Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Implementing Multifactor Authentication. Protect your applications from cyberattacks with the help of MFA

Marco Fanti

Implementing NetScaler VPX. Implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms

Marius Sandbu

Implementing Palo Alto Networks Prisma(R) Access. Learn real-world network protection

Tom Piens Aka 'Reaper', Rutger Truyers

Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#

Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens

Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit

Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh

Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights

James D. Miller, Paul R. Johnson, Josh Diakun, Derek Mock

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Incident Response in the Age of Cloud. Techniques and best practices to effectively respond to cybersecurity incidents

Dr. Erdal Ozkaya

Incident Response Techniques for Ransomware Attacks. Understand modern ransomware attacks and build an incident response strategy to work through them

Oleg Skulkin

Incident Response with Threat Intelligence. Practical insights into developing an incident response capability through intelligence-based threat hunting

Roberto Martinez

Increasing Autodesk Revit Productivity for BIM Projects. A practical guide to using Revit workflows to improve productivity and efficiency in BIM projects

Fabio Roberti, Decio Ferreira

Industrial Cybersecurity. Efficiently monitor the cybersecurity posture of your ICS environment - Second Edition

Pascal Ackerman

Industrial Cybersecurity. Efficiently secure critical infrastructure systems

Pascal Ackerman

Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services

Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Informatyka śledcza. Gromadzenie, analiza i zabezpieczanie dowodów elektronicznych dla początkujących

William Oettinger