
ilość książek w kategorii: 5022
![]() |
ISO 27001 Controls: A guide to implementing and auditing, Second edition
ISBN: 9781787784307 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
198,96 |
![]() |
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning
ISBN: 9781787785199 / Angielski / Miękka / 2024 / 326 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
198,96 |
![]() |
Implementing IEC 62443: Best Practices for OT Security Professionals
ISBN: 9798323502127 / Angielski / Miękka / 2024 / 48 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
198,96 |
![]() |
Securing Networks Through Penetration Testing: A Practical Guide
ISBN: 9798334628205 / Angielski / Miękka / 2024 / 580 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
198,96 |
![]() |
CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE - Volume 3: The Incident Commander
ISBN: 9798873493036 / Angielski / Miękka / 2024 / 534 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
198,96 |
![]() |
Cybersecurity's Secret Weapon: The Ultimate SOC Guide Everyone Needs: Mastering Cybersecurity: The Definitive SOC Guide to Transform Your Business
ISBN: 9798307439913 / Angielski / Miękka / 2025 / 184 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
198,96 |
![]() |
Providing Assurance to Cloud Computing through ISO 27001 Certification: How Much Cloud is Secured After Implementing Information Security Standards
ISBN: 9781503085909 / Angielski / Miękka / 2015 / 134 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cloud Computing provides a scalable, high availability and low cost services over the internet. Security and privacy concerns have been creating obstacles for the enterprise to entirely shift to cloud. The increase security risks are required to be identified to assist Cloud customers and Cloud Service Providers (CSP) for better information technology (IT) governance. ISO / IEC 27001: 2005 is most widely used security standard by the CSPs to mitigate Cloud risks. In this book, a systematic literature review has been carried out to analyze different Information Security risks relates to Cloud...
Cloud Computing provides a scalable, high availability and low cost services over the internet. Security and privacy concerns have been creating obsta...
|
cena:
199,01 |
![]() |
Derecho y criminalistica en informática forense: delitos informáticos
ISBN: 9789975154161 / Hiszpański / Miękka / 2020 / 202 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
199,01 |
![]() |
Evolution of Web 3.0 and Blockchain: The world of decentralization and smart contracts
ISBN: 9791198936004 / Angielski / Miękka / 2024 / 498 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
199,01 |
![]() |
Insider Threat Research: Scientific Approach to Detection and Prevention
ISBN: 9798322604020 / Angielski / Miękka / 2021 / 130 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
199,01 |
![]() |
Explicando, Application Security
ISBN: 9798323314577 / Portugalski / Miękka / 2024 / 168 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
199,01 |
![]() |
Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
ISBN: 9781789617139 / Angielski / Miękka / 2022 / 358 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
199,49 |
![]() |
Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP
ISBN: 9781800569195 / Angielski / Miękka / 2022 / 456 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built-in services and capabilities Key Features Discover practical techniques for implementing cloud security Learn how to secure your data and core cloud infrastructure to suit your business needs Implement encryption, detect cloud threats and misconfiguration, and achieve compliance in the cloud Book DescriptionSecuring resources in the cloud is challenging, given that each provider has different mechanisms and processes. Cloud Security Handbook...
A comprehensive reference guide to securing the basic building blocks of cloud services, with actual examples for leveraging Azure, AWS, and GCP built...
|
cena:
199,49 |
![]() |
Policy Design in the Age of Digital Adoption: Explore how PolicyOps can drive Policy as Code adoption in an organization's digital transformation
ISBN: 9781801811743 / Angielski / Miękka / 2022 / 332 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
199,49 |
![]() |
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
ISBN: 9781803234083 / Angielski / Miękka / 2022 / 316 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devices Key Features Explore free and commercial tools for carrying out data extractions and analysis for digital forensics Learn to look for key artifacts, recover deleted mobile data, and investigate processed data Get up and running with extracting full filesystem images and jailbreak devices to gather the most data possible Book DescriptionProfessionals working in the mobile forensics industry will be able to put their knowledge to work with this practical guide to learning how to...
Extract crucial data and lead successful criminal investigations by infiltrating every level of iOS devices Key Features Explore free and commercial...
|
cena:
199,49 |
![]() |
OPNsense Beginner to Professional: Protect networks and build next-generation firewalls easily with OPNsense
ISBN: 9781801816878 / Angielski / Miękka / 2022 / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book is your ultimate guide to OPNsense, an open-source next-generation firewall solution. The book comes packed with hands-on examples that will enable you to enhance network security like a professional.
This book is your ultimate guide to OPNsense, an open-source next-generation firewall solution. The book comes packed with hands-on examples that will...
|
cena:
199,49 |
![]() |
Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunti
ISBN: 9781801072953 / Angielski / Miękka / 2022 / 468 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through step-by-step exercises. You'll learn how to respond to cybersecurity incidents using intelligence-based threat hunting techniques.
This book focuses on developing a capacity to manage cybersecurity incidents by practically implementing methodologies, platforms, and tools through s...
|
cena:
199,49 |
![]() |
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
ISBN: 9781801814683 / Angielski / Miękka / 2022 / 460 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You'll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.
This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their ca...
|
cena:
199,49 |
![]() |
Machine Learning Security Principles: Keep data, networks, users, and applications safe from prying eyes
ISBN: 9781804618851 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security systems Retain the usefulness of your data by detecting unwanted and invalid modifications Develop application code to meet the security requirements related to machine learning Book DescriptionBusinesses are leveraging the power of AI to make undertakings that used to be...
Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, pois...
|
cena:
199,49 |
![]() |
Windows and Linux Penetration Testing from Scratch: Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results
ISBN: 9781801815123 / Angielski / Miękka / 2022 / 510 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter cockpit Key Features Map your client's attack surface with Kali Linux Discover the craft of shellcode injection and managing multiple compromises in the environment Understand both the attacker and the defender mindset Book DescriptionLet's be honest—security testing can get repetitive. If you're ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients. This...
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter coc...
|
cena:
199,49 |