Bezpieczeństwo systemów - książki
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Helion
-
Promocja
Organizations are increasingly vulnerable as attack surfaces grow and cyber threats evolve. Addressing these threats is vital, making attack surface management (ASM) essential for security leaders globally. This practical book provides a comprehensive guide to help you master ASM. Cybersecurity engineers, system administrators, and network administ-
-
ebook
(29,90 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Ten ebook to drugie wydanie tej pozycji wydawniczej - poprawione i zaktualizowane - od kuchni :). Dzięki temu jest zdecydowanie bardziej adekwatny do stanu wiedzy datowanej na 2025 rok. Czy można połączyć cyberhigienę z gotowaniem? Oczywiście, że tak! W końcu zarówno w kuchni, jak i w świecie cyfrowym zasady (szczególnie związane z czystością-
ebook
-
-
Promocja
Excel in the CISA exam with this guide, covering IT governance, systems development, operations, and asset protection. The book includes practical examples and over 1000 targeted practice test questions to prepare you for the CISA exam.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Get ahead in cryptography with this second edition, covering symmetric and asymmetric encryption, zero-knowledge protocols, and quantum cryptography. Designed for cybersecurity pros, it covers updated techniques to combat evolving cyber threats.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Simplifying security concepts of Microsoft Azure and Microsoft 365, this book will help you gain knowledge necessary to take and pass Exam SC-900 to achieve the Microsoft Security, Compliance, and Identity Fundamentals certification. You'll be able to implement the acquired practical knowledge in real-world scenarios in no time.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Arm processors are used in billions of devices, from smartphones to IoT. With Armv8-A powering AI chipsets and automotive systems, this book helps you develop expertise in this increasingly sought-after architecture.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Description SRE is a set of principles and practices that apply a software engineers approach and help IT operations. The role of the site reliability engineer (SRE) is to bridge the gap between development and operations, ensuring that systems are not only robust but also performant. SRE aims to deliver a highly scalable and reliable software syst-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
An essential guide to NIST CSF 2.0 covering its core principles, structure, and practical application. Learn how to implement cybersecurity strategies aligned with business goals and risk frameworks.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
62.91 zł
69.90 zł(-10%) -
-
Promocja
Description Understanding how systems are secured and how they can be breached is critical for robust cybersecurity in an interconnected digital world. The book offers a clear, practical roadmap for mastering ethical hacking techniques, enabling you to identify and fix vulnerabilities before malicious actors can exploit them. This book guides you-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Master the skills needed to secure AI ecosystems from evolving cyber threats. This course delves into the risks targeting AI systems, real-world case studies, and strategies for safeguarding LLMs, GenAI applications, and AI infrastructures. Build expertise in combating attacks and ensuring compliance in AI environments.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki 1) TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS Jedną z istotnych cech współczesnego terroryzmu jest aktywne wykorzystanie nowoczesnych technologii informacyjnych do prowadzenia działań o charakterze propagandowym i dezinformacyjnym. Dotyczy to przede wszystkim mediów spo-
ebook
CYBERBEZPIECZEŃSTWO W SIECI Pakiet 3 książki
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska, Agnieszka Brzostek, Sylwia Gliwa
-
-
Promocja
This book will help you understand malware development by delving into the intricate mechanisms of malware development, injection attacks, and advanced evasion strategies with over 80 real-life examples.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Jak ważne jest bezpieczeństwo systemów, osób i instytucji w dobie trwających wojen, również tych cybernetycznych, nie trzeba nikogo przekonywać. Jest to bardzo ważna kwestia, dlatego istotne jest również przygotowanie się instytucji i społeczeństw na czyhające już od dawna zagrożenia z tym związane. Dotyczy to również gospodarki i firm, nie tylko t-
ebook
(58,28 zł najniższa cena z 30 dni)
75.20 zł
94.00 zł(-20%) -
-
Promocja
Learn how to use Python for vulnerability scanning, malware analysis, penetration testing, and more KEY FEATURES Get familiar with the different aspects of cybersecurity, such as network security, malware analysis, and penetration testing. Implement defensive strategies to protect systems, networks, and data from cyber threats. Discover advan-
-
ebook
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
With the advent of microservices, Kubernetes, public cloud, and hybrid computing, site reliability and DevOps engineers are facing more complexity than ever before. Service mesh is an exciting new technology that promises to help tackle this complexity. A service mesh provides you with a unified control plane to manage application networking across-
