Bezpieczeństwo sieci

Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor

Kyle Rankin

Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud

Sreekanth Iyer, Dr. Nataraj Nagaratnam

Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware

Eric Siron, Andrew Syrewicze

IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Sylwia Gliwa

IDS and IPS with Snort 3. Get up and running with Snort 3 and discover effective solutions to your security issues

Ashley Thomas

Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure

Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, ...

Implementing Cisco Networking Solutions. Configure, implement, and manage complex network designs

Harpreet Singh

Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA

Marco Fanti

Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms

Marius Sandbu

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects

Fabio Roberti, Decio Ferreira

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

Industrial Cybersecurity. Efficiently secure critical infrastructure systems

Pascal Ackerman

Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services

Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III

Shiva V. N. Parasram

Informatyka śledcza. Narzędzia i techniki skutecznego reagowania na incydenty bezpieczeństwa. Wydanie III

Gerard Johansen

Informatyka w kryminalistyce. Praktyczny przewodnik. Wydanie II

Darren R. Hayes

Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices

Fabrizio Volpe

Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness

Brad Lhotsky

Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents

Borja Merino

Inżynieria detekcji cyberzagrożeń w praktyce. Planowanie, tworzenie i walidacja mechanizmów wykrywania zagrożeń

Megan Roddie, Jason Deyalsingh, Gary J. Katz

iOS Forensics Cookbook. Over 20 recipes that will enable you to handle and extract data from iOS devices for forensics

Bhanu Birani, Mayank Birani

iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

Gianluca Tiepolo