Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam

Mark Birch

CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition

Glen D. Singh

CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification

Ian Neil

CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition

Ian Neil

CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition

Ian Neil

Computer Networks in Packet Tracer for advanced users

Jerzy Kluczewski

Computer Networks in Packet Tracer for beginners

Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski

Computer Networks in Packet Tracer for intermediate users

Damian Strojek, Jerzy Kluczewski

Computer Security and Encryption. Advanced Techniques for Securing Digital Information

Mercury Learning and Information, S. R. Chauhan, S. Jangra

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments

Chris Gill, Shannon Kuehn

Crafting Secure Software. An engineering leader's guide to security by design

Greg Bulmash, Thomas Segura

Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation

Tobias Theel

Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches

Soledad Antelada Toledano

Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption

Massimo Bertaccini

Cryptography Algorithms. Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography - Second Edition

Massimo Bertaccini

Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox

Digit Oktavianto, Iqbal Muhardianto