eBooki
W kategorii eBooki znajdziesz książki w postaci elektronicznej, w formie PDF, ePub oraz mobi. Po zakupie e-booka będzie on dostępny w Bibliotece na koncie użytkownika. Książki przeczytasz na laptopie, tablecie, smartfonie lub czytniku ebooków (Kindle, Pocketbook, inkBOOK, Prestigio i innych). Więcej na temat wykorzystania i zabezpieczenia eBooków znajdziesz na stronie "Przewodnik po eBookach".
Ebooki dostępne w księgarni Ebookpoint
-
Systemy operacyjne. Wydanie V
-
Linux. Wprowadzenie do wiersza poleceń. Wydanie II
-
Linux. Biblia. Wydanie X
-
Bezpieczeństwo systemu Linux. Hardening i najnowsze techniki zabezpieczania przed cyberatakami. Wydanie III
-
Jak działa Linux. Podręcznik administratora. Wydanie III
-
Linux. Komendy i polecenia. Wydanie VI
-
Informatyka śledcza i Kali Linux. Przeprowadź analizy nośników pamięci, ruchu sieciowego i zawartości RAM-u za pomocą narzędzi systemu Kali Linux 2022.x. Wydanie III
-
Kali Linux i testy penetracyjne. Biblia
-
Kali Linux. Testy penetracyjne i bezpieczeństwo sieci dla zaawansowanych. Wydanie II
-
Linux dla admina. Najlepsze praktyki. O czym pamiętać podczas projektowania i zarządzania systemami
-
Kali Linux i zaawansowane testy penetracyjne. Zostań ekspertem cyberbezpieczeństwa za pomocą Metasploit, Nmap, Wireshark i Burp Suite. Wydanie IV
-
Serwer Ubuntu. Kompletny przewodnik po Ubuntu Server 22.04. Wydanie IV
-
Genialne skrypty powłoki. Ponad 100 rozwiązań dla systemów Linux, macOS i Unix
-
Kali Linux. Zaawansowane testy penetracyjne za pomocą narzędzi Nmap, Metasploit, Aircrack-ng i Empire. Wydanie II
-
Unix i Linux. Przewodnik administratora systemów. Wydanie V
-
Ansible w praktyce. Automatyzacja konfiguracji i proste instalowanie systemów. Wydanie III
-
Bezpieczeństwo systemu Linux w praktyce. Receptury. Wydanie II
-
Linux. Wiersz poleceń i skrypty powłoki. Biblia. Wydanie IV
-
Python dla DevOps. Naucz się bezlitośnie skutecznej automatyzacji
-
Systemy operacyjne. Architektura, funkcjonowanie i projektowanie. Wydanie IX
-
Bash. Praktyczne skrypty
-
Edytory vi i Vim. Leksykon kieszonkowy
-
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
-
Linux. Leksykon kieszonkowy. Wydanie III
-
Linux i obsługa sieci dla profesjonalistów. Konfiguracja i stosowanie bezpiecznych usług sieciowych
-
Linux. Receptury. Najważniejsze umiejętności użytkownika i administratora. Wydanie II
-
Nowoczesny Linux. Przewodnik dla użytkownika natywnej chmury
-
Programowalność i automatyzacja sieci. Poradnik inżyniera sieci następnej generacji
-
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
-
Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń
-
Kali Linux. Testy penetracyjne
-
Linux Mint. Podstawy
-
Linux. Profesjonalne administrowanie systemem. Wydanie II
-
Linux Server. Bezpieczeństwo i ochrona sieci
-
Sieci Linux. Receptury
-
Ubuntu Linux. Biblia
-
Ubuntu. Oficjalny podręcznik. Wydanie VIII
-
Linux dla każdego Technika IT
-
ABC Linux. Wydanie II
-
Bash. Receptury
-
Debian Linux. System operacyjny dla każdego. Pierwsze starcie
-
Docker. Projektowanie i wdrażanie aplikacji
-
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
-
Linux. Komendy i polecenia. Wydanie IV rozszerzone
-
Linux. Programowanie w powłoce. Praktyczny przewodnik. Wydanie III
-
Skanowanie sieci z Kali Linux. Receptury
-
Skrypty powłoki systemu Linux. Zagadnienia zaawansowane. Wydanie II
-
Skrypty powłoki systemu Linux. Receptury. Wydanie III
-
Wiersz poleceń Linuksa. Rozwijanie umiejętności efektywnej pracy
-
Linux Device Driver Development. Everything you need to start with device driver development for Linux kernel and embedded Linux - Second Edition
-
Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
Administrowanie sieciowymi systemami operacyjnymi Windows Serwer i Linux Serwer
-
Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities
-
React Native Cookbook. Recipes for solving common React Native development problems - Second Edition
-
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Mastering Docker Enterprise. A companion guide for agile container adoption
-
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats
-
Embedded Linux Development Using Yocto Project Cookbook. Practical recipes to help you leverage the power of Yocto to build exciting Linux-based systems - Second Edition
-
Fundamentals of Linux. Explore the essentials of the Linux command line
-
Hands-On Serverless Computing. Build, run and orchestrate serverless applications using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions
-
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
Learn OpenShift. Deploy, build, manage, and migrate applications with OpenShift Origin 3.9
-
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Learn Docker - Fundamentals of Docker 18.x. Everything you need to know about containerizing your applications and running them in production
-
Mastering ROS for Robotics Programming. Design, build, and simulate complex robots using the Robot Operating System - Second Edition
-
Machine Learning with Swift. Artificial Intelligence for iOS
-
Android Things Quick Start Guide. Build your own smart devices using the Android Things platform
