cloud security, from basic concepts like shared responsibility and risk assessment to advanced topics like infrast- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  An in-depth guide to computer security and encryption, covering advanced topics like cryptography, IPSEC, and VPNs. Essential for IT professionals and security experts. An in-depth guide to computer security and encryption, covering advanced topics like cryptography, IPSEC, and VPNs. Essential for IT professionals and security experts.- 
                    
- PDF + ePub pkt
 (87,90 zł najniższa cena z 30 dni) 170.10 zł 189.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book provides a comprehensive introduction to cybersecurity, covering key concepts, application security, and secure systems development. It includes practical examples and real-world applications. This book provides a comprehensive introduction to cybersecurity, covering key concepts, application security, and secure systems development. It includes practical examples and real-world applications.- 
                    
- PDF + ePub pkt
 (68,90 zł najniższa cena z 30 dni) 134.10 zł 149.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book provides a thorough overview of blockchain and Bitcoin, exploring their technical foundations, applications, and future trends. This book provides a thorough overview of blockchain and Bitcoin, exploring their technical foundations, applications, and future trends.- 
                    
- PDF + ePub pkt
 (87,90 zł najniższa cena z 30 dni) 170.10 zł 189.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Unlock the full potential of Docker with this course. From understanding containers and Docker standards to mastering multi-container applications and advanced deployment strategies, this course is designed to elevate your containerization skills. Unlock the full potential of Docker with this course. From understanding containers and Docker standards to mastering multi-container applications and advanced deployment strategies, this course is designed to elevate your containerization skills.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Description This book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream Description This book establishes a strong foundation by explaining core concepts like operating systems, networking, and databases. Understanding these systems forms the bedrock for comprehending security threats and vulnerabilities. The book gives aspiring information security professionals the knowledge and skills to confidently land their dream- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Introduction to Kali Purple combines red and blue team tools in a single computing environment that allows both the setup and testing of a miniature security operations center, from setting up a SIEM environment to automation, all in one location. Introduction to Kali Purple combines red and blue team tools in a single computing environment that allows both the setup and testing of a miniature security operations center, from setting up a SIEM environment to automation, all in one location.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify and fix vulnerabilities. From emerging threats to best practices, this book helps you defend and safeguard your APIs. API Security for White Hat Hackers is a comprehensive guide that simplifies API security by showing you how to identify and fix vulnerabilities. From emerging threats to best practices, this book helps you defend and safeguard your APIs.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book covers the fundamentals of Windows 365 and Azure Virtual Desktop, addressing endpoint security challenges. You’ll also explore advanced security measures for virtual environments. This book covers the fundamentals of Windows 365 and Azure Virtual Desktop, addressing endpoint security challenges. You’ll also explore advanced security measures for virtual environments.- 
                    
- PDF + ePub pkt
 Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructureDominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book will help you understand key security principles and how they are implemented with Spring Security. You'll also gain an in-depth understanding of Spring Security's new features applied to servlet and reactive Spring applications. This book will help you understand key security principles and how they are implemented with Spring Security. You'll also gain an in-depth understanding of Spring Security's new features applied to servlet and reactive Spring applications.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book covers program selection, security methodologies, and advanced techniques like enumeration and privilege escalation. You’ll gain the skills to excel in bug bounty programs, contributing to enhanced cybersecurity while maximizing rewards. This book covers program selection, security methodologies, and advanced techniques like enumeration and privilege escalation. You’ll gain the skills to excel in bug bounty programs, contributing to enhanced cybersecurity while maximizing rewards.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Automating Security Detection Engineering will equip you with advanced tools and skills to scale your use case lifecycle and enhance your detection and threat response capabilities. Automating Security Detection Engineering will equip you with advanced tools and skills to scale your use case lifecycle and enhance your detection and threat response capabilities.- 
                    
- PDF + ePub pkt
 (68,90 zł najniższa cena z 30 dni) 134.10 zł 149.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book helps entry, mid-level, and senior managers master soft skills, craft a compelling brand, and strategically plan their career in C-suite roles with the help of expert insights needed for success in digital leadership and executive roles. This book helps entry, mid-level, and senior managers master soft skills, craft a compelling brand, and strategically plan their career in C-suite roles with the help of expert insights needed for success in digital leadership and executive roles.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the knowledge and tools necessary to navigate the complex landscape of password security with confidence. From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the knowledge and tools necessary to navigate the complex landscape of password security with confidence.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help- 
                    
