Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

SURI PULLEMLA, Santhosh Sivarajan

Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems

David Álvarez Pérez

Ghidra Software Reverse-Engineering for Beginners. Master the art of debugging, from understanding code to mitigating threats - Second Edition

David Álvarez Pérez, Ravikant Tiwari

Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition

Ferdinando Santacroce

Go Systems Programming. Master Linux and Unix system level programming with Go

Mihalis Tsoukalos

Google Cloud Platform for Architects. Design and manage powerful cloud solutions

Vitthal Srinivasan, Janani Ravi, Judy Raj

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career

Ken Underhill, Mari Galloway, Christophe Foulon, Tia Hopkins

Hack the Cybersecurity Interview. Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles - Second Edition

Christophe Foulon, Ken Underhill, Tia Hopkins

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity

Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, ...

Hacking Android. Click here to enter text

Mohammed A. Imran, Srinivasa Rao Kotipalli

Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach

Will Verduzco (Contributor), Jason Tyler (Author)

Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications

Carlos A. Lozano, Dhruv Shah, Riyaz Ahemed Walikar

Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

Alessandro Parisi

Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java

Rahul Shetty

Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python

Harish Garg