Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

QGIS Python Programming Cookbook. Automating geospatial development - Second Edition

Joel Lawhead

Quantum Computing and Blockchain in Business. Exploring the applications, challenges, and collision of quantum computing and blockchain

Arunkumar Krishnakumar

Raspberry Pi: Amazing Projects from Scratch. Click here to enter text

Ashwin Pajankar, Richard Grimmett, Matthew Poole, Arush Kakkar

Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime

Nat Welch

Reconnaissance for Ethical Hackers. Focus on the starting point of data breaches and explore essential steps for successful pentesting

Glen D. Singh

Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems

Neil Smyth

Red Hat Enterprise Linux 9 Administration. A comprehensive Linux system administration guide for RHCSA certification exam candidates - Second Edition

Pablo Iranzo Gómez, Pedro Ibanez Requena, Miguel Pérez Colino, Scott McCarty

Resilient Cybersecurity. Reconstruct your defense strategy in an evolving cyber world

Mark Dunkerley

Rust for Blockchain Application Development. Learn to build decentralized applications on popular blockchain technologies using Rust

Akhil Sharma

Ryzyko w cyberbezpieczeństwie. Metody modelowania, pomiaru i szacowania ryzyka. Wydanie II

Douglas W. Hubbard, Richard Seiersen

Securing Cloud PCs and Azure Virtual Desktop. Start implementing and optimizing security for Windows 365 and AVD infrastructure

Dominiek Verham, Johan Vanneuville, Christiaan Brinkhoff, Scott Manchester

Securing Industrial Control Systems and Safety Instrumented Systems. A practical guide for safeguarding mission and safety critical systems

Jalal Bouhdada, Marco Ayala

Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7

Sairam Jetty, Sagar Rahalkar

Securing Remote Access in Palo Alto Networks. Practical techniques to enable and protect remote users, improve your security posture, and troubleshoot next-generation firewalls

Tom Piens aka 'reaper'

Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Akash Mahajan, MADHU AKULA

Security Automation with Python. Practical Python solutions for automating and scaling security operations

Corey Charles Sr., Frank McMahon