Systemsicherheit

Kali Linux. Testy penetracyjne. Wydanie II

Juned Ahmed Ansari

Kali Linux. Testy penetracyjne. Wydanie III

Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition

Cameron Buchanan, Vivek Ramachandran

Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Sean-Philip Oriyano

Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII

Jerry FitzGerald, Alan Dennis, Alexandra Durcikova

Kontenery. Bezpieczne wdrożenia. Podstawowe koncepcje i technologie

Liz Rice

Kotlin Quick Start Guide. Core features to get you ready for developing applications

Marko Devcic

Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers

Joseph Heck

Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam

Krzysztof Godzisz

Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps

Mike van Drongelen, Aravind Krishnaswamy

Lean Product Management. Successful products from fuzzy business ideas

Mangalam Nandakumar

Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition

Kamil Mrzygłód

Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence - Second Edition

William Oettinger

Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing

Zaid Sabih

Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem

Mohamed Waly

Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions

David Zientara

Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development

Ivo Balbaert

Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert

Dr. Erdal Ozkaya

Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition

Oleg Skulkin, Donnie Tindall, Rohit Tamma

Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition

Aurobindo Sarkar, Amit Shah

Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques

Charles S Edge, Allister Banks

Learning Java Lambdas. An in-depth look at one of the most important features of modern Java

Toby Weston

Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Monnappa K A

Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks

Samir Datt