Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms

Florent Vilmart, Giordano Scalzo, Sergio De Simone

Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3

Saurabh Badhwar

Hands-On Ethical Hacking Tactics. Strategies, tools, and techniques for effective cyber defense

Shane Hartman, Ken Dunham

Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue

Tamir Dresher, Amir Zuker, Shay Friedman

Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications

Remo H. Jansen

Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions

Maximiliano Santos, Enio Moura

Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem

Soma Halder, Sinan Ozdemir

Hands-On Microservices with Kotlin. Build reactive and cloud-native microservices with Kotlin using Spring 5 and Spring Boot 2.0

Juan Antonio Medina Iglesias

Hands-On Network Forensics. Investigate network attacks and find evidence using common network forensic tools

Nipun Jaswal

Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core

Sean Burns

Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions

Mohamed Waly

Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis

Phil Bramwell

Hands-On Penetration Testing with Kali NetHunter. Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go

Glen D. Singh, Sean-Philip Oriyano

Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems

Furqan Khan

Hands-On Red Team Tactics. A practical guide to mastering Red Team operations

Himanshu Sharma, Harpreet Singh

Hands-On RESTful Web Services with Go. Develop elegant RESTful APIs with Golang for microservices and the cloud - Second Edition

Naren Yellavula