Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment

Jordan Krause

Microsoft Identity and Access Administrator SC-300 Exam Guide. Pass the SC-300 exam with confidence by using exam-focused resources - Second Edition

Aaron Guilmette, James Hardiman, Doug Haven, Dwayne Natwick

Microsoft Information Protection Administrator SC-400 Certification Guide. Advance your Microsoft Security & Compliance services knowledge and pass the SC-400 exam with confidence

Shabaz Darr, Viktor Hedberg, Simon Binder

Microsoft Intune Cookbook. Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices

Andrew Taylor

Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900. Familiarize yourself with security, identity, and compliance in Microsoft 365 and Azure

Dwayne Natwick, Sonia Cuff

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide. Manage, monitor, and respond to threats using Microsoft Security Stack for securing IT systems

Trevor Stuart, Joe Anich

Microsoft Sentinel in Action. Architect, design, implement, and operate Microsoft Sentinel as the core of your security solutions - Second Edition

Richard Diver, Gary Bushey, John Perkins

Microsoft System Center Endpoint Protection Cookbook. Click here to enter text. - Second Edition

Nicolai Henriksen

Microsoft Unified XDR and SIEM Solution Handbook. Modernize and build a unified SOC platform for future-proof security

Raghu Boddu, Rod Trent, Sami Lamppu

Microsoft Windows Server 2003/2008. Bezpieczeństwo środowiska z wykorzystaniem Forefront Security

Światowiak Jacek

Mobile App Reverse Engineering. Get started with discovering, analyzing, and exploring the internals of Android and iOS apps

Abhinav Mishra

Mobile Device Exploitation Cookbook. Over 40 recipes to master mobile device penetration testing with open source tools

Prashant Verma, Akshay Dixit

Mobile Forensics - Advanced Investigative Strategies. Click here to enter text

Oleg Afonin, Vladimir Katalov

Mobile Forensics Cookbook. Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools

Igor Mikhaylov