Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Mastering AWS Security. Strengthen your cloud environment using AWS security features coupled with proven strategies - Second Edition

Laurent Mathieu

Mastering Azure Security. Keeping your Microsoft Azure workloads safe - Second Edition

Mustafa Toroman, Tom Janetscheck

Mastering Blockchain. A deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more - Third Edition

Imran Bashir

Mastering Blockchain. A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs - Fourth Edition

Imran Bashir

Mastering Blockchain. Deeper insights into decentralization, cryptography, Bitcoin, and popular Blockchain frameworks

Imran Bashir

Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition

Imran Bashir

Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity

Jitendra Chittoda

Mastering C++ Programming. Modern C++ 17 at your fingertips

Jeganathan Swaminathan

Mastering Cloud Security Posture Management (CSPM). Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques

Qamar Nomani, Julie Davila, Rehman Khan

Mastering Cyber Intelligence. Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

Jean Nestor M. Dahj

Mastering Defensive Security. Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Cesar Bravo, Darren Kitchen

Mastering Distributed Tracing. Analyzing performance in microservices and complex systems

Yuri Shkuro

Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions

Igor Kucherenko

Mastering Information Security Compliance Management. A comprehensive handbook on ISO/IEC 27001:2022 compliance

Adarsh Nair, Greeshma M. R.

Mastering Kali Linux for Advanced Penetration Testing. Become a cybersecurity ethical hacking expert using Metasploit, Nmap, Wireshark, and Burp Suite - Fourth Edition

Vijay Kumar Velu

Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition

Vijay Kumar Velu, Robert Beggs