Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Cybersecurity Attacks ,Äi Red Team Strategies. A practical guide to building a penetration testing program having homefield advantage

Johann Rehberger

Cybersecurity Blue Team Strategies. Uncover the secrets of blue teams to combat cyber threats in your organization

Kunal Sehgal, Nikolaos Thymianis

Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career

Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, ...

Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO

Dr. Erdal Ozkaya, Melih Abdulhayoglu

Cybersecurity Research, Education and Management: University Perspective

Cybersecurity Strategies and Best Practices. A comprehensive guide to mastering enterprise cyber defense tactics and techniques

Milad Aslaner

Cybersecurity: The Beginner's Guide. A comprehensive guide to getting started in cybersecurity

Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition

Tim Rains, Timothy Youngblood CISSP

Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks

Tim Rains

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Cyberwojna. Metody działania hakerów

Dawid Farbaniec

Data science od podstaw. Analiza danych w Pythonie

Joel Grus

Data science od podstaw. Analiza danych w Pythonie. Wydanie II

Joel Grus

Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience

Rohan Pinto

Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition

Maxim Lapan

Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney, Chris Wysopal, Isabelle Mauny