Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Algorytmy kryptograficzne w Pythonie. Wprowadzenie

Shannon W. Bray

Alicja i Bob. Bezpieczeństwo aplikacji w praktyce

Tanya Janca

Aligning Security Operations with the MITRE ATT&CK Framework. Level up your security operations center for better security

Rebecca Blair

Amazon Web Services w akcji. Wydanie II

Andreas Wittig, Michael Wittig

An Ethical Guide to Cyber Anonymity. Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

Kushantha Gunawardana

Analiza śledcza urządzeń mobilnych. Teoria i praktyka

Aleksandra Boniewicz

Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments

Pragati Rai

Android. Podręcznik hackera

Stephen A. Ridley, Georg Wicherski, Pau Oliva Fora, Collin Mulliner, ...

Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan

Anonimizacja i maskowanie danych wrażliwych w przedsiębiorstwach

Dariusz Nabywaniec

Antivirus Bypass Techniques. Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Nir Yehoshua, Uriel Kosayev

API Security for White Hat Hackers. Uncover offensive defense strategies and get up to speed with secure API implementation

Confidence Staveley, Christopher Romeo

API Testing and Development with Postman. A practical guide to creating, testing, and managing APIs for automated software testing

Dave Westerveld

Applied Network Security. Proven tactics to detect and defend against all kinds of network attack

Arthur Salmon, Michael McLafferty, Warun Levesque

Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud

Kamal Arora, Erik Farr, John Gilbert, Piyum Zonooz

Archiwizacja i odzyskiwanie danych

W. Curtis Preston