Безпека систем

Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws

Joe Marshall

Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data

Samuel Bowne

Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches

Dr. Erdal Ozkaya, Milad Aslaner

Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Rajneesh Gupta

Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it

Sion Retzkin

Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works

Chandra Sekhar Nayak, Rivu Chakraborty

Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin

Alexey Soshin

Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms

Florent Vilmart, Giordano Scalzo, Sergio De Simone

Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3

Saurabh Badhwar

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue

Tamir Dresher, Amir Zuker, Shay Friedman

Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications

Remo H. Jansen

Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem

Soma Halder, Sinan Ozdemir

Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0

Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools

Nipun Jaswal

Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis

Phil Bramwell