Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go

Glen D. Singh, Sean-Philip Oriyano

Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems

Furqan Khan

Hands-On Red Team Tactics. A practical guide to mastering Red Team operations

Himanshu Sharma, Harpreet Singh

Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition

Naren Yellavula

Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps

Tony Hsiang-Chih Hsu

Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux

Tomcy John

Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17

Dr. Rian Quinn

Hardware i testy penetracyjne. Przewodnik po metodach ataku i obrony

Jean-Georges Valle

Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor

Kyle Rankin

Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease

Manoj Hirway

Hybrid Cloud Security Patterns. Leverage modern repeatable architecture patterns to secure your workloads on the cloud

Sreekanth Iyer, Dr. Nataraj Nagaratnam

Hyper-V Security. Secure your Hyper-V hosts, their guests, and critical services from intruders and malware

Eric Siron, Andrew Syrewicze

Identity Management with Biometrics. Explore the latest innovative solutions to provide secure identification and authentication

Lisa Bock

IDENTYFIKACJA I PRZECIWDZIAŁANIE ZAGROŻENIOM W CYBERPRZESTRZENI Pakiet 2 książki

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Sylwia Gliwa

IDS and IPS with Snort 3. Get up and running with Snort 3 and discover effective solutions to your security issues

Ashley Thomas

Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes

Matthew Nohr, Isaac Rabinovitch