Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology

Paul Flewelling

The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit

Sagar Rahalkar, Nipun Jaswal

The Cybersecurity Playbook for Modern Enterprises. An end-to-end guide to preventing data breaches and cyber attacks

Jeremy Wittkop

The DevOps 2.1 Toolkit: Docker Swarm. The next level of building reliable and scalable software unleashed

Viktor Farcic

The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters

Viktor Farcic

The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale

Viktor Farcic

The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network

Vijay Krishnan

The Foundations of Threat Hunting. Organize and design effective cyber threat hunts to meet business needs

Chad Maurice, Jeremy Thompson, William Copeland, Anthony Particini

The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems

Rod Stephens

The OSINT Handbook. A practical guide to gathering and analyzing online information

Dale Meredith, Greg Shields

The Supervised Learning Workshop. Predict outcomes from data by building your own powerful predictive models with machine learning in Python - Second Edition

Blaine Bateman, Ashish Ranjan Jha, Benjamin Johnston, Ishita Mathur

The Ultimate Kali Linux Book. Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting - Third Edition

Glen D. Singh

The Ultimate Kali Linux Book. Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire - Second Edition

The Vulnerability Researcher's Handbook. A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

Benjamin Strout

Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response

Andrew Pease

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz