Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Cybersecurity Threats, Malware Trends, and Strategies. Discover risk mitigation strategies for modern threats to your organization - Second Edition

Tim Rains, Timothy Youngblood CISSP

Cybersecurity Threats, Malware Trends, and Strategies. Learn to mitigate exploits, malware, phishing, and other social engineering attacks

Tim Rains

Cybersecurity w pytaniach i odpowiedziach

Wojciech Ciemski

Cyberwojna. Metody działania hakerów

Dawid Farbaniec

Data Science for Malware Analysis. A comprehensive guide to using AI in detection, analysis, and compliance

Shane Molinari, Jim Packer

Data science od podstaw. Analiza danych w Pythonie

Joel Grus

Data science od podstaw. Analiza danych w Pythonie. Wydanie II

Joel Grus

Decentralized Identity Explained. Embrace decentralization for a more secure and empowering digital experience

Rohan Pinto

Deep Reinforcement Learning Hands-On. Apply modern RL methods to practical problems of chatbots, robotics, discrete optimization, web automation, and more - Second Edition

Maxim Lapan

Defending APIs. Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney, Chris Wysopal, Isabelle Mauny

Defensive Security with Kali Purple. Cybersecurity strategies using ELK Stack and Kali Linux

Karl Lane

Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java

Kamalmeet Singh, Adrian Ianculescu, Lucian-Paul Torje

DevOps Bootcamp. The fastest way to learn DevOps

Mitesh Soni

DevSecOps for Azure. End-to-end supply chain security for GitHub, Azure DevOps, and the Azure cloud

David Okeyode, Joylynn Kirui, Scott Hanselman

DevSecOps in Practice with VMware Tanzu. Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio

Parth Pandit, Robert Hardt

Digital Forensics and Incident Response. Incident response tools and techniques for effective cyber threat response - Third Edition

Gerard Johansen