Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II rozszerzone

Marek Serafin

Sieci Zero Trust. Budowanie bezpiecznych systemów w niezaufanym środowisku. Wydanie II

Razi Rais, Christina Morillo, Evan Gilman, Doug Barth

Skanowanie sieci z Kali Linux. Receptury

Justin Hutchens

Skill Up: A Software Developer's Guide to Life and Career. 65 steps to becoming a better developer

Jordan Hudgens

SŁUŻBY SPECJALNE W SYSTEMIE BEZPIECZEŃSTWA NARODOWEGO Pakiet 2 książki

Waldemar Kitler, Patryk Dobrzycki

SnowPro Core Certification Study Guide. Build a solid foundation in Snowflake to pass the SnowPro Core exam on the first attempt

Jatin Verma

Socjotechnika. Sztuka zdobywania władzy nad umysłami. Wydanie II

Christopher Hadnagy

Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts

Joseph Ingeno

Software Architecture with Python. Design and architect highly scalable, robust, clean, and high performance applications in Python

Anand Balachandran Pillai

SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM

Joe Dissmeyer, Joseph Dissmeyer

Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain

Ritesh Modi

Spring 5 Design Patterns. Master efficient application development with patterns such as proxy, singleton, the template method, and more

Dinesh Rajput

Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition

Mick Knutson, Robert Winch, Peter Mularien

Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition

Badr Nasslahsen

Strategie cyberbezpieczeństwa współczesnego świata

Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek

Strategie Red Team. Ofensywne testowanie zabezpieczeń w praktyce

Johann Rehberger