Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition

Shiva V. N. Parasram

Discrete Mathematics With Cryptographic Applications. A Self-Teaching Guide to Unlocking the Power of Advanced Concepts and Computational Techniques

Mercury Learning and Information, Alexander I. Kheyfits

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn, David H. Brown

Docker and Kubernetes for Java Developers. Scale, deploy, and monitor multi-container applications

Jarosław Krochmalski

Docker Deep Dive. Zero to Docker in a single book - Third Edition

Nigel Poulton

Docker Networking Cookbook. Click here to enter text

Jon Langemak

Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications

Earl Waud

Domain-Driven Design in PHP. A Highly Practical Guide

Keyvan Akbary, Carlos Buenosvinos, Christian Soronellas

Dynamic Story Scripting with the ink Scripting Language. Create dialogue and procedural storytelling systems for Unity projects

Daniel Cox

Dziecko w sieci

Bartosz Danowski, Alicja Krupińska

Efektywny Kotlin. Najlepsze praktyki

Marcin Moskała

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

Rejah Rehim

Effective Threat Investigation for SOC Analysts. The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Electron Projects. Build over 9 cross-platform desktop applications from scratch

Denys Vuika

Empirical Cloud Security. A Guide To Practical Intelligence to Evaluate Risks and Attacks

Mercury Learning and Information, Aditya K. Sood

Endpoint Detection and Response Essentials. Explore the landscape of hacking, defense, and deployment in EDR

Guven Boyraz