- ePub + Mobi pkt
 (123,90 zł najniższa cena z 30 dni) 186.15 zł 219.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  Master Kali Linux and become an ethical hacker Key Features Beginner-friendly step-by-step instruction. Hands-on labs and practical exercises. Covers essential tools and techniques. Description This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, expl Master Kali Linux and become an ethical hacker Key Features Beginner-friendly step-by-step instruction. Hands-on labs and practical exercises. Covers essential tools and techniques. Description This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, expl- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  As technology continues to advance and more business is conducted online, the potential attack surface increases exponentially and the need for strong application security measures become more and more crucial. This goes double for any organization that handles sensitive personal or financial information which is usually subject to government regul As technology continues to advance and more business is conducted online, the potential attack surface increases exponentially and the need for strong application security measures become more and more crucial. This goes double for any organization that handles sensitive personal or financial information which is usually subject to government regul- 
                    
- ePub + Mobi pkt
 (95,90 zł najniższa cena z 30 dni) 143.65 zł 169.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  Strengthening networks, redefining security: ELK Stack leading the charge Key Features This book provides a thorough examination of zero trust network architecture, ELK Stack, and Elastic Security, encompassing foundational principles and practical deployment strategies. Readers gain practical insights into building resilient zero trust network Strengthening networks, redefining security: ELK Stack leading the charge Key Features This book provides a thorough examination of zero trust network architecture, ELK Stack, and Elastic Security, encompassing foundational principles and practical deployment strategies. Readers gain practical insights into building resilient zero trust network- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja 2za1  CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki 1) STRATEGIE CYBERBEZPIECZEŃSTWA WSPÓŁCZESNEGO ŚWIATA Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki 1) STRATEGIE CYBERBEZPIECZEŃSTWA WSPÓŁCZESNEGO ŚWIATA Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko,- PDF + ePub + Mobi pkt
 CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książkiKatarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna Badźmirowska-Masłowska 
- 
                Promocja Promocja 2za1  The book is designed for a practical approach to learning, with examples based on scenarios. It covers possible OSINT blueprints from the beginning to an advanced level Key Features Learn about OSINT and how to set up an OSINT environment for investigations. Master techniques for tracking fraud SMS and investigating emails. Explore reverse ima The book is designed for a practical approach to learning, with examples based on scenarios. It covers possible OSINT blueprints from the beginning to an advanced level Key Features Learn about OSINT and how to set up an OSINT environment for investigations. Master techniques for tracking fraud SMS and investigating emails. Explore reverse ima- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja 2za1  SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO - Pakiet 2 książki 1) BEZPIECZEŃSTWO NARODOWE. TEORIA I PRAKTYKA Najnowsza książka profesora Waldemara Kitlera to z pewnością jego opus vitae. Być może spośród wielu znakomitych monografii naukowych, które napisał, podsumowuje jego wielki dorobek naukowy w zakresie polskiej myśli o be SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO - Pakiet 2 książki 1) BEZPIECZEŃSTWO NARODOWE. TEORIA I PRAKTYKA Najnowsza książka profesora Waldemara Kitlera to z pewnością jego opus vitae. Być może spośród wielu znakomitych monografii naukowych, które napisał, podsumowuje jego wielki dorobek naukowy w zakresie polskiej myśli o be- PDF + ePub + Mobi pkt
 
- 
                Promocja Promocja 2za1  This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape. This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book provides invaluable insights into the evolving security landscape, offering practical strategies for implementing and maximizing the effectiveness of EDR tools. This book provides invaluable insights into the evolving security landscape, offering practical strategies for implementing and maximizing the effectiveness of EDR tools.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Implementing Palo Alto Prisma Access not only teaches you how and why to deploy Prisma Access, but also delves into component interaction. Discover how to leverage advanced configurations to optimize the user experience and tighten your security. Implementing Palo Alto Prisma Access not only teaches you how and why to deploy Prisma Access, but also delves into component interaction. Discover how to leverage advanced configurations to optimize the user experience and tighten your security.- 
                    
- PDF + ePub pkt
 (68,90 zł najniższa cena z 30 dni) 134.10 zł 149.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts. This book systematically takes you through all aspects of ethical hacking. Encompassing topics such as attack methodologies and featuring practical exercises, this book is an essential resource for cybersecurity enthusiasts.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes?This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioner How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes?This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioner- 
                    
