Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization

Kunal Sehgal, Nikolaos Thymianis

Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career

Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, ...

Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO

Dr. Erdal Ozkaya, Melih Abdulhayoglu

Cybersecurity Research, Education and Management: University Perspective

Andrzej Kraśniewski

Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques

Milad Aslaner

Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity

Dr. Erdal Ozkaya

Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition

Tim Rains, Timothy Youngblood CISSP

Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks

Tim Rains

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Cyberwojna. Metody działania hakerów

Dawid Farbaniec

Data science od podstaw. Analiza danych w Pythonie

Joel Grus

Data science od podstaw. Analiza danych w Pythonie. Wydanie II

Joel Grus

Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience

Rohan Pinto

Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition

Maxim Lapan

Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney, Chris Wysopal, Isabelle Mauny

Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux

Karl Lane