Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

SZYFROWANIE BEZPIECZEŃSTWO KRYPTOGRAFIA: CZĘŚĆ 1 Podstawowe pojęcia i koncepcje

Dariusz Gołębiowski

Taking Flutter to the Web. Learn how to build cross-platform UIs for web and mobile platforms using Flutter for Web

Techniki twórców złośliwego oprogramowania. Elementarz programisty

Dawid Farbaniec

TERRORYŚCI W SIECI Media społecznościowe w służbie propagandy ISIS

Sylwia Gliwa

Testing Practitioner Handbook. Gain insights into the latest technology and business trends within testing domains

Renu Rajani

Testowanie bezpieczeństwa aplikacji internetowych. Receptury

Paco Hope, Ben Walther

Testy penetracyjne dla zaawansowanych. Hakowanie najlepiej zabezpieczonych sieci na świecie

Wil Allsopp

Testy penetracyjne nowoczesnych serwisów. Kompendium inżynierów bezpieczeństwa

Prakhar Prasad

Testy penetracyjne środowiska Active Directory i infrastruktury opartej na systemie Windows

Denis Isakov

The Agile Developer's Handbook. Get more value from your software development: get the best out of the Agile methodology

Paul Flewelling

The Art of Cyber Security. A practical guide to winning the war on cyber crime

IT Governance Publishing, Gary Hibberd

The Aspiring CIO and CISO. A career guide to developing leadership skills, knowledge, experience, and behavior

David J. Gee, Darryl West

The California Privacy Rights Act (CPRA). An implementation and compliance guide

IT Governance Publishing, Preston Bukaty

The Complete Guide to Defense in Depth. Learn to identify, mitigate, and prevent cyber threats with a dynamic, layered defense approach

Akash Mukherjee, Jason D. Clinton

The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit

Sagar Rahalkar, Nipun Jaswal

The Cyber Security Handbook. Prepare, respond, and recover from cyber attacks using the IT Governance Cyber Resilience Framework

IT Governance Publishing, Alan Calder