Hacking

Möchten Sie tiefer in die Welt der Cybersicherheit und moderner Technologien eintauchen? Dann werden Sie sicherlich an unserer Online-Bibliothek interessiert sein. Hier finden Sie Bücher, die Ihnen helfen, die von Hackern verwendeten Methoden kennenzulernen. Sie erfahren auch, wie Sie Ihre Daten effektiv schützen sowie Programme testen und debuggen können.

Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet

Jason M Slagle, Jason Slagle

Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python

Preston Miller, Chapin Bryce

Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition

Preston Miller, Chapin Bryce

Learning Python Web Penetration Testing. Automate web penetration testing activities using Python

Christian Martorella

Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2

Miroslav Vitula

Linux Networking Cookbook. Over 40 recipes to help you set up and configure Linux networks

Gregory Boyce

Łamanie i zabezpieczanie aplikacji w systemie iOS

Jonathan Zdziarski

Machine Learning for Cybersecurity Cookbook. Over 80 recipes on how to implement machine learning algorithms for building security systems using Python

Emmanuel Tsukerman

Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes

John Paul Mueller, Rod Stephens

Malware Analysis Techniques. Tricks for the triage of adversarial software

Malware Development for Ethical Hackers. Learn how to develop various types of malware to strengthen cybersecurity

Zhassulan Zhussupov

Malware Science. A comprehensive guide to detection, analysis, and compliance

Shane Molinari, Jim Packer

Mała księga wielkich szyfrów

Dominik Robakowski

Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition

Andrew Block, Austin Dewey, Rimantas Mocevicius "rimusz"

Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases

Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith

Mastering AWS Security. Create and maintain a secure cloud ecosystem