Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux

Vivek Ramachandran, Cameron Buchanan

Kali Linux Wireless Penetration Testing Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack - Third Edition

Cameron Buchanan, Vivek Ramachandran

Kali Linux Wireless Penetration Testing Cookbook. Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Sean-Philip Oriyano

Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution

Marco Alamanni, Aaron Johns

Keycloak - Identity and Access Management for Modern Applications. Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications - Second Edition

Stian Thorgersen, Pedro Igor Silva

Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII

Jerry FitzGerald, Alan Dennis, Alexandra Durcikova

Konfiguracja Firewalli CISCO ASA w programie Packet Tracer

Jerzy Kluczewski, Damian Strojek

Kontenery. Bezpieczne wdrożenia. Podstawowe koncepcje i technologie

Liz Rice

Kotlin Quick Start Guide. Core features to get you ready for developing applications

Marko Devcic

Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers

Joseph Heck

Kubernetes Secrets Handbook. Design, implement, and maintain production-grade Kubernetes Secrets management solutions

Emmanouil Gkatziouras, Rom Adams, Chen Xi, Chris Jenkins

Laboratorium cyberbezpieczeństwa w Dockerze. Zrób to sam

Krzysztof Godzisz

Lean Mobile App Development. Apply Lean startup methodologies to develop successful iOS and Android apps

Mike van Drongelen, Aravind Krishnaswamy

Lean Product Management. Successful products from fuzzy business ideas

Mangalam Nandakumar

Learn Azure Administration. Explore cloud administration concepts with networking, computing, storage, and identity management - Second Edition

Kamil Mrzygłód

Learn Azure Sentinel. Integrate Azure security with artificial intelligence to build secure cloud systems

Richard Diver, Gary Bushey, Jason S. Rader