O’Reilly Media is an internationally recognized, multi-faceted media company that has played a seminal role in the Internet revolution. Through its books, events, online training courses, webcasts, and evangelism, O’Reilly has educated a generation of technologists and entrepreneurs and shaped the dialogue about the future direction of the industry. The company has played an enormous role in the evolution and adoption of the World Wide Web, open source software, big data, and the Maker movement.
Wydawnictwo O'Reilly Media - ebooki
Tytuły książek wydawnictwa: O'Reilly Media
-
Promocja Promocja 2za1
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
Promocja Promocja 2za1
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure fro- ePub + Mobi pkt
(108,74 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks. This practical guide introduces- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
Promocja Promocja 2za1
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS service- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
Promocja Promocja 2za1
If you're a cybersecurity professional, then you know how it often seems that no one cares about (or understands) information security. InfoSec professionals frequently struggle to integrate security into their companies' processes. Many are at odds with their organizations. Most are under-resourced. There must be a better way. This essential manag- ePub + Mobi pkt
(83,07 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja Promocja 2za1
Until recently, learning CoreDNS required reading the code or combing through the skimpy documentation on the website. No longer. With this practical book, developers and operators working with Docker or Linux containers will learn how to use this standard DNS server with Kubernetes.John Belamaric, senior staff software engineer at Google, and Cric- ePub + Mobi pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
229.00 zł(-15%) -
Promocja Promocja 2za1
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how you- ePub + Mobi pkt
(107,36 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other informatio- ePub + Mobi pkt
(92,65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja Promocja 2za1
How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you’ll learn how to perform network-based penetration testing in a structured manner. Security expert Chris McNab demonstrates common vulnerabilities,- ePub + Mobi pkt
(108,92 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security- ePub + Mobi pkt
(83,25 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja Promocja 2za1
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments on everyday tools and procedures, whether yo- ePub + Mobi pkt
(109,18 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of- ePub + Mobi pkt
(92,65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja Promocja 2za1
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious- ePub + Mobi pkt
(108,87 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level s- ePub + Mobi pkt
(107,42 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own th- ePub + Mobi pkt
(106,96 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
With this practical book, you’ll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high- ePub + Mobi pkt
(37,04 zł najniższa cena z 30 dni)
59.42 zł
69.90 zł(-15%) -
Promocja Promocja 2za1
Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been col- ePub + Mobi pkt
(39,84 zł najniższa cena z 30 dni)
63.74 zł
74.99 zł(-15%) -
Promocja Promocja 2za1
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secu- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
Promocja Promocja 2za1
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books- ePub + Mobi pkt
(78,70 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja Promocja 2za1
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is- ePub + Mobi pkt
(56,94 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
Promocja Promocja 2za1
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Be- ePub + Mobi pkt
(78,06 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja Promocja 2za1
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techn- ePub + Mobi pkt
(90,81 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja Promocja 2za1
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence- ePub + Mobi pkt
(56,94 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
Promocja Promocja 2za1
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad- ePub + Mobi pkt
(77,42 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja Promocja 2za1
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and kee- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%) -
Promocja Promocja 2za1
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u- ePub + Mobi pkt
(121,42 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Promocja Promocja 2za1
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for- ePub + Mobi pkt
(76,68 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja Promocja 2za1
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all t- ePub + Mobi pkt
(72,24 zł najniższa cena z 30 dni)
76.42 zł
89.90 zł(-15%) -
Promocja Promocja 2za1
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. F- ePub + Mobi pkt
(88,81 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja Promocja 2za1
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can d- ePub + Mobi pkt
(81,10 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja Promocja 2za1
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopte- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
Promocja Promocja 2za1
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every- ePub + Mobi pkt
(89,53 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja Promocja 2za1
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a f- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
Promocja Promocja 2za1
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--b- ePub + Mobi pkt
(83,12 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja Promocja 2za1
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administ- ePub + Mobi pkt
(109,32 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja Promocja 2za1
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those- ePub + Mobi pkt
(95,48 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja Promocja 2za1
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.De- ePub + Mobi pkt
(77,89 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja Promocja 2za1
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
Promocja Promocja 2za1
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the- ePub + Mobi pkt
(89,27 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja Promocja 2za1
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł(-15%) -
Promocja Promocja 2za1
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption fo- ePub + Mobi pkt
(77,37 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja Promocja 2za1
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja Promocja 2za1
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rig- ePub + Mobi pkt
(50,91 zł najniższa cena z 30 dni)
55.24 zł
64.99 zł(-15%) -
Promocja Promocja 2za1
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and person- ePub + Mobi pkt
(120,42 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%)