Хакування

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition

David Zientara

PHP, MySQL i JavaScript. Wprowadzenie. Wydanie V

Robin Nixon

Pocket CIO - The Guide to Successful IT Asset Management. Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide

Phara McLachlan

Podstawy kryptografii. Wydanie III

Marcin Karbowski

Podstawy ochrony komputerów

G T Gangemi, Rick Lehtinen, Deborah Russell

PowerShell Automation and Scripting for Cybersecurity. Hacking and defense for red and blue teamers

Miriam C. Wiesner, Tanya Janca

PowerShell for Penetration Testing. Explore the capabilities of PowerShell for pentesters across multiple platforms

Dr. Andrew Blyth, Campbell Murray

Practical Artificial Intelligence and Blockchain. A guide to converging blockchain and AI to build smart applications for new economies

Ganesh Prasad Kumble, Anantha Krishnan

Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition

Diana Kelley, Ed Moyle

Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!

Richard Boddington

Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks

Jean-Georges Valle

Practical Hardware Pentesting. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition

Jean-Georges Valle

Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries

Sravani Bhattacharjee

Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities

Drew Van Duren, Brian Russell

Practical Linux Security Cookbook. Click here to enter text

Tajinder Kalsi

Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory

Svetlana Ostrovskaya, Oleg Skulkin