Cărți editura Wiley
Wiley & Sons este o editură intrernațională, care publică cărți academice și profesionale. Se adresează în același timp unei unor categorii de interes și profesionale diverse, veți găsi aici cărți de inginerie, medicină, știință, cărți pentru studenți, cercetători și practicieni din domeniul științific, medical și academic.
Wiley produce cărți, enciclopedii, reviste, în format tipărit și electronic, precum și materiale educaționale și de instruire pentru formare continuă. A fost fondată în 1807 în Manhattan, de către John Wiley și a pornit ca librărie.
În decursul mai multor decenii s-a dezvoltat substanțial, iar din 2007 s-a unit cu Blackwell Publishing, extinzându-și astfel domeniul de adresare către zona medicală și științifică.
Cele mai cunoscute branduri (imprints) ale lor sunt: For Dummies, Frommer's, Webster's New World, Wiley Blackwell.
John Wiley & Sons, Inc. a câștigat 23 de premii APEX în cele mai diverse categorii: layout, conținut, design. Wiley a primit în total mai multe premii decât orice altă editură, agenție literară sau asociație din lume.
Cărțile sunt distribuite în librării online și offline din totă lumea, iar în România puteți să o găsiți la Books Express, mai mult decât o librărie, librarul tău personal. "Îți aducem orice carte din lume pentru profesia și pasiunile tale"
The Art of Deception – Controlling the Human Element of Security
Hacking Multifactor Authentication
Implementing SSL/TLS Using Cryptography and PKI
Cloud Security For Dummies, 1st Edition
The Metrics Manifesto: Confronting Security with D ata
Networking All–in–One For Dummies, 8th Edition
Business Data Communications and Networking, Fourt eenth Edition
Security Engineering – A Guide to Building Dependable Distributed Systems, Third Edition
The Pentester BluePrint – Starting a Career as an Ethical Hacker
Linux Command Line and Shell Scripting Bible, Fourth Edition
Ubuntu Linux Bible
CCSP For Dummies with Online Practice
Networking For Dummies, 12th Edition
Penetration Testing For Dummies
Linux Bible, Tenth Edition
Wireshark for Security Professionals – Using Wireshark and the Metasploit Framework
Advanced Penetration Testing – Hacking the World′s Most Secure Networks
Phishing Dark Waters – The Offensive and Defensive Sides of Malicious Emails
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Unmasking the Social Engineer: The Human Element of Security
Threat Modeling – Designing for Security
Architecting the Cloud– Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)
Web Application Defender′s Cookbook – Battling Hackers and Protecting Users
Communicating the User Experience – A Practical Guide for Creating Useful UX Documentation
The Web Application Hacker′s Handbook: Finding and Exploiting Security Flaws 2e
VMware vSphere For Dummies
Cryptography Engineering – Design Principles and Practical Applications
Unauthorised Access – Physical Penetration Testing For IT Security Teams
Managing the Human Factor in Information Security – How to win over staff and influence business managers
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Cybersecurity For Dummies, 2nd Edition
Wireless Home Networking For Dummies, 4e
Computer Security 3e
Linux All–in–One For Dummies, 7th Edition
Hacking For Dummies, 7th Edition
Windows Server 2022 & PowerShell All–in–One For Dummies
App Empire – Make Money, Have a Life, and Let Technology Work for You
Cisco Networking All–in–One For Dummies
Home Networking Do–It–Yourself For Dummies
Network Security Bible 2e
TCP / IP For Dummies
Active Directory For Dummies 2e
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers
Computer Viruses For Dummies
Home Networking For Dummies 4e
Virtual Private Networks for Dummies
The Code of Honor: Embracing Ethics in Cybersecuri ty
Fighting Phishing – Everything You Can Do to Fight Social Engineering and Phishing
CCSP For Dummies 2E (+ 2 Practice Tests & 100 Flashcards Online)
The Language of Deception – Weaponizing Next Generation AI
Ransomware Protection Playbook
Fight Fire with Fire – Proactive Cybersecurity Strategies for Today′s Leaders
Cloud Native Security
Kali Linux Penetration Testing Bible
People–Centric Skills: Interpersonal and Communication Skills for Financial Professionals
Windows Security Monitoring – Scenarios and Patterns
Secrets and Lies – Digital Security in a Networked World 15th Anniversary Edition
On Top of the Cloud – How CIOs Leverage New Technologies to Drive Change and Build Value Across the Enterprise
Cloud Computing Bible
e–Discovery For Dummies
Storage Area Networks For Dummies 2e
Computer Networks – Principles, Technologies and Protocols for Network Design
The Database Hacker′s Handbook – Defending Database Servers
Secrets and Lies – Digital Security in a Networked World
Principles of Network and System Administration 2e
Implementing Intrusion Detection Systems – A Hands –On Guide for Securing the Network
Programming the Network with Perl
Digital Marketing – Global Strategies from the World′s Leading Experts
Cybersecurity and Local Government
Cybersecurity Risk Management – Mastering the Fundamentals Using the NIST Cybersecurity Framework
Security in Wireless Communication Networks
Corporate Cybersecurity – Identifying Risks and the Bug Bounty Program
Network Forensics
Linux Server Security – Hack and Defend
The Network Security Test Lab – A Step–by–Step Guide
The Mobile Application Hacker′s Handbook
Cloud Management and Security
Information Storage and Management – Storing Managing and Protecting Digital Information 2e
An Introduction to Search Engines and Web Navigation 2e
Designing and Implementing IP/MPLS–Based Ethernet Layer 2 VPN Services – An Advanced Guide for VPLS and VLL
The All–New Switch Book – The Complete Guide to LAN Switching Technology
Applied Cryptanalysis – Breaking Ciphers in the Real World
Web Engineering
Design and Analysis of Security Protocol for Communication
Network Attacks & Exploitation – A Framework
Cybersecurity – Managing Systems, Conducting Testing, and Investigating Intrusions
Advanced Internet Protocols, Services and Applications
An Introduction to the DLNA (R) Architecture – Network Technologies for Media Devices
Security in a Web 2.0+ World: A Standards–Based Approach
Mastering UNIX Shell Scripting – Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus 2e
Understanding Information Transmission
Global IT Management – A Practical Approach
Networking in the Internet Age
Desktop Witness: The Do′s and Don′ts of Personal Computer Security
High–Speed Networking – A Systematic Approach to High–Bandwidth Low–Latency Communication
- 1
- 2