-
ebook
(29,90 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
-
Promocja
C++ is a general-purpose programming language with a bias towards systems programming. This book provides a detailed walkthrough of the C, C++ and POSIX standards and enables a firm understanding of various system calls for UNIX systems. Topics include console and file IO, memory management, sockets, time interface, process and thread management-
-
ebook
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
DevOps is a term used to refer to a set of practices that emphasize the collaboration and communication of both software developers and the IT operations team. The main goal of DevOps is to automate the software development process with proper processes that involve people to change the culture. This book will follow a bootcamp approach, which will-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopte-
-
ebook
(29,90 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
-
Promocja
Z niniejszej książki dowiesz się, jak działa ten system operacyjny i jak z nim pracować jako administrator. Nauczysz się wykorzystywać przy tym najlepsze praktyki w branży. Poznasz sposób działania rozwiązania PowerVM, które jest jednym z najbardziej elastycznych, a jednocześnie najbardziej niezawodnych rozwiązań wirtualizacyjnych. Dowiesz się też,-
książka
-
ebook
Niedostępna
-
-
Promocja
Niniejsza książka jest unikalną na rynku wydawniczym publikacją, podejmującą temat bezpieczeństwa z wykorzystaniem pakietu Forefront Security Suite. Pakiet ten, będący odpowiedzią Microsoftu na rosnące wymagania w zakresie bezpieczeństwa systemów oraz danych przetwarzanych w nich i składowanych, oferuje całą gamę narzędzi zapewniających bezpieczne-
książka
-
ebook
(89,40 zł najniższa cena z 30 dni)
89.40 zł
149.00 zł(-40%) -
-
Promocja
Książka "OpenBSD. Tworzenie firewalli za pomocą PF" przedstawia zaimplementowany w OpenBSD system PF -- unikatowe narzędzie do samodzielnego definiowania mechanizmów zabezpieczeń filtrujących pakiety.-
książka
(35,40 zł najniższa cena z 30 dni)
35.40 zł
59.00 zł(-40%) -
-
Nowość Promocja
Understand key components of investigation, incident response, engineering, and SOC analysis. Go from a basic understanding of computers/networks to successfully triaging alerts and responding to cyber security attacks.-
-
ebook
(129,00 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book provides an inside look at the realities of being a Chief Information Security Officer (CISO), featuring invaluable lessons from global cybersecurity leaders on strategy, leadership, resilience, and navigating an evolving threat landscape.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Explore the world of cybersecurity, understand the hacker mindset, and discover career insights. Whether you're curious about digital security or considering a new career, this book equips you with essential skills to protect yourself online.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
This hands-on guide helps you deploy secure firewall policies with Palo Alto Networks. It covers policy fundamentals, Python automation, Panorama management, and zero-impact cutovers to ensure scalable, compliant, and effective network security.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book reframes cyber security through the dual lenses of creativity and classical warfare strategy. With insight from Sun Tzu and artistic philosophy, it offers an unconventional but practical model of digital defense.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book provides a step-by-step guide for professionals to protect organizations from cyber threats. It covers cybersecurity fundamentals, specific threats, mitigation strategies, and essential processes for a strong security framework.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
The CAS-005 exam is a big leap in the CompTIA Advanced Security Practitioner track. This book provides the expertise, strategic thinking, and up-to-date knowledge needed to pass the exam and succeed in today's high-stakes security environments.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Description Cyber threat hunting is the advanced practice that empowers security teams to actively unearth hidden intrusions and subtle attack behaviors that evade traditional tools. Cyber threats are evolving faster than ever. It is used by modern attackers as an advanced technique to infiltrate systems, evade detection, and exploit vulnerabilitie-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
A comprehensive guide to understanding the evolving ransomware threat landscape. Learn how ransomware attacks happen, how to prevent them, and how to respond effectively with both basic and advanced controls.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
This book offers expert guidance on building and managing a security consulting business. Covering private investigations, risk management, and information security, it's the essential resource for professionals in the security sector.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
This practical guide helps you understand and achieve Cyber Essentials certification. It covers cyber attack types and necessary technical controls to protect your organization. Learn how to get certified and boost your cybersecurity resilience.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
