![]() |
AI and ML-Driven Cybersecurity: Industrial IoT and WSN with Python Scripting
ISBN: 9781041051411 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
219,45 zł |
![]() |
Hacking Tricks, Methods, and Offensive Strategies: Digital reconnaissance, network enumeration, and system exploitation strategies (English Edition)
ISBN: 9789365897005 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
171,95 zł |
![]() |
AI In Cybersecurity: Simplifying Cyber Risk with Smart, Affordable Tools for Small Business Defense
ISBN: 9781069643780 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
72,83 zł |
![]() |
Red Team Evaluation Framework: Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team
ISBN: 9781041111061 / Angielski / 05-02-2026 Książka dostępna od: 05-02-2026 |
|
Termin ukazania się książki: 05-02-2026
Książkę można już zamówić z rabatem 5% |
|
509,73 zł |
![]() |
Red Team Evaluation Framework: Sharpening the Spear: A Framework for Forging and Measuring an Elite Adversary Emulation Team
ISBN: 9781041111078 / Angielski / 05-02-2026 Książka dostępna od: 05-02-2026 |
|
Termin ukazania się książki: 05-02-2026
Książkę można już zamówić z rabatem 5% |
|
138,97 zł |
![]() |
The Ghidra Book, 2nd Edition: The Definitive Guide
ISBN: 9781718504684 / Angielski / 24-03-2026 Książka dostępna od: 24-03-2026 |
|
Termin ukazania się książki: 24-03-2026
Książkę można już zamówić z rabatem 5% |
|
258,71 zł |
![]() |
Scams, Hacking, and Cybersecurity: The Ultimate Guide to Online Safety and Privacy
ISBN: 9781965480069 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
134,12 zł |
![]() |
The AI Cybersecurity Handbook
ISBN: 9781394340866 / Angielski / 24-03-2026 Książka dostępna od: 24-03-2026 |
|
Termin ukazania się książki: 24-03-2026
Książkę można już zamówić z rabatem 5% |
|
125,07 zł |
![]() |
CyberSentinel+: An Advanced Hybrid Honeypot Intrusion Detection System Augmented with Big Data Analytics and Machine Learning Intelligence
ISBN: 9781041115168 / Angielski / 06-03-2026 Książka dostępna od: 06-03-2026 |
|
Termin ukazania się książki: 06-03-2026
Książkę można już zamówić z rabatem 5% |
|
655,94 zł |
![]() |
A Day in the Life of a CISO: Personal Mentorship from 24+ Battle-Tested CISOs - Mentoring We Never Got
ISBN: 9781806110698 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
258,21 zł |
![]() |
Social Engineering in Cybersecurity: Threats and Defenses
ISBN: 9781032524429 / Angielski / 26-12-2025 Książka dostępna od: 26-12-2025 |
|
Termin ukazania się książki: 26-12-2025
Książkę można już zamówić z rabatem 5% |
|
231,65 zł |
![]() |
802.11 Security
ISBN: 9780596002909 / Angielski / Miękka / 196 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your... Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for go... |
cena:
134,46 zł |
![]() |
Gray Hat Python
ISBN: 9781593271923 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin... Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly,... |
cena:
191,63 zł |
![]() |
Surviving Cyberwar
ISBN: 9781605906881 / Angielski / Miękka / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
|
cena:
319,59 zł |
![]() |
Security and Privacy Assurance in Advancing Technologies: New Developments
ISBN: 9781609602000 / Angielski / Twarda / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
|
cena:
919,08 zł |
![]() |
The Tangled Web
ISBN: 9781593273880 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Thorough and comprehensive coverage from one of the foremost experts in browser security." Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. In The Tangled Web, Michal Zalewski, one of the world's top... "Thorough and comprehensive coverage from one of the foremost experts in browser security." ... |
cena:
287,47 zł |
![]() |
Automatic Malware Analysis: An Emulator Based Approach
ISBN: 9781461455226 / Angielski / Miękka / 73 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware analysis and defense systems. Automatic Malware Analysis presents a virtualized malware analysis framework that addresses common challenges in malware analysis. In regards to this new analysis framework, a series of analysis techniques for... Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars dam... |
cena:
201,72 zł |
![]() |
The Healthy Pc: Preventive Care, Home Remedies, and Green Computing, 2nd Edition
ISBN: 9780071752916 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Get your PC running at full speed again--and remove malevolent software
Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing, Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for making your PC start up faster, keeping its hard drive in good shape, and updating Windows with the latest security fixes. This hands-on guide also explains how to protect your PC for free using Microsoft Security Essentials, use the Internet... Get your PC running at full speed again--and remove malevolent software
Save yourself time, money, and frustration by becoming your own computer gu... |
cena:
119,13 zł |
![]() |
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
ISBN: 9781449315078 / Angielski / Miękka / 78 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker s opportunity to compromise your app and steal user data. How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information.... With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge yo... |
cena:
74,46 zł |
![]() |
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
ISBN: 9781118825099 / Angielski / Miękka / 912 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Memory forensics provides cutting edge technology to help investigate digital attacks
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows,... Memory forensics provides cutting edge technology to help investigate digital attacks
Memory forensics is the art of analyzing computer memo... |
cena:
266,99 zł |