Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

Check Point Firewall Administration R81.10+. A practical guide to Check Point firewall deployment and administration

Vladimir Yakovlev, Dameon D. Welch

Chmura Azure. Praktyczne wprowadzenie dla administratora. Implementacja, monitorowanie i zarządzanie ważnymi usługami i komponentami IaaS/PaaS

Mustafa Toroman

CHROŃ I ROZWIJAJ BIZNES - CYBER AI Część 1 Wykorzystanie AI w bezpieczeństwie organizacji

Dariusz Gołębiowski

CISA - Certified Information Systems Auditor Study Guide. Ace the CISA exam with practical examples and over 1000 exam-oriented practice questions - Third Edition

Hemang Doshi, Javen Khoo Ai Wee

CISA - Certified Information Systems Auditor Study Guide. Achieve CISA certification with practical examples and over 850 exam-oriented practice questions - Second Edition

Hemang Doshi

Cisco Certified CyberOps Associate 200-201 Certification Guide. Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents

Glen D. Singh

CISSP in 21 Days. Boost your confidence and get the competitive edge you need to crack the exam in just 21 days! - Second Edition

M. L. Srinivasan

CISSP (ISC)2 Certification Practice Exams and Tests. Over 1,000 practice questions and explanations covering all 8 CISSP domains for the May 2021 exam version

Ted Jordan

Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans

Shinesa Cambric, Michael Ratemo

Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals

Ganesh Ramakrishnan, Mansoor Haqanee

Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory

Giuseppe Di Federico, Fabrizio Barcaroli

Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications

Kim Crawley

Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack

Prashant Priyam

CMake Cookbook. Building, testing, and packaging modular software with modern CMake

Radovan Bast, Roberto Di Remigio

Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming

Zander Brumbaugh

Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime

Nearchos Nearchou