Hacking

Möchten Sie tiefer in die Welt der Cybersicherheit und moderner Technologien eintauchen? Dann werden Sie sicherlich an unserer Online-Bibliothek interessiert sein. Hier finden Sie Bücher, die Ihnen helfen, die von Hackern verwendeten Methoden kennenzulernen. Sie erfahren auch, wie Sie Ihre Daten effektiv schützen sowie Programme testen und debuggen können.

Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition

Oleg Skulkin, Donnie Tindall, Rohit Tamma

Learning AWS. Design, build, and deploy responsive applications using AWS Cloud components - Second Edition

Aurobindo Sarkar, Amit Shah

Learning Continuous Integration with Jenkins. A beginner's guide to implementing Continuous Integration and Continuous Delivery using Jenkins 2 - Second Edition

Nikhil Pathania

Learning iOS Penetration Testing. Secure your iOS applications and uncover hidden vulnerabilities by conducting penetration tests

Swaroop Yermalkar

Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques

Charles S Edge, Allister Banks

Learning Java Lambdas. An in-depth look at one of the most important features of modern Java

Toby Weston

Learning Kubernetes Security. A practical guide for secure and scalable containerized environments - Second Edition

Raul Lapaz

Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Monnappa K A

Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems

Wojciech Kocjan, Nagios Enterprises

Learning Network Forensics. Identify and safeguard your network against both internal and external threats, hackers, and malware attacks

Samir Datt

Learning Penetration Testing with Python. Utilize Python scripting to execute effective and efficient penetration tests

Christopher Duffy

Learning Pentesting for Android Devices. Android’s popularity makes it a prime target for attacks, which is why this tutorial is so essential. It takes you from security basics to forensics and penetration testing in easy, user-friendly steps

Aditya Gupta

Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet

Jason M Slagle, Jason Slagle

Learning Python for Forensics. Learn the art of designing, developing, and deploying innovative forensic solutions through Python

Preston Miller, Chapin Bryce

Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition

Preston Miller, Chapin Bryce

Learning Python Web Penetration Testing. Automate web penetration testing activities using Python

Christian Martorella