Hacking

Möchten Sie tiefer in die Welt der Cybersicherheit und moderner Technologien eintauchen? Dann werden Sie sicherlich an unserer Online-Bibliothek interessiert sein. Hier finden Sie Bücher, die Ihnen helfen, die von Hackern verwendeten Methoden kennenzulernen. Sie erfahren auch, wie Sie Ihre Daten effektiv schützen sowie Programme testen und debuggen können.

Algorytmy kryptograficzne w Pythonie. Wprowadzenie

Shannon W. Bray

Alicja i Bob. Bezpieczeństwo aplikacji w praktyce

Tanya Janca

Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security

Rebecca Blair

Amazon Web Services w akcji. Wydanie II

Andreas Wittig, Michael Wittig

An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

Kushantha Gunawardana

Analiza śledcza urządzeń mobilnych. Teoria i praktyka

Aleksandra Boniewicz

Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments

Pragati Rai

Android. Podręcznik hackera

Stephen A. Ridley, Georg Wicherski, Pau Oliva Fora, Collin Mulliner, ...

Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan

Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach

Dariusz Nabywaniec

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Nir Yehoshua, Uriel Kosayev

API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation

Confidence Staveley, Christopher Romeo

API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing

Dave Westerveld

Applied Network Security. Proven tactics to detect and defend against all kinds of network attack

Arthur Salmon, Michael McLafferty, Warun Levesque

Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud

Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz

Archiwizacja i odzyskiwanie danych

W. Curtis Preston