- ePub + Mobi pkt
 (106,90 zł najniższa cena z 30 dni) 160.65 zł 189.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitati Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitati- 
                    
- ePub + Mobi pkt
 (152,90 zł najniższa cena z 30 dni) 228.65 zł 269.00 zł(-15%)
- 
                    
- 
                Promocja 2za1  Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów społecznościowych, które umożliwiają organizacjom terrorystycznym docieranie do odbiorców na masową skalę, przy czym kr Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów społecznościowych, które umożliwiają organizacjom terrorystycznym docieranie do odbiorców na masową skalę, przy czym kr- PDF + ePub + Mobi pkt
 
- 
                Promocja Promocja 2za1  In an era plagued by hacking and security breaches, this book takes you through Kali Linux's latest version, addressing critical security concerns and finding hidden vulnerabilities as you learn penetration testing. In an era plagued by hacking and security breaches, this book takes you through Kali Linux's latest version, addressing critical security concerns and finding hidden vulnerabilities as you learn penetration testing.- 
                    
- PDF + ePub pkt
 (68,90 zł najniższa cena z 30 dni) 134.10 zł 149.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book helps you build your own blockchains and production-grade decentralized apps on blockchains like Ethereum, Solana, NEAR, and Polkadot. You’ll explore best practices, code, and assets that can be used for scaffolding multiple projects. This book helps you build your own blockchains and production-grade decentralized apps on blockchains like Ethereum, Solana, NEAR, and Polkadot. You’ll explore best practices, code, and assets that can be used for scaffolding multiple projects.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing resilient security measures, all tailored for varying levels of expertise. This book provides a holistic guide for CISOs, covering everything from understanding cyber threats to implementing resilient security measures, all tailored for varying levels of expertise.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations. With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Ready to become a cloud security champion? This practical guide, written by a seasoned cybersecurity and AWS cloud consultant, equips you with the tools and strategies you need to achieve secure, compliant, and cost-effective AWS operations. Ready to become a cloud security champion? This practical guide, written by a seasoned cybersecurity and AWS cloud consultant, equips you with the tools and strategies you need to achieve secure, compliant, and cost-effective AWS operations.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja 2za1  Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działan Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działan- PDF + ePub + Mobi pkt
 
- 
                Promocja Promocja 2za1  By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field. By incorporating cyber threat intelligence, adversary emulation provides a form of cybersecurity assessment that mimics advanced persistent threat (APT) tactics, techniques, and procedures (TTPs). This comprehensive guide introduces an empirical approach with strategies and processes collected over a decade of experience in the cybersecurity field.- 
                    
- ePub + Mobi pkt
 (123,90 zł najniższa cena z 30 dni) 186.15 zł 219.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  Fortify your mobile world: Discover cutting-edge techniques for mobile security testing KEY FEATURES Learn basic and advanced penetration testing with mobile devices. Learn how to install, utilize, and make the most of Kali NetHunter. Design and follow your cybersecurity career path. DESCRIPTION Mobile devices are vital in our lives, so secu Fortify your mobile world: Discover cutting-edge techniques for mobile security testing KEY FEATURES Learn basic and advanced penetration testing with mobile devices. Learn how to install, utilize, and make the most of Kali NetHunter. Design and follow your cybersecurity career path. DESCRIPTION Mobile devices are vital in our lives, so secu- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja 2za1  Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji- PDF + ePub + Mobi pkt
 System bezpieczeństwa w cyberprzestrzeni RPWaldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska 
- 
                Promocja Promocja 2za1  This book helps you understand how to safeguard your AWS workloads, while equipping you with the knowledge you need to gain AWS (SCS-C02) certification. This book helps you understand how to safeguard your AWS workloads, while equipping you with the knowledge you need to gain AWS (SCS-C02) certification.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments. This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.- 
                    
