Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Blockchain. Podstawy technologii łańcucha bloków w 25 krokach

Daniel Drescher

Blockchain. Przewodnik po łańcuchu bloków - od kryptografii po DeFi i NFT. Wydanie IV

Imran Bashir

Blockchain. Przewodnik po technologii łańcucha bloków. Kryptowaluty, inteligentne kontrakty i aplikacje rozproszone

Lorne Lantz, Daniel Cawrey

Blockchain Quick Reference. A guide to exploring decentralized blockchain application development

Brenn Hill, Samanyu Chopra, Paul Valencourt

Blockchain w biznesie. Możliwości i zastosowania łańcucha bloków

William Mougayar, Vitalik Buterin

Blockchain with Hyperledger Fabric. Build decentralized applications using Hyperledger Fabric 2 - Second Edition

Nitin Gaur, Anthony O'Dowd, Petr Novotny, Luc Desrosiers, ...

Blockchain. Zaawansowane zastosowania łańcucha bloków. Wydanie II

Imran Bashir

Blue team i cyberbezpieczeństwo. Zestaw narzędzi dla specjalistów od zabezpieczeń w sieci

Nadean H. Tanner

Bug Bounty from Scratch. A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity

Francisco Javier Santiago Vázquez

Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs

Carlos A. Lozano, Shahmeer Amir

Build Customized Apps with Amazon Honeycode. Quickly create interactive web and mobile apps for your teams without programming

Aniruddha Loya

Building a Cyber Resilient Business. A cyber handbook for executives and boards

Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran

Building a Home Security System with Raspberry Pi. Build your own sophisticated modular home security system using the popular Raspberry Pi board

Matthew Poole

Building a Next-Gen SOC with IBM QRadar. Accelerate your security operations and detect cyber threats effectively

Ashish M Kothekar, Sandeep Patil

Building and Automating Penetration Testing Labs in the Cloud. Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP

Joshua Arvin Lat