Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Mastering Linux Security and Hardening. Secure your Linux server and protect it from intruders, malware attacks, and other external threats

Donald A. Tevault

Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python

Chiheb Chebbi

Mastering Malware Analysis. A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks - Second Edition

Alexey Kleymenov, Amr Thabet

Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Alexey Kleymenov, Amr Thabet

Mastering Metasploit. Discover the next level of network defense with the Metasploit framework - Second Edition

Nipun Jaswal

Mastering Metasploit. Exploit systems, cover your tracks, and bypass security controls with the Metasploit 5.0 framework - Fourth Edition

Nipun Jaswal

Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition

Nipun Jaswal

Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert

Nipun Jaswal

Mastering Microsoft 365 Defender. Implement Microsoft Defender for Endpoint, Identity, Cloud Apps, and Office 365 and respond to threats

Ru Campbell, Viktor Hedberg, Heike Ritter

Mastering Microsoft Defender for Office 365. Streamline Office 365 security with expert tips for setup, automation, and advanced threat hunting

Samuel Soto

Mastering Microsoft Endpoint Manager. Deploy and manage Windows 10, Windows 11, and Windows 365 on both physical and cloud PCs

Christiaan Brinkhoff, Per Larsen, Ken Pan, Scott Manchester

Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and

Erez Ben-Ari, Rainier Amara, Erez Y Ben

Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition

Christiaan Brinkhoff, Per Larsen, Steve Dispensa, Scott Manchester

Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition

Soufiane Tahiri

Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!

Prakhar Prasad, Rafay Baloch

Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know

Rick Roetenberg, Marius Sandbu, Andy Paul