This book provides a comprehensive guide to the principles and practices of cybersecurity, offering strategies for building resilient systems, managing risks, and defending against evolving threats.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This guide offers a comprehensive exploration of securing cloud services, covering key concepts like cloud models, taxonomies, threats, regulatory issues, and architectural solutions for safeguarding data and infrastructure.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
161.10 zł
179.00 zł(-10%) -
-
Promocja
This book provides a clear guide to the California Privacy Rights Act (CPRA), covering key definitions, consumer rights, business obligations, and compliance requirements, including security, penalties, and breach notifications.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
With AI in the hands of cybercriminals, traditional security controls and response mechanisms are swiftly moving toward obsolescence. Intelligent Continuous Security (ICS) helps organizations stay toe-to-toe with adversaries, replacing outmoded defenses with a cohesive strategy that unifies security across the entire software lifecycle. Author Marc-
-
ebook
(29,90 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł(-15%) -
-
CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książki 1) Modele rozwiązań prawnych w systemie cyberbepiczeństwa RP 2) Bezbieczeństwo narodowe. Teoria i praktyka 3) System bezpieczeństwa w cyberprzestrzeni RP 1) MODELE ROZWIĄZAŃ PRAWNYCH W SYSTEMIE CYBERBEZPIECZEŃSTWA RP Przedmiotem zainteresowania A-
ebook
CYBERBEZPIECZEŃSTWO JAKO FILAR BEZPIECZEŃSTWA NARODOWEGO Pakiet 3 książki
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska, Agnieszka Brzostek
-
-
Promocja
Description In today's ever-expanding digital world, cyber threats are constantly evolving, and organizations are struggling to keep pace. Managing the Cyber Risk equips CISOs and security professionals with the knowledge and strategies necessary to build a robust defense against these ever-present dangers. This comprehensive guide takes you on a-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description Microsoft Defender for Endpoint is a powerful tool for securing your environment, and this book is your practical guide to using it effectively. Written by an engineer who works hands-on with the daily challenges of IT infrastructure, it covers everything from on-prem data centers to cloud platforms like AWS, Azure, and GCP, across Wind-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Description Vulnerability Assessment and Penetration Testing (VAPT) combinations are a huge requirement for all organizations to improve their security posture. The VAPT process helps highlight the associated threats and risk exposure within the organization. This book covers practical VAPT technologies, dives into the logic of vulnerabilities, and-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Explore critical strategies for defending against cyber threats, securing social media, and protecting home networks.-
-
ebook
Surviving A Cyberattack. A Comprehensive Guide to Digital Security for Families and Businesses
Mercury Learning and Information, Todd G. Shipley, Art Bowker
(50,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Description Advanced Malware Analysis and Intelligence teaches you how to analyze malware like a pro. Using static and dynamic techniques, you will understand how malware works, its intent, and its impact. The book covers key tools and reverse engineering concepts, helping you break down even the most complex malware. This book is a comprehensive-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Learn all about Microsoft Defender for Identity in depth and master the art of securing digital identities against emerging threats with hands-on guidance to elevate your cybersecurity skills to new heights.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Master the CNAPP lifecycle with this comprehensive guide that will teach you how to plan, deploy, and operationalize cloud security using Microsoft Defender for Cloud, enhancing your security posture across multicloud environments.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
The NIST Cybersecurity Framework provides a way of implementing cybersecurity best practices. The book takes you through how to evaluate the current and future state of your program, and which controls to implement to reduce overall risk posture.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Embark on a dynamic journey through command shells with this hands-on manual. From the Linux staple Bash to rising stars like Z shell and PowerShell, master their power for Linux, macOS, and Unix.-
-
ebook
(50,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Master the craft of offensive security using Python. Gain holistic understanding of web security, exploit vulnerabilities, automate security tasks, and fortify your defenses to succeed in the ever-evolving cybersecurity landscape.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book is a valuable resource that offers practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape-
-
ebook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
