Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and

Erez Ben-Ari, Rainier Amara, Erez Y Ben

Mastering Microsoft Intune. Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and advance management via Intune Suite - Second Edition

Christiaan Brinkhoff, Per Larsen, Steve Dispensa, Scott Manchester

Mastering Mobile Forensics. Develop the capacity to dig deeper into mobile device data acquisition

Soufiane Tahiri

Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!

Prakhar Prasad, Rafay Baloch

Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know

Rick Roetenberg, Marius Sandbu, Andy Paul

Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework

Charles Bihis, Charles Bihis

Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition

Tom Piens aka 'reaper', Kim Wens aka 'kiwi'

Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition

David Zientara

Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues

José Manuel Ortega

Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition

José Ortega

Mastering Python Forensics. Master the art of digital forensics and analysis with Python

Michael Spreitzenbarth, Johann Uhrmann

Mastering Reverse Engineering. Re-engineer your ethical hacking skills

Reginald Wong

Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP

Pawe?Ç Grze?okowiak, Wojciech Ciesielski, Wojciech fÜwik

Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more

Ranga Rao Karanam

Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts

Paulino Calderon

Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology

Chris Childerhose