Cărți editura Wiley
Wiley & Sons este o editură intrernațională, care publică cărți academice și profesionale. Se adresează în același timp unei unor categorii de interes și profesionale diverse, veți găsi aici cărți de inginerie, medicină, știință, cărți pentru studenți, cercetători și practicieni din domeniul științific, medical și academic.
Wiley produce cărți, enciclopedii, reviste, în format tipărit și electronic, precum și materiale educaționale și de instruire pentru formare continuă. A fost fondată în 1807 în Manhattan, de către John Wiley și a pornit ca librărie.
În decursul mai multor decenii s-a dezvoltat substanțial, iar din 2007 s-a unit cu Blackwell Publishing, extinzându-și astfel domeniul de adresare către zona medicală și științifică.
Cele mai cunoscute branduri (imprints) ale lor sunt: For Dummies, Frommer's, Webster's New World, Wiley Blackwell.
John Wiley & Sons, Inc. a câștigat 23 de premii APEX în cele mai diverse categorii: layout, conținut, design. Wiley a primit în total mai multe premii decât orice altă editură, agenție literară sau asociație din lume.
Cărțile sunt distribuite în librării online și offline din totă lumea, iar în România puteți să o găsiți la Books Express, mai mult decât o librărie, librarul tău personal. "Îți aducem orice carte din lume pentru profesia și pasiunile tale"
Concurrent and Distributed Computing in Java
Threat Modeling – Designing for Security
Hacking Multifactor Authentication
Advanced Penetration Testing – Hacking the World′s Most Secure Networks
Unmasking the Social Engineer: The Human Element of Security
Cloud Security For Dummies, 1st Edition
Kali Linux Penetration Testing Bible
The Metrics Manifesto: Confronting Security with D ata
Cybersecurity Risk Management – Mastering the Fundamentals Using the NIST Cybersecurity Framework
Security in Wireless Communication Networks
Networking All–in–One For Dummies, 8th Edition
Business Data Communications and Networking, Fourt eenth Edition
Security Engineering – A Guide to Building Dependable Distributed Systems, Third Edition
The Pentester BluePrint – Starting a Career as an Ethical Hacker
Linux Command Line and Shell Scripting Bible, Fourth Edition
CCSP For Dummies with Online Practice
Networking For Dummies, 12th Edition
Penetration Testing For Dummies
Linux Bible, Tenth Edition
The Network Security Test Lab – A Step–by–Step Guide
The Mobile Application Hacker′s Handbook
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Architecting the Cloud– Design Decisions for Cloud Computing Service Models (SaaS, PaaS, and IaaS)
Information Storage and Management – Storing Managing and Protecting Digital Information 2e
The Web Application Hacker′s Handbook: Finding and Exploiting Security Flaws 2e
Implementing SSL/TLS Using Cryptography and PKI
Cryptography Engineering – Design Principles and Practical Applications
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Deception – Controlling the Human Element of Security
Computer Security 3e
Cisco Networking All–in–One For Dummies
TCP / IP For Dummies
Active Directory For Dummies 2e
Virtual Private Networks for Dummies
Artificial Intelligence for Cyber Security: An IoT Perspective
Unleashing the Power of Low–Code Computing
Wireless Quantum Networks, 2 volume Set
The Code of Honor: Embracing Ethics in Cybersecuri ty
Fighting Phishing – Everything You Can Do to Fight Social Engineering and Phishing
CCSP For Dummies 2E (+ 2 Practice Tests & 100 Flashcards Online)
The Language of Deception – Weaponizing Next Generation AI
Linux All–in–One For Dummies, 7th Edition
Cybersecurity For Dummies, 2nd Edition
Hacking For Dummies, 7th Edition
Windows Server 2022 & PowerShell All–in–One For Dummies
Ransomware Protection Playbook
Fight Fire with Fire – Proactive Cybersecurity Strategies for Today′s Leaders
Cloud Native Security
People–Centric Skills: Interpersonal and Communication Skills for Financial Professionals
Knockout Networking for Financial Advisors and Other Sales Producers – More Prospects, More Referrals, More Business
Windows Security Monitoring – Scenarios and Patterns
Secrets and Lies – Digital Security in a Networked World 15th Anniversary Edition
Secrets and Lies – Digital Security in a Networked World
Security in a Web 2.0+ World: A Standards–Based Approach
Desktop Witness: The Do′s and Don′ts of Personal Computer Security
Cybersecurity and Local Government
Game Theory and Machine Learning for Cyber Security
Corporate Cybersecurity – Identifying Risks and the Bug Bounty Program
Ubuntu Linux Bible
Windows Server 2019 & PowerShell All–in–One For Dummies
Wireshark for Security Professionals – Using Wireshark and the Metasploit Framework
Linux Server Security – Hack and Defend
Phishing Dark Waters – The Offensive and Defensive Sides of Malicious Emails
Cloud Management and Security
Computer Security Handbook, Sixth Edition Set
Data–Driven Security: Analysis, Visualization and Dashboards
Web Application Defender′s Cookbook – Battling Hackers and Protecting Users
VMware vSphere For Dummies
An Introduction to Search Engines and Web Navigation 2e
Designing and Implementing IP/MPLS–Based Ethernet Layer 2 VPN Services – An Advanced Guide for VPLS and VLL
Managing the Human Factor in Information Security – How to win over staff and influence business managers
The All–New Switch Book – The Complete Guide to LAN Switching Technology
Applied Cryptanalysis – Breaking Ciphers in the Real World
Wireless Home Networking For Dummies, 4e
App Empire – Make Money, Have a Life, and Let Technology Work for You
The Internet of Things – Key Applications and Protocols
Home Networking Do–It–Yourself For Dummies
Network Security Bible 2e
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers
Computer Viruses For Dummies
Home Networking For Dummies 4e
Design and Analysis of Security Protocol for Communication
Network Attacks & Exploitation – A Framework
Cybersecurity – Managing Systems, Conducting Testing, and Investigating Intrusions
Advanced Internet Protocols, Services and Applications
An Introduction to the DLNA (R) Architecture – Network Technologies for Media Devices
Cloud Computing Bible
e–Discovery For Dummies
Storage Area Networks For Dummies 2e
Mastering UNIX Shell Scripting – Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus 2e
Wiley Pathways Network Security Fundamentals
Internet Communications using SIP – Delivering VoIP and Multimedia Services with Session Initiation Protocol 2e
Internet Measurement – Infrastructure, Traffic and Applications
Securing SCADA Systems
Computer Networks – Principles, Technologies and Protocols for Network Design
- 1
- 2