A comprehensive book that equips you with essential techniques to assess, exploit, and secure APIs against cyber threats.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Description Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape,-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Comprehensive guidance on evaluating cybersecurity, conducting risk assessments, and auditing IT systems for compliance across multiple platforms like AWS, Azure, and GCP.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book covers threat management, investigation, automation, and integration with other security tools to fortify organizational cybersecurity defenses effectively.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Navigate the evolving software security landscape with Crafting Secure Software. This guide equips decision makers to understand and address risks, ensure compliance, and build a culture of security within development teams.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Advance in your cybersecurity career with targeted interview preparation, practical guidance, and insider tips. Discussing roles from cybersecurity engineer to CISO, this edition addresses reader feedback and covers the latest industry developments.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
The book provides a solid understanding of SIS cybersecurity challenges and artifacts required to ensure the safety of mission-critical systems. It also serves as a strong foundation for anyone looking to boost their industrial security skill set.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book helps you to explore software security through gamified threat modeling, uncovering risks while making it enjoyable. You'll learn to identify, mitigate, and defend against threats, enhancing your system's security.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This comprehensive book helps you understand layered security. You'll cover essential concepts, from risk assessment to proactive defense strategies.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
This book provides a comprehensive introduction to cybersecurity, covering key concepts, application security, and secure systems development. It includes practical examples and real-world applications.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
This book helps you learn about decentralized identities, blockchains, and associated technologies, offering insights for leveraging these tools to construct secure and seamless digital experiences.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Introduction to Kali Purple combines red and blue team tools in a single computing environment that allows both the setup and testing of a miniature security operations center, from setting up a SIEM environment to automation, all in one location.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
This book covers the fundamentals of Windows 365 and Azure Virtual Desktop, addressing endpoint security challenges. You’ll also explore advanced security measures for virtual environments.-
-
ebook
Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure
Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Automating Security Detection Engineering will equip you with advanced tools and skills to scale your use case lifecycle and enhance your detection and threat response capabilities.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
From understanding how credentials are stored to exploring diverse cracking methods, this book equips you with the knowledge and tools necessary to navigate the complex landscape of password security with confidence.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
As technology continues to advance and more business is conducted online, the potential attack surface increases exponentially and the need for strong application security measures become more and more crucial. This goes double for any organization that handles sensitive personal or financial information which is usually subject to government regul-
-
ebook
(29,90 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
-
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI - Pakiet 2 książki 1) MODELE ROZWIĄZAŃ PRAWNYCH W SYSTEMIE CYBERBEZPIECZEŃSTWA RP Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania-
ebook
IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Sylwia Gliwa
-
-
SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO - Pakiet 2 książki 1) BEZPIECZEŃSTWO NARODOWE. TEORIA I PRAKTYKA Najnowsza książka profesora Waldemara Kitlera to z pewnością jego opus vitae. Być może spośród wielu znakomitych monografii naukowych, które napisał, podsumowuje jego wielki dorobek naukowy w zakresie polskiej myśli o be-
ebook
-
-
Promocja
This book offers real-world case studies, holistic approaches, and practical guidance to boost your cybersecurity expertise. You’ll learn how to align security strategies with business objectives and stay ahead of the evolving threat landscape.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, and other traditional statistical disclosure limitati-
-
ebook
(211,65 zł najniższa cena z 30 dni)
228.65 zł
269.00 zł(-15%) -
-
Przedmiotem zainteresowania Autorów stało się interdyscyplinarnie postrzegane cyberbezpieczeństwo, zaś badaniom poddano prawne i organizacyjne rozwiązania na rzecz efektywnego przeciwdziałania oraz zwalczania niebezpiecznych zachowań w cyberprzestrzeni. Wyzwaniem badawczym stały się także relacje pomiędzy systemem cyberbezpieczeństwa a-
