Hacking

Möchten Sie tiefer in die Welt der Cybersicherheit und moderner Technologien eintauchen? Dann werden Sie sicherlich an unserer Online-Bibliothek interessiert sein. Hier finden Sie Bücher, die Ihnen helfen, die von Hackern verwendeten Methoden kennenzulernen. Sie erfahren auch, wie Sie Ihre Daten effektiv schützen sowie Programme testen und debuggen können.

Managing Kubernetes Resources Using Helm. Simplifying how to build, package, and distribute applications for Kubernetes - Second Edition

Andrew Block, Austin Dewey, Rimantas Mocevicius "rimusz"

Managing Risks in Digital Transformation. Navigate the modern landscape of digital threats with the help of real-world examples and use cases

Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong- Smith

Mastering AWS Security. Create and maintain a secure cloud ecosystem

Albert Anthony

Mastering AWS Security. Strengthen your cloud environment using AWS security features coupled with proven strategies - Second Edition

Laurent Mathieu

Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition

Mustafa Toroman, Tom Janetscheck

Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition

Imran Bashir

Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition

Imran Bashir

Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks

Imran Bashir

Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition

Imran Bashir

Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity

Jitendra Chittoda

Mastering C++ Programming. Modern C++ 17 at your fingertips

Jeganathan Swaminathan

Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques

Qamar Nomani, Julie Davila, Rehman Khan

Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

Jean Nestor M. Dahj

Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Cesar Bravo, Darren Kitchen

Mastering Distributed Tracing. Analyzing performance in microservices and complex systems

Yuri Shkuro

Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions

Igor Kucherenko