Systemsicherheit

Penetration Testing Bootcamp. Quickly get up and running with pentesting techniques

Jason Beltrame

Pentesting APIs. A practical guide to discovering, fingerprinting, and exploiting APIs

Maurício Harley

Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes

Paul Smith

Performance Testing with JMeter 3. Enhance the performance of your web application - Third Edition

Bayo Erinle

Podstawy ochrony komputerów

G T Gangemi, Rick Lehtinen, Deborah Russell

PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers

Miriam C. Wiesner, Tanya Janca

Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition

Diana Kelley, Ed Moyle

Practical Hardware Pentesting. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition

Jean-Georges Valle

Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory

Svetlana Ostrovskaya, Oleg Skulkin

Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus

Ajay Singh Chauhan

Practical OneOps. Implement DevOps with ease

Nilesh Nimkar

Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps

Tony Hsiang-Chih Hsu

Practical Threat Detection Engineering. A hands-on guide to planning, developing, and validating detection capabilities

Megan Roddie, Jason Deyalsingh, Gary J. Katz

Practical Threat Intelligence and Data-Driven Threat Hunting. A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools

Valentina Costa-Gazcón

Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more

Gus Khawaja

Prawdziwa głębia OSINT. Odkryj wartość danych Open Source Intelligence

Rae L. Baker

Przetwarzanie danych w dużej skali. Niezawodność, skalowalność i łatwość konserwacji systemów

Martin Kleppmann

Purple Team Strategies. Enhancing global security posture through uniting red and blue teams with adversary emulation

David Routin, Simon Thoores, Samuel Rossier

Python Digital Forensics Cookbook. Effective Python recipes for digital investigations

Chapin Bryce, Preston Miller

Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python

Hussam Khrais

Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation

Rejah Rehim

Python Programming Blueprints. Build nine projects by leveraging powerful frameworks such as Flask, Nameko, and Django

Daniel Furtado, Marcus Pennington

QGIS Python Programming Cookbook. Automating geospatial development - Second Edition

Joel Lawhead