ebook
-
-
"Twoje bezpieczeństwo w świecie cyber i sztucznej inteligencji Część III DZIECKO I TY" - niezbędnik każdego użytkownika internetu! W dobie wszechobecnych technologii i wszechwładnej sztucznej inteligencji, zarówno dorosłym, jak i najmłodszym użytkownikom sieci, przyda się solidny fundament wiedzy na temat bezpieczeństwa cyfrowego. Poradnik "Twoj-
ebook
-
-
Promocja
With an in-depth view of the framework and the risk management life cycle, Implementing the NIST Risk Management Framework emphasizes the importance of this standard and explains why security leaders should adopt it in their organizations.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działan-
ebook
-
-
Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji-
ebook
System bezpieczeństwa w cyberprzestrzeni RP
Waldemar Kitler, Katarzyna Chałubińska-Jentkiewicz, Katarzyna Badźmirowska-Masłowska
-
-
Promocja
This Cybersecurity Architect's Handbook is the roadmap to launching your career in cybersecurity, covering advanced strategies for designing, implementing, and maintaining comprehensive security architectures in on-premises and cloud environments.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
152.10 zł
169.00 zł(-10%) -
-
Promocja
Facing cyber threats and compliance challenges? Discover how Microsoft 365 Security and Compliance can protect your data with this guide to exploring strategies to defend against cyber threats and secure cloud, hybrid, and on-premises environments.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Learn to decode the Cyber Mysteries by Mastering Network Forensics KEY FEATURES Master all essential network forensics topics with in-depth coverage. Learn from real-world examples and detailed case studies. Gain hands-on experience with network forensic tools and techniques. DESCRIPTION Network forensics is a rapidly growing field with a hi-
-
ebook
(46,15 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth-
-
ebook
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
-
Promocja
Cloud Forensics Demystified debunks myths related to cloud forensics using traditional tools and technologies. This book will equip incident responders to start investigating the cloud by providing them with a solid foundation in cloud forensics.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Embark on an API security journey, from understanding API inner workings to exploiting vulnerabilities. This book will teach you how to attack APIs, defend by building robust APIs using secure development techniques, and ensure runtime protection.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes-
-
ebook
(29,90 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
-
Promocja
This book is a comprehensive, hands-on guide for individuals new to DevSecOps who want to implement DevSecOps practices successfully and efficiently. With its help, you'll be able to shift security toward the left, enabling you to merge security into coding in no time.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
Fedora Linux System Administration enables you to configure your workstation to improve the performance of your daily tasks. The chapters provide you with the necessary knowledge and help you to review the fundamentals that every modern system administrator should understand.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Having an efficient information security mechanism is one of the most crucial factors for any organization. Important assets of an organization demand a proper risk management and threat model for security; hence, information security concepts are gaining a lot of traction. This book covers the concept of information security and explains its signi-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Master automotive cybersecurity with this practical guide to ISO 21434 and UNECE regulations. Learn to integrate security into the development lifecycle, perform threat modeling, and implement cyber defenses to build secure, cyber-resilient vehicles.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.How can you secure-
-
ebook
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
-
Promocja
Automating security tasks can save cybersecurity tasks a lot of time, but getting to grips with SOAR requires a comprehensive introduction. This book, written by an automation expert, will help you get all the information you need to use SOAR confidently as well as show you its capabilities in action with the help of real-life examples.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
134.10 zł
149.00 zł(-10%) -
-
Promocja
Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differenti-
-
ebook
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
-
Promocja
Cybersecurity is broken. Year after year, attackers remain unchallenged and undeterred, while engineering teams feel pressure to design, build, and operate "secure" systems. Failure can't be prevented, mental models of systems are incomplete, and our digital world constantly evolves. How can we verify that our systems behave the way we expect? What-
-
ebook
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
-
Promocja
