Informatyka / Sieci komputerowe

ebook

Hands-On MQTT Programming with Python. Work with the lightweight IoT protocol in Python

Autor: Gaston C. Hillar

MQTT is a lightweight messaging protocol for small sensors and mobile devices. This book explores the features of the latest versions of MQTT for IoT and M2M communications, how to use them with Python 3, and allow you to interact with sensors and actuators using Python.The book begins with the specific vocabulary of MQTT and ...

109 zł
kup teraz
ebook

Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing

Autor: Zaid Sabih

This book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You’ll also learn how to crack the passwo ...

139 zł
kup teraz
ebook

Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions

Autor: David Zientara

As computer networks become ubiquitous, it has become increasingly important to both secure and optimize our networks. pfSense, an open-source router/firewall, provides an easy, cost-effective way of achieving this – and this book explains how to install and configure pfSense in such a way that even a networking beginn ...

139 zł
kup teraz
ebook

Learn PowerShell Core 6.0. Automate and control administrative tasks using DevOps principles

Autor: David das Neves, Jan-Hendrik Peters

Beginning with an overview of the different versions of PowerShell, Learn PowerShell Core 6.0 introduces you to VSCode and then dives into helping you understand the basic techniques in PowerShell scripting. You will cover advanced coding techniques, learn how to write reusable code as well as store and load data with PowerSh ...

139 zł
kup teraz
ebook

Managing Mission - Critical Domains and DNS. Demystifying nameservers, DNS, and domain names

Autor: Mark E.Jeftovic

Managing your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at “how to run a name server” or “how to DNSSEC sign a domain”, Managing Mission Critical Domains & DNS looks across the entire spectrum of na ...

139 zł
kup teraz
ebook

Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition

Autor: David Zientara

pfSense has the same reliability and stability as even the most popular commercial firewall offerings on the market – but, like the very best open-source software, it doesn’t limit you. You’re in control – you can exploit and customize pfSense around your security needs.Mastering pfSense - Second E ...

159 zł
kup teraz
ebook

Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats

Autor: Andrew Crouthamel

Wireshark, a combination of a Linux distro (Kali) and an open source security framework (Metasploit), is a popular and powerful tool. Wireshark is mainly used to analyze the bits and bytes that flow through a network. It efficiently deals with the second to the seventh layer of network protocols, and the analysis made is pres ...

119 zł
kup teraz
ebook

Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls

Autor: Manuj Aggarwal

While connected to the internet, you’re a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or ‘shield’) between your computer and cyberspace. pfSense is highly versatile firewall software. ...

94.99 zł
kup teraz
ebook

Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus

Autor: Ajay Singh Chauhan

Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization.Practical Network Scanning ...

119 zł
kup teraz
ebook

Wireshark 2 Quick Start Guide. Secure your network through protocol analysis

Autor: Charit Mishra

Wireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, ...

94.99 zł
kup teraz

Ta strona wykorzystuje pliki cookies. więcej informacji

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close