Hacking

Möchten Sie tiefer in die Welt der Cybersicherheit und moderner Technologien eintauchen? Dann werden Sie sicherlich an unserer Online-Bibliothek interessiert sein. Hier finden Sie Bücher, die Ihnen helfen, die von Hackern verwendeten Methoden kennenzulernen. Sie erfahren auch, wie Sie Ihre Daten effektiv schützen sowie Programme testen und debuggen können.

Etyczne łamanie haseł. John the Ripper, hashcat i inne zaawansowane techniki

James Leyte-Vidal

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

Expert Angular. Build deep understanding of Angular to set you apart from the developer crowd

Rajesh Gunasundaram, Mathieu Nayrolles, Alexandru Vasile Pop, Sridhar Rao Chivukula

Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform

Atul Mistry

Exploring Experience Design. Fusing business, tech, and design to shape customer engagement

Ezra Schwartz

Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

William Roberts, William Confer

Fedora Linux System Administration. Install, manage, and secure your Fedora Linux environments

Alex Callejas

Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III

Carey Parker

Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications

Koshik Raj

GeoServer Beginner's Guide. Share geospatial data using Open Source standards - Second Edition

Stefano Iacovella

Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations

Fabrizio Volpe, Rosato Fabbri

Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript

Prateek Jadhwani

Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

SURI PULLEMLA, Santhosh Sivarajan

Ghidra Software Reverse Engineering for Beginners. Analyze, identify, and avoid malicious code and potential threats in your networks and systems

David Álvarez Pérez

Ghidra Software Reverse-Engineering for Beginners. Master the art of debugging, from understanding code to mitigating threats - Second Edition

David Álvarez Pérez, Ravikant Tiwari

Git Essentials. Create, merge, and distribute code with Git, the most powerful and flexible versioning system available - Second Edition

Ferdinando Santacroce

Go Systems Programming. Master Linux and Unix system level programming with Go

Mihalis Tsoukalos

Google Cloud Platform for Architects. Design and manage powerful cloud solutions

Vitthal Srinivasan, Janani Ravi, Judy Raj

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career

Ken Underhill, Mari Galloway, Christophe Foulon, Tia Hopkins

Hack the Cybersecurity Interview. Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles - Second Edition

Christophe Foulon, Ken Underhill, Tia Hopkins

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity

Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, ...

Hacking Android. Click here to enter text

Mohammed A. Imran, Srinivasa Rao Kotipalli

Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach

Will Verduzco (Contributor), Jason Tyler (Author)