Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
ISBN: 9781837632152 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
217,98 zł |
Computer Networking Bootcamp: Routing, Switching And Troubleshooting
ISBN: 9781839387494 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
193,57 zł |
Postman Cookbook: Hand-picked Solutions and Techniques across API Design, Testing, Performance, Networking, Kubernetes and Integration
ISBN: 9788119177783 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
302,78 zł |
The Ultimate Kali Linux Book - Third Edition: Harness Nmap, Metaspolit, Aircrack-ng, and Empire for cutting-edge pentesting
ISBN: 9781835085806 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
266,44 zł |
Ultimate Linux Network Security for Enterprises
ISBN: 9788197223860 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
183,88 zł |
Learn Penetration Testing with Python 3.x: An ethical hacker's blueprint for offensive security - 2nd Edition
ISBN: 9789355519436 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
193,57 zł |
Acing the CCNA Exam: Volume 2 Advanced Networking and Security
ISBN: 9781633435780 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
266,44 zł |
Real-World Edge Computing: Scale, secure, and succeed in the realm of edge computing with Open Horizon
ISBN: 9781835885840 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
193,76 zł |
Certified Ethical Hacker: Session Hijacking, SQL Injections, Cloud Computing, And Cryptography
ISBN: 9781839388002 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
171,42 zł |
Kali Linux for Ethical Hacking: Penetration testing and vulnerability assessment for network security (English Edition)
ISBN: 9789355517043 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
169,33 zł |
Rust for Network Programming and Automation, Second Edition
ISBN: 9788119177349 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
346,04 zł |
Zabbix 7 IT Infrastructure Monitoring Cookbook - Third Edition: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zab
ISBN: 9781801078320 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
251,90 zł |
Ultra-Dense Heterogeneous Networks
ISBN: 9780367709518 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
234,71 zł |
The Debates Shaping Spectrum Policy
ISBN: 9780367742508 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
224,28 zł |
Vehicular AD Hoc Networks: Futuristic Technologies for Interactive Modelling, Dimensioning, and Optimization
ISBN: 9780367742539 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
260,80 zł |
Digital Forensics and Incident Response: A practical guide to using Kali Linux for cyber investigations (English Edition)
ISBN: 9789365898712 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
183,88 zł |
IDS and IPS with Snort 3: Get up and running with Snort 3 and discover effective solutions to your security issues
ISBN: 9781800566163 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
193,76 zł |
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
ISBN: 9781836203216 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
193,76 zł |
Security Warrior
ISBN: 9780596005450 / Angielski / Miękka / 531 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering,... When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against comp... |
|
cena:
194,45 zł |
Snort Cookbook
ISBN: 9780596007911 / Angielski / Miękka / 270 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and... If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code,... |
|
cena:
173,00 zł |