• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5021

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK(TM) Framework and open source tools Palac 9781838556372 Packt Publishing
Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK(TM) Framework and open source tools

ISBN: 9781838556372 / Angielski / Miękka / 2021 / 398 str.

ISBN: 9781838556372/Angielski/Miękka/2021/398 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 Diving into Secure Access Service Edge: A technical leadership guide to achieving success with SASE at market speed Jeremiah Ginn 9781803242170 Packt Publishing
Diving into Secure Access Service Edge: A technical leadership guide to achieving success with SASE at market speed

ISBN: 9781803242170 / Angielski

ISBN: 9781803242170/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Implement Secure Access Service Edge (SASE) for secure network and application communications, exploring SASE services including SD-WAN, ZTF, and more with expert Jeremiah Ginn who helps CxO leaders achieve SASE success Key Features Merge networking and security services into a single architecture to simplify network infrastructure Explore how zero trust network access (ZTNA) restricts access to provide native application segmentation Focus on a native, multitenant cloud architecture that scales dynamically with demand Book DescriptionThe SASE concept was coined by Gartner after seeing a...
Implement Secure Access Service Edge (SASE) for secure network and application communications, exploring SASE services including SD-WAN, ZTF, and more...
cena: 191,00

 Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats to your organization Tim Rains 9781804613672 Packt Publishing
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats to your organization

ISBN: 9781804613672 / Angielski / Miękka / 2023 / 584 str.

ISBN: 9781804613672/Angielski/Miękka/2023/584 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Protect your organization from cybersecurity threats with field-tested strategies Understand threats such as exploits, malware, internet-based threats, and governments Measure the effectiveness of your organization's current cybersecurity program against modern attackers' tactics Book DescriptionTim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web...
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats Purchase of the pr...
cena: 191,00

 Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs Ryan Soper Nestor N. Torres Ahmed Almoailu 9781801817332 Packt Publishing
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs

ISBN: 9781801817332 / Angielski

ISBN: 9781801817332/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBook Key Features Master ZAP to protect your systems from different cyber attacks Learn cybersecurity best practices using this step-by-step guide packed with practical examples Implement advanced testing techniques, such as XXE attacks and Java deserialization, on web applications Book DescriptionMaintaining your cybersecurity posture in the ever-changing, fast-paced security landscape requires constant attention and advancements. This book...
Dive into security testing and web app scanning with ZAP, a powerful OWASP security tool Purchase of the print or Kindle book includes a free PDF eBo...
cena: 191,00

 Windows APT Warfare: Identify and prevent Windows APT attacks effectively Sheng-Hao Ma 9781804618110 Packt Publishing
Windows APT Warfare: Identify and prevent Windows APT attacks effectively

ISBN: 9781804618110 / Angielski

ISBN: 9781804618110/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Learn Windows system design from the PE binary structure to modern and practical attack techniques used by red teams to implement advanced prevention Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand how malware evades modern security products Learn to reverse engineer standard PE format program files Become familiar with modern attack techniques used by multiple red teams Book DescriptionAn Advanced Persistent Threat (APT) is a severe form of cyberattack that lies low in the system for a prolonged time and locates and then exploits sensitive...
Learn Windows system design from the PE binary structure to modern and practical attack techniques used by red teams to implement advanced prevention ...
cena: 191,00

 Executive\'s Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown 9781804619230 Packt Publishing
Executive\'s Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program

ISBN: 9781804619230 / Angielski

ISBN: 9781804619230/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get started as a cybersecurity executive and design an infallible security program Perform assessments and build a strong risk management framework Promote the importance of security within the organization through awareness and training sessions Book DescriptionRansomware, phishing, and data breaches are major concerns affecting all organizations as a new cyber threat seems to emerge every day, making it paramount to protect the security of your...
Develop strategic plans for building cybersecurity programs and prepare your organization for compliance investigations and audits Key Features Get ...
cena: 191,00

 Information Security Handbook - Second Edition: Enhance your proficiency in information security program development Darren Death 9781837632701 Packt Publishing
Information Security Handbook - Second Edition: Enhance your proficiency in information security program development

ISBN: 9781837632701 / Angielski

ISBN: 9781837632701/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 Pentesting Active Directory and Windows-based Infrastructure: A comprehensive practical guide to penetration testing Microsoft infrastructure Denis Isakov 9781804611364 Packt Publishing
Pentesting Active Directory and Windows-based Infrastructure: A comprehensive practical guide to penetration testing Microsoft infrastructure

ISBN: 9781804611364 / Angielski

ISBN: 9781804611364/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 
Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices

ISBN: 9781805126546 / Angielski

ISBN: 9781805126546/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals

ISBN: 9781800564411 / Angielski

ISBN: 9781800564411/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

ISBN: 9781837632152 / Angielski

ISBN: 9781837632152/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats Srinivas Rao Aravilli 9781800564671 Packt Publishing
Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats

ISBN: 9781800564671 / Angielski

ISBN: 9781800564671/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation Confidence Staveley 9781800560802 Packt Publishing
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation

ISBN: 9781800560802 / Angielski

ISBN: 9781800560802/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux Karl Lane 9781835088982 Packt Publishing
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux

ISBN: 9781835088982 / Angielski

ISBN: 9781835088982/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience Rohan Pinto 9781804617632 Packt Publishing
Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience

ISBN: 9781804617632 / Angielski

ISBN: 9781804617632/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 
Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF

ISBN: 9781835463079 / Angielski

ISBN: 9781835463079/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization Bojan Kolosnjaji Huang Xiao Peng Xu 9781805124962 Packt Publishing
Artificial Intelligence for Cybersecurity: Develop AI approaches to solve cybersecurity problems in your organization

ISBN: 9781805124962 / Angielski

ISBN: 9781805124962/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Peng Xu
cena: 191,00

 
Pentesting APIs: A practical guide to discovering, fingerprinting, and exploiting APIs

ISBN: 9781837633166 / Angielski

ISBN: 9781837633166/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR

ISBN: 9781836203216 / Angielski

ISBN: 9781836203216/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

 
AWS Security Cookbook - Second Edition: Practical solutions for securing AWS cloud infrastructure with essential services and best practices

ISBN: 9781835081891 / Angielski

ISBN: 9781835081891/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 191,00

Podprzednia  109  110  111  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia