Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition

Stefano Iacovella

Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations

Fabrizio Volpe, Rosato Fabbri

Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript

Prateek Jadhwani

Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

SURI PULLEMLA, Santhosh Sivarajan

Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems

A. P. David

Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition

Ferdinando Santacroce

Go Systems Programming. Master Linux and Unix system level programming with Go

Mihalis Tsoukalos

Google Cloud Platform for Architects. Design and manage powerful cloud solutions

Vitthal Srinivasan, Janani Ravi, Judy Raj

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career

Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway

Hack the Cybersecurity Interview. Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles - Second Edition

Christophe Foulon, Ken Underhill, Tia Hopkins

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity

Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, ...

Hacking Android. Click here to enter text

Mohammed A. Imran, Srinivasa Rao Kotipalli

Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach

Will Verduzco (Contributor), Jason Tyler (Author)

Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications

Carlos A. Lozano, Dhruv Shah, Riyaz Ahemed Walikar

Hands-On Artificial Intelligence for Cybersecurity. Implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies

Alessandro Parisi

Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java

Rahul Shetty

Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python

Harish Garg

Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python

Arjuna Sky Kok

Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer

Nitin Gaur, Luc Desrosiers, Venkatraman Ramakrishna, Petr Novotny, ...

Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws

Joe Marshall

Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data

Samuel Bowne

Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches

Dr. Erdal Ozkaya, Milad Aslaner

Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Rajneesh Gupta