- PDF + ePub pkt
 (78,90 zł najniższa cena z 30 dni) 152.10 zł 169.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This practical guide to implementing DeFi in your projects guides you through building full-stack DeFi solutions with popular tools and teaches you how to leverage blockchain technologies to manage crypto assets. This practical guide to implementing DeFi in your projects guides you through building full-stack DeFi solutions with popular tools and teaches you how to leverage blockchain technologies to manage crypto assets.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Catapult your cybersecurity expertise to new heights using expert-backed recipes. With this cookbook, you'll leverage the power of large language model generative AI like ChatGPT to gain a competitive edge in the ever-changing cybersecurity domain. Catapult your cybersecurity expertise to new heights using expert-backed recipes. With this cookbook, you'll leverage the power of large language model generative AI like ChatGPT to gain a competitive edge in the ever-changing cybersecurity domain.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Facing cyber threats and compliance challenges? Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies to defend against cyber threats and secure cloud, hybrid, and on-premises environments. Facing cyber threats and compliance challenges? Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies to defend against cyber threats and secure cloud, hybrid, and on-premises environments.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  JaagoTeens cyber safety guide KEY FEATURES Making digital payments without being scammed and losing your money. Learning how to file a complaint with the cyber police if something goes wrong. Get some easy tips to ensure that your kids stay safe on the internet. DESCRIPTION This book is a step-by-step guide that handholds you through all the JaagoTeens cyber safety guide KEY FEATURES Making digital payments without being scammed and losing your money. Learning how to file a complaint with the cyber police if something goes wrong. Get some easy tips to ensure that your kids stay safe on the internet. DESCRIPTION This book is a step-by-step guide that handholds you through all the- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Manage physical and Cloud based endpoints, boost security, and simplify app control with ease. Stay up to date with the latest features and cloud services, empowering you to excel in device management. Master Intune, master your endpoints. Manage physical and Cloud based endpoints, boost security, and simplify app control with ease. Stay up to date with the latest features and cloud services, empowering you to excel in device management. Master Intune, master your endpoints.- 
                    
- PDF + ePub pkt
 Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second EditionChristiaan Brinkhoff, Per Larsen, Steve Dispensa, Scott Manchester (68,90 zł najniższa cena z 30 dni) 134.10 zł 149.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Whether you're a beginner or a seasoned security professional, this practical guide will equip you with the knowledge and skills to build a robust, proactive, and resilient security posture for your organization with Microsoft's XDR and SIEM. Whether you're a beginner or a seasoned security professional, this practical guide will equip you with the knowledge and skills to build a robust, proactive, and resilient security posture for your organization with Microsoft's XDR and SIEM.- 
                    
- PDF + ePub pkt
 (73,90 zł najniższa cena z 30 dni) 143.10 zł 159.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Learn to decode the Cyber Mysteries by Mastering Network Forensics KEY FEATURES Master all essential network forensics topics with in-depth coverage. Learn from real-world examples and detailed case studies. Gain hands-on experience with network forensic tools and techniques. DESCRIPTION Network forensics is a rapidly growing field with a hi Learn to decode the Cyber Mysteries by Mastering Network Forensics KEY FEATURES Master all essential network forensics topics with in-depth coverage. Learn from real-world examples and detailed case studies. Gain hands-on experience with network forensic tools and techniques. DESCRIPTION Network forensics is a rapidly growing field with a hi- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth- 
                    
- ePub + Mobi pkt
 (123,90 zł najniższa cena z 30 dni) 186.15 zł 219.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity. Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.- 
                    
- PDF + ePub pkt
 (36,90 zł najniższa cena z 30 dni) 71.91 zł 79.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics. Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection. Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes- 
                    
- ePub + Mobi pkt
 (106,90 zł najniższa cena z 30 dni) 160.65 zł 189.00 zł(-15%)
- 
                    
- 
                Promocja Promocja 2za1  This comprehensive guide covers a range of topics in cloud security with a practical focus on providing valuable insights and skills to enable you to secure multi-cloud environments effectively. This comprehensive guide covers a range of topics in cloud security with a practical focus on providing valuable insights and skills to enable you to secure multi-cloud environments effectively.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  The comprehensive yet concise guide offers secure practices for handling sensitive data payloads, including credentials, certificates, and tokens, enabling secure access to and from your organization's resources for apps running on Kubernetes. The comprehensive yet concise guide offers secure practices for handling sensitive data payloads, including credentials, certificates, and tokens, enabling secure access to and from your organization's resources for apps running on Kubernetes.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  TLS is the most important and widely used security protocol in the world. This book takes you on a journey through modern cryptography with TLS as the guiding light. It explains all necessary cryptographic primitives and how they are used within TLS. You’ll explore the inner workings of TLS and its design structure. TLS is the most important and widely used security protocol in the world. This book takes you on a journey through modern cryptography with TLS as the guiding light. It explains all necessary cryptographic primitives and how they are used within TLS. You’ll explore the inner workings of TLS and its design structure.- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book is a comprehensive guide to configuring and managing Microsoft Intune, a cloud-based endpoint management (MDM) tool. It covers everything from the initial setup and configuration to troubleshooting and automating tasks. This book is a comprehensive guide to configuring and managing Microsoft Intune, a cloud-based endpoint management (MDM) tool. It covers everything from the initial setup and configuration to troubleshooting and automating tasks.- 
                    
