Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW

Abd El Monem A Mohamed El Bawab

Unveiling NIST Cybersecurity Framework 2.0. Secure your organization with the practical applications of CSF

Jason Brown

Unveiling the NIST Risk Management Framework (RMF). A practical guide to implementing RMF and managing risks in your organization

Thomas Marsland, Jaclyn "Jax" Scott

Upoluj cyberprzestępcę. Przewodnik dla hakerów prowadzących śledztwa online

Vinny Troia

User Experience Mapping. Enhance UX with User Story Map, Journey Map and Diagrams

Peter W. Szabo

VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere

Bayu Wibowo, Tony Sangha

VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud

Prasenjit Sarkar, Prasenjit Sarkar

VMware vSphere ESXi 8. Instalacja, konfiguracja i wprowadzenie do vCenter

Adam Nogły

Warsztat hakera. Testy penetracyjne i inne techniki wykrywania podatności

Matthew Hickey, Jennifer Arcuri

Web Penetration Testing with Kali Linux. Build your defense against web attacks with Kali Linux 2.0

Juned Ahmed Ansari, Juned Ahmed Ansari

Web Penetration Testing with Kali Linux. Explore the methods and tools of ethical hacking with Kali Linux - Third Edition

Gilberto Najera-Gutierrez, Juned Ahmed Ansari

What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning

Ajay Baranwal, Alizishaan Khatri, Tanish Baranwal

Windows 10 for Enterprise Administrators. Modern Administrators’ guide based on Redstone 3 version

Richard Diver, Manuel Singer, Jeff Stokes

Windows and Linux Penetration Testing from Scratch. Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results - Second Edition

Phil Bramwell

Windows APT Warfare. Identify and prevent Windows APT attacks effectively

Sheng-Hao Ma, Ziv Chang, Federico Maggi