Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Practical Cybersecurity Architecture. A guide to creating and implementing robust designs for cybersecurity architects - Second Edition

Diana Kelley, Ed Moyle

Practical Digital Forensics. Get started with the art and science of digital forensics with this practical, hands-on guide!

Richard Boddington

Practical Hardware Pentesting. A guide to attacking embedded systems and protecting them against the most common hardware attacks

Jean-Georges Valle

Practical Hardware Pentesting. Learn attack and defense techniques for embedded systems in IoT and other devices - Second Edition

Jean-Georges Valle

Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries

Sravani Bhattacharjee

Practical Internet of Things Security. Beat IoT security threats by strengthening your security strategy and posture against IoT vulnerabilities

Drew Van Duren, Brian Russell

Practical Linux Security Cookbook. Click here to enter text

Tajinder Kalsi

Practical Memory Forensics. Jumpstart effective forensic analysis of volatile memory

Svetlana Ostrovskaya, Oleg Skulkin

Practical Microservices with Dapr and .NET. A developer's guide to building cloud-native applications using the event-driven runtime - Second Edition

Davide Bedin, Mark Russinovich

Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Second Edition

Heather Mahalik, Rohit Tamma, Satish Bommisetty

Practical Mobile Forensics. A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms - Third Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Practical Mobile Forensics. Forensically investigate and analyze iOS, Android, and Windows 10 devices - Fourth Edition

Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty

Practical Network Automation. A beginner's guide to automating and optimizing networks using Python, Ansible, and more - Second Edition

Abhishek Ratan

Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus

Ajay Singh Chauhan

Practical OneOps. Implement DevOps with ease

Nilesh Nimkar

Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps

Tony Hsiang-Chih Hsu