Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

10 Machine Learning Blueprints You Should Know for Cybersecurity. Protect your systems and boost your defenses with cutting-edge AI techniques

Rajvardhan Oak

125 sposobów na bezpieczeństwo sieci. Wydanie II

Andrew Lockhart

A CISO Guide to Cyber Resilience. A how-to guide for every CISO to build a resilient security program

Debra Baker, Ray Rothrock

Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and

Florian Rommel

Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions

Imran Bashir, Narayan Prusty

Advanced Infrastructure Penetration Testing. Defend your systems from methodized and proficient attackers

Chiheb Chebbi

Advanced Network Simulations Simplified. Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3

Dr Anil Kumar Rangisetti

Advanced Penetration Testing for Highly-Secured Environments. Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments - Second Edition

Lee Allen, Kevin Cardwell

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and

Lee Allen

Adversarial AI Attacks, Mitigations, and Defense Strategies. A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps

John Sotiropoulos

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

Agile Security Operations. Engineering for agility in cyber defense, detection, and response

Hinne Hettema

AIX, PowerVM - UNIX, wirtualizacja, bezpieczeństwo. Podręcznik administratora

Sebastian Biedroń

Akka Cookbook. Recipes for concurrent, fast, and reactive applications

Piyush Mishra, Vivek Mishra, Héctor Veiga Ortiz

Aktywne wykrywanie zagrożeń w systemach IT w praktyce. Wykorzystywanie analizy danych, frameworku ATT&CK oraz narzędzi open source

Valentina Costa-Gazcón

Algorytmy kryptograficzne. Przewodnik po algorytmach w blockchain, kryptografii kwantowej, protokołach o wiedzy zerowej oraz szyfrowaniu homomorficznym

Massimo Bertaccini