Bezpieczeństwo sieci
Electron Projects. Build over 9 cross-platform desktop applications from scratch
Denys Vuika
Empirical Cloud Security. A Guide To Practical Intelligence to Evaluate Risks and Attacks
Mercury Learning and Information, Aditya K. Sood
James Leyte-Vidal
Etyczne łamanie haseł. John the Ripper, hashcat i inne zaawansowane techniki
James Leyte-Vidal
Prateek Jadhwani
SURI PULLEMLA, Santhosh Sivarajan
Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity
Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber,...
Carlos A. Lozano , Dhruv Shah, Riyaz...
Himanshu Sharma, Joe Marshall
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
Samuel Bowne