This book provides a security baseline to reduce the risk of future attacks. The chapters will teach you how to secure your Windows endpoint, protect devices with Microsoft Defender, and secure hybrid workloads using Azure Arc, enabling you to protect your infrastructure, network, and data with the help of SASE and the Zero Trust model.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
e_39yf/e_39yf.mp3 e_39yfCompTIA Advanced Security Practitioner (CASP+) candidates need to stay up to date with the emerging technologies and threats in this fast-changing environment. This audiobook helps you to apply CASP+ concepts, understand processes and methodologies, and discover industry best practices for achieving CASP+ certification.-
-
ebook
-
audiobook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Microsoft Defender for Endpoint In-Depth is a comprehensive guide that’ll help you understand its expansive set of product features. After reading the book you’ll be able to implement and operationalize MDE. From history to primer, deployment through SecOps, troubleshooting and much more - this book will prepare you for success.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
e_39wq/e_39wq.mp3 e_39wqAs hackers come up with new ways to mangle or misdirect data in nearly undetectable ways to obtain access, skew calculations, and modify outcomes. Machine Learning Security Principles helps you understand hacker motivations and techniques in an easy-to-understand way.-
-
ebook
-
audiobook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
This book will help you understand how a blue team is formed and why it is crucial for businesses. You’ll learn different security controls, such as preventive and defensive controls, and become equipped to set up a blue team from scratch.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
85.49 zł
94.99 zł(-10%) -
-
Promocja
e_3a0i/e_3a0i.mp3 e_3a0iCybersecurity is a vast field and getting started can seem overwhelming. This audiobook demystifies the industry, and helps you chart a step-by-step plan to progress in your career. No matter your experience level, you’ll learn how to level up in your career and break through industry roadblocks.-
-
ebook
-
audiobook
Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
(29,90 zł najniższa cena z 30 dni)
80.91 zł
89.90 zł(-10%) -
-
Promocja
This 2nd edition book will show you how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
e_3a91/e_3a91.mp3 e_3a91This is a guide for cloud identity experts who want to understand the principles to design and implement an identity strategy that fits their organization. As you progress through this book, you’ll learn how cloud evolution affected identity strategy within the enterprise.-
-
ebook
-
audiobook
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is a must for all organizations. This book offers concrete and detailed guidance on how to conduct the full spectrum of incident response and digital forensic activities.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
Cyber anonymity is very essential as most devices, applications, and browsers collect information on every single activity that you perform in cyberspace. This book helps you understand the importance of cyber anonymity and you will learn techniques that will help you perform tasks without disclosing your information.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. Extensive coverage of Android and iO-
-
ebook
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
e_3a8v/e_3a8v.mp3 e_3a8vThis audiobook takes a hands-on approach helping investigators extend their skills to iOS mobile forensics. You'll learn all about the forensics workflow, how to start extracting data, how to analyze it, and how to correctly build a report.-
-
ebook
-
audiobook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
Flutter developers already building mobile apps and developers working with Dart will find this book useful for constructing exquisite, interactive, and native-like web applications. The book makes it easy to learn how to build and deploy web apps using identical Flutter and Dart codebase that you may already be acquainted with.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
e_3a8p/e_3a8p.mp3 e_3a8pThis audiobook will take you through some key cybersecurity job roles and teach you the important technical and behavioral questions that will help you pass the interview, land the job, and grow in your cybersecurity career.-
-
ebook
-
audiobook
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career
Kenneth Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
(29,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
Cybersecurity – Attack and Defense Strategies, Third Edition is a completely revised new edition of this bestselling book that covers the very latest security threats and defense strategies.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Security is a shared responsibility, and we must all own it KEY FEATURES Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components. Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams. Adopts a perspective of developing a Cybersecurity stra-
-
ebook
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
e_39vl/e_39vl.mp3 e_39vlThis audiobook is a quick-paced guide that focuses on the core concepts and knowledge, in just enough words, to help aspiring as well as existing CISOs learn about vital tasks in an easy way. This book will take you from the basics of CISO and security leadership roles to complex key tasks necessary for becoming a global CISO.-
