Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework

Charles Bihis, Charles Bihis

Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition

Tom Piens aka 'reaper', Kim Wens aka 'kiwi'

Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition

David Zientara

Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues

José Manuel Ortega

Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition

José Ortega

Mastering Python Forensics. Master the art of digital forensics and analysis with Python

Michael Spreitzenbarth, Johann Uhrmann

Mastering Reverse Engineering. Re-engineer your ethical hacking skills

Reginald Wong

Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP

Pawe?Ç Grze?okowiak, Wojciech Ciesielski, Wojciech fÜwik

Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more

Ranga Rao Karanam

Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts

Paulino Calderon

Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology

Chris Childerhose

Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition

Chris Childerhose

Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition

Chris Childerhose

Mastering Vim. Build a software development environment with Vim and Neovim

Ruslan Osipov

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition

Mark Dunkerley, Matt Tumbarello

Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats

Andrew Crouthamel