-
CompTIA Linux+ Certification Guide. A comprehensive guide to achieving LX0-103 and LX0-104 certifications with mock exams
-
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
Hands-On System Programming with Linux. Explore Linux system programming interfaces, theory, and practice
-
Learn Apache Mesos. A beginner’s guide to scalable cluster management and deployment
-
PowerShell Core for Linux Administrators Cookbook. Use PowerShell Core 6.x on Linux to automate complex, repetitive, and time-consuming tasks
-
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
Learn Linux Shell Scripting - Fundamentals of Bash 4.4. A comprehensive guide to automating administrative tasks with the Bash shell
-
Containerization with LXC. Build, manage, and configure Linux containers
-
Kali Linux Intrusion and Exploitation Cookbook. Powerful recipes to detect vulnerabilities and perform security assessments
-
Learning OpenDaylight. A gateway to SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) ecosystem
-
KVM Virtualization Cookbook. Learn how to use KVM effectively in production
-
Mastering Bash. A Step-by-Step Guide to working with Bash Programming and Shell Scripting
-
Mastering Embedded Linux Programming. Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates - Second Edition
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux – the ultimate white hat hackers' toolkit - Second Edition
-
Linux Shell Scripting Bootcamp. The fastest way to learn Linux shell scripting
-
Getting Started with Terraform. Manage production infrastructure as a code - Second Edition
-
Continuous Delivery with Docker and Jenkins. Delivering software at scale
-
Go Systems Programming. Master Linux and Unix system level programming with Go
-
Mastering Assembly Programming. From instruction set to kernel module with Intel processor
-
Mastering Linux Kernel Development. A kernel developer's reference manual
-
Kali Linux - An Ethical Hacker's Cookbook. End-to-end penetration testing solutions
-
Linux Device Drivers Development. Develop customized drivers for embedded Linux
-
Embedded Linux Development using Yocto Projects. Learn to leverage the power of Yocto Project to build efficient Linux-based products - Second Edition
-
Deployment with Docker. Apply continuous integration models, deploy applications quicker, and scale at large by putting Docker to work
-
Mastering Swift 3 - Linux. Click here to enter text
-
Docker Orchestration. Click here to enter text
-
Learning Modern Linux
-
Linux Administration Best Practices. Practical solutions to approaching the design and management of Linux systems
-
Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
-
Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting
-
Linux Kernel Debugging. Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules
-
The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks
-
Linux Service Management Made Easy with systemd. Advanced techniques to effectively manage, control, and monitor Linux systems and services
-
Linux Command Line and Shell Scripting Techniques. Master practical aspects of the Linux command line and then use it as a part of the shell scripting process
-
Agile Security Operations. Engineering for agility in cyber defense, detection, and response
-
Pentesting Industrial Control Systems. An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
-
Learn Linux Quickly. A beginner-friendly guide to getting up and running with the world's most powerful operating system
-
Linux: Powerful Server Administration. Recipes for CentOS 7, RHEL 7, and Ubuntu Server Administration
-
Instant Debian - Build a Web Server. Build strong foundations for your future-ready web application using the universal operating system, Debian
-
Instant Ubuntu. Your complete guide to making the switch to Ubuntu
-
Linux Kernel Programming. A comprehensive guide to kernel internals, writing kernel modules, and kernel synchronization
-
Digital Forensics with Kali Linux. Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x - Second Edition
-
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
SELinux System Administration. Effectively secure your Linux systems with SELinux - Second Edition
-
Practical Linux System Administration
-
Kali Linux 2018: Assuring Security by Penetration Testing. Unleash the full potential of Kali Linux 2018, now with updated tools - Fourth Edition
-
Kali Linux Web Penetration Testing Cookbook. Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x - Second Edition
-
Learning Linux Shell Scripting. Leverage the power of shell scripts to solve real-world problems - Second Edition
-
Mastering Linux Shell Scripting. A practical guide to Linux command-line, Bash scripting, and Shell programming - Second Edition
-
Mastering Ubuntu Server. Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04 - Second Edition
-
Practical Linux Security Cookbook. Secure your Linux environment from modern-day attacks with practical recipes - Second Edition
-
Working with Linux - Quick Hacks for the Command Line. Command line power like you've never seen