-
audiobook
(29,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł(-10%) -
-
Promocja
e_39zn/e_39zn.mp3 e_39znBy taking you through the logic of complex strategic decisions of offensive and defensive teams, this book will prepare you for real-time cybersecurity conflict and show you some of the best techniques used in the industry. Whether you’re part of an offensive or defensive team, Adversarial TradeCraft in Cybersecurity will prepare you for the-
-
ebook
-
audiobook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
e_3a9s/e_3a9s.mp3 e_3a9sCyber Warfare – Truth, Tactics, and Strategies takes you through the broad range of attack types and threats that are present in a world powered by AI, big data, drones, video, and social media. It is filled with examples of actual attacks and the defence techniques, tools and strategies presented for you to learn how to think about defendin-
-
audiobook
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Complete with step-by-step explanations of essential concepts and practical examples, you’ll begin by creating your very first app from the get-go. You’ll learn how to use it as a means to explore and understand the Honeycode development environment and concepts.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.-
-
ebook
The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This book will focus right from scratch on how to set up an environment and perform reverse engineering on iOS and Android mobile apps. The book takes you on a journey of exploring the internals of mobile apps, how they are built, and how to take each piece apart while trying to understand the internal working of the apps.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
89.91 zł
99.90 zł(-10%) -
-
Promocja
Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES Gain practical experience with cyber threat intelligence by using the book's lab sections. Improve your CTI skills by designing a threat intelligence system. Assisting you in bridging the gap between cybersecurity teams. Developin-
-
ebook
(35,90 zł najniższa cena z 30 dni)
71.91 zł
79.90 zł(-10%) -
-
Promocja
MS-700 Managing Microsoft Teams Exam Guide offers complete, up-to-date coverage of the MS-700 exam's objectives along with ample practice questions and explanations, so that you can take the exam with confidence, fully equipped to pass the first time.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
197.10 zł
219.00 zł(-10%) -
-
Promocja
Mastering Cyber Intelligence provides critical knowledge that will help you stay ahead of adversaries and proactively protect your organization against known and unknown cyber threats. You'll build the security skills required to conduct effective threat intelligence, integrate it into operations, and identify gaps in security postures.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
125.10 zł
139.00 zł(-10%) -
-
Promocja
Memory forensics is a vital part of modern digital forensic examinations as threat actors have started using memory-based malware more often. This comprehensive guide focuses on the application of modern memory forensics techniques to detect hidden threats in memory and reconstruct user activity based on volatile data.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
In the modern world, cyber threats have increased exponentially and a complex web of global data privacy regulations has made security and compliance difficult. This book will help you to understand what is happening in the digital landscape and deploy both timeless best practices and modernized approaches to overcome cybersecurity challenges.-
-
ebook
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł(-10%) -
-
Promocja
This book is a guide to understanding new-age protocols and algorithms that are emerging for data protection in cybersecurity and information and communications technology (ICT) with the help of examples and use cases. You’ll begin by exploring classical cryptography and later progress to implementing algorithms for security and data privacy-
-
ebook
(29,90 zł najniższa cena z 30 dni)
116.10 zł
129.00 zł(-10%) -
-
Promocja
With this guide for developers, you'll learn how to build apps that use common cryptographic operations to improve security and respect user privacy. You'll understand how, when, and why to use safe, modern cryptographic algorithms and libraries in your code. You’ll learn using plenty of code samples in JavaScript for both Node.js and the br-
-
ebook
(29,90 zł najniższa cena z 30 dni)
98.10 zł
109.00 zł(-10%) -
-
Promocja
Jak obronić się przed atakiem? Wszystkie niezbędne informacje znajdziesz w tym wyjątkowym podręczniku. W trakcie lektury dowiesz się, jak działają hakerzy, jak wyszukują słabe punkty aplikacji oraz jak modyfikują jej kod. Ponadto nauczysz się utrudniać śledzenie kodu Twojej aplikacji oraz bezpiecznie usuwać pliki (tak, aby nie było możliwe ich odtw-
książka
-
ebook
Niedostępna
-
-
Promocja
W książce Mity bezpieczeństwa IT. Czy na pewno nie masz się czego bać? znajdziesz niebanalne i kontrowersyjne informacje nie tylko na temat zabezpieczeń, ale także sposobów ich łamania, dzięki czemu zyskasz wiedzę, skąd może nadejść zagrożenie i w jaki sposób je rozpoznać. Dzięki temu podręcznikowi poznasz konkretne problemy i niedoskonałości syste-
książka
-
ebook
Niedostępna
-

