Bezpieczeństwo systemów

Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony

Jean-Georges Valle

Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor

Kyle Rankin

Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease

Manoj Hirway

Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication

Lisa Bock

IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Sylwia Gliwa

Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes

Matthew Nohr, Isaac Rabinovitch

Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure

Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, ...

Implementing DevOps with Microsoft Azure. Automate your deployments and incorporate the DevOps culture

Mitesh Soni

Implementing DevSecOps Practices. Understand application security testing and secure coding by integrating SAST and DAST

Vandana Verma Sehgal

Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection

Tom Piens Aka 'Reaper', Rutger Truyers

Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights

James D. Miller, Paul R. Johnson, Josh Diakun, Derek Mock

Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents

Dr. Erdal Ozkaya

Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them

Oleg Skulkin

Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting

Roberto Martinez

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

Industrial Cybersecurity. Efficiently secure critical infrastructure systems

Pascal Ackerman