- PDF + ePub pkt
 (59,90 zł najniższa cena z 30 dni) 116.10 zł 129.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Wireshark: A hackers guide to network insights KEY FEATURES Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. DESCRIPTION Ethical Hacking and Network Analysis with Wires Wireshark: A hackers guide to network insights KEY FEATURES Issue resolution to identify and solve protocol, network, and security issues. Analysis of network traffic offline through exercises and packet captures. Expertise in vulnerabilities to gain upper hand on safeguard systems. DESCRIPTION Ethical Hacking and Network Analysis with Wires- 
                    
- ePub + Mobi pkt
 (42,90 zł najniższa cena z 30 dni) 89.91 zł 99.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration Although cloud computing has made infrastructure management easy, the demand for competent IT administrators is high. This book is a primary support and source of ideas for those seeking to grasp how Azure transforms infrastructure administration- 
                    
- PDF + ePub pkt
 (64,90 zł najniższa cena z 30 dni) 125.10 zł 139.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you'll be able to shift security toward the left, enabling you to merge security into coding in no time. This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you'll be able to shift security toward the left, enabling you to merge security into coding in no time.- 
                    
- PDF + ePub pkt
 (41,90 zł najniższa cena z 30 dni) 85.49 zł 94.99 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Data Science for Malware Analysis is a guide to the synergy of cybersecurity and data science. You'll learn about malware lifecycle and data science techniques for improved detection and analysis. You'll decipher key regulations like GDPR and CCPA. Data Science for Malware Analysis is a guide to the synergy of cybersecurity and data science. You'll learn about malware lifecycle and data science techniques for improved detection and analysis. You'll decipher key regulations like GDPR and CCPA.- 
                    
- PDF + ePub pkt
 (41,90 zł najniższa cena z 30 dni) 85.49 zł 94.99 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  Unveiling the future: Navigating AI's Intricate Intersection with International Law A Journey Beyond Hype and Governance KEY FEATURES Comprehensive overview of AI ethics and international law. Exploration of pragmatic approaches to AI governance. Navigation of global legal dynamics. Soft law recommendations for responsible AI development. D Unveiling the future: Navigating AI's Intricate Intersection with International Law A Journey Beyond Hype and Governance KEY FEATURES Comprehensive overview of AI ethics and international law. Exploration of pragmatic approaches to AI governance. Navigation of global legal dynamics. Soft law recommendations for responsible AI development. D- 
                    
- ePub + Mobi pkt
 (35,90 zł najniższa cena z 30 dni) 71.91 zł 79.90 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  The Essential Guide to Web3 serves as a gateway to the decentralized web—also known as the decentralized internet—to enable you to embark on an immersive journey into the fascinating world of Web3. With brief overviews of the blockchain and the Ethereum ecosystem at the outset, this book quickly immerses you in practical blockchain ap The Essential Guide to Web3 serves as a gateway to the decentralized web—also known as the decentralized internet—to enable you to embark on an immersive journey into the fascinating world of Web3. With brief overviews of the blockchain and the Ethereum ecosystem at the outset, this book quickly immerses you in practical blockchain ap- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
- 
                Promocja Promocja 2za1  The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond. The advent of cloud networks and the AWS, Azure, and GCP platforms has revolutionized how companies of all sizes in all industries do business online. This book will help you meet the emerging demand for pentesting as it guides you through the tools, techniques, and security measures used by pentesters and red teamers in the 2020s and beyond.- 
                    
- PDF + ePub pkt
 (50,90 zł najniższa cena z 30 dni) 98.10 zł 109.00 zł(-10%)
- 
                    
 
			 
                                 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
 
                                 
  
