Bezpieczeństwo systemów

Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd

Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula

Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform

Atul Mistry

Exploring Experience Design. Fusing business, tech, and design to shape customer engagement

Ezra Schwartz

Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

William Roberts, William Confer

Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments

Alex Callejas

Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III

Carey Parker

GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition

Stefano Iacovella

Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems

A. P. David

Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition

Ferdinando Santacroce

Go Systems Programming. Master Linux and Unix system level programming with Go

Mihalis Tsoukalos

Google Cloud Platform for Architects. Design and manage powerful cloud solutions

Vitthal Srinivasan, Janani Ravi, Judy Raj

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach

Will Verduzco (Contributor), Jason Tyler (Author)

Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications

Carlos A. Lozano, Dhruv Shah, Riyaz Ahemed Walikar

Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

Alessandro Parisi

Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws

Joe Marshall

Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data

Samuel Bowne

Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches

Dr. Erdal Ozkaya, Milad Aslaner

Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Rajneesh Gupta

Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it

Sion Retzkin

Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works

Chandra Sekhar Nayak, Rivu Chakraborty

Hands-on Design Patterns with Kotlin. Build scalable applications using traditional, reactive, and concurrent design patterns in Kotlin

Alexey Soshin

Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms

Florent Vilmart, Giordano Scalzo, Sergio De Simone

Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3